Укр|Eng|Рус
Ukraine
Catalog   /   Automotive   /   Car Audio   /   Car Alarms

Comparison Convoy MP-60D LCD vs Convoy MP-60 LCD

Add to comparison
Convoy MP-60D LCD
Convoy MP-60 LCD
Convoy MP-60D LCDConvoy MP-60 LCD
Compare prices 7
from 1 900 ₴
Outdated Product
TOP sellers
Typecarcar
Communication type2-way communication2-way communication
Security functions
Security and protection
silent arming mode
silent arming/disarming
automatic arming
engine on mode
Anti-Hi-Jack
silent arming mode
silent arming/disarming
automatic arming
engine on mode
Anti-Hi-Jack
Features
Functions
service / valet mode
panic mode
"Car search"
troubleshooting
service / valet mode
panic mode
"Car search"
troubleshooting
Autorun
turbo timer mode
turbo timer mode
Key fob and control
Control distance1000 m450 m
Max. range2000 m1000 m
Screen
Anti-scandialog codedynamic code
Vibration
In box
Delivery set
lock block
immobilizer
lock switch
lock block
immobilizer
lock switch
Shock/vibration sensor2 levels2 levels
Other
Auxiliary channels22
Added to E-Catalognovember 2020may 2019

Control distance

The maximum distance at which the ability to control the alarm from the standard key fob remains. In other words, this is the greatest distance from which the driver can give the system a control signal. This parameter should be distinguished from the reception range (see below): due to their small size, transmitters in key fobs are made relatively low-power, and the control range from the key fob inevitably turns out to be less than the signal reception range on the key fob (if the latter is provided at all in this model).

When choosing by this parameter, note that the control range is indicated for perfect conditions — that is, line of sight with a minimum of interference. The actual “range” of the key fob will inevitably be less, especially in the face of an abundance of obstacles. At the same time, modern car alarms most often have quite impressive range indicators. Thus, a distance of less than 500 m is considered rather small in this sense; 500 – 750 m is the average value, 750 – 1000 m is above average, and in some models a range of more than 1 km is claimed.

Max. range

The maximum range at which a regular key fob in a two-way system (see "Type of communication") can receive signals from the central signaling unit. In other words, this is the greatest distance at which the driver can receive notifications from the alarm in the car on the key fob.

When choosing according to this indicator, note that the control range is indicated for perfect conditions — that is, line of sight with a minimum of interference. The actual "range" of the system will inevitably be less, especially in the face of an abundance of obstacles. At the same time, the main signaling units can be equipped with fairly powerful transmitters that can effectively “reach” key fobs over long distances. Thus, the claimed receiving range usually turns out to be on average twice the control range (see above), and even in relatively simple models it can exceed 1 km.

Anti-scan

Availability of alarm protection from scanning ; if the characteristics specify the type of such protection, it is also given in this clause.

Scanning is used by attackers to intercept the control signal from the key fob; by forging such a signal, the hijacker can safely open the car. Accordingly, this protection is aimed at preventing such hacks. And its main types nowadays are dynamic code and dialog code, here are the features of each of these methods:

— Dynamic code. The general principle of dynamic coding is that each time you press the button to turn on or turn off the alarm, the key fob gives a new, unique signal. Most often, the Keelog algorithm is used for this; it assumes that the signal from the key fob contains data on the serial number of the device, the number of clicks and the secret code that the central unit also “knows” (this code is written at the factory and is unique for each alarm). Based on the serial number, the system performs general identification of the key fob, the click counter confirms that the signal has not been sent before, and the secret code acts as an encryption key. Thus, even if an attacker intercepts and copies the signal from the key fob, this signal will be outdated and, accordingly, useless; and it is impossible to decipher this signal and reproduce the desired version without a secret code.
The mai...n advantage of systems with dynamic coding is simplicity and, accordingly, low cost. However, this method in itself is less perfect than the dialog code, it provides a lower degree of protection against interception and hacking — with the help of the so-called dynamic code grabber with a jammer, an attacker can still intercept the control code under certain conditions and open the machine. However this procedure is quite complicated and does not give a guarantee; so in general, dynamic code is a good option for inexpensive cars that are not particularly attractive to professional crackers. But for maximum protection, it is still better to use dialogue systems.

— Dialogue code. Protection operating on the principle of “friend or foe” recognition: before giving a control signal, the key fob and the central unit exchange service data, identifying each other and making sure that the signal comes from the rightful owner. This is done in the following way. When you press a button on the key fob, it sends a connection request with data about its serial number. The central unit checks the serial number and, if the result of the check is positive, sends a randomly generated number to the key fob. The keyfob processes this number according to a certain algorithm and sends the result (together with a request for action) to the central unit, which performs calculations according to the same algorithm; if the results agree, the defense gives the go-ahead to execute the command. The algorithm used for calculations is unique in each individual signaling, and so-called hash algorithms are used to encrypt the transmitted data. Due to this, the dialogue code is almost impossible to crack: for this, the attacker must intercept 3 data packets (request, riddle, guess) and decrypt 2 of them, while without knowing the key (embedded in the alarm itself and inaccessible without physical access to the device), such a decryption nowadays is inaccessible even to the most powerful computers.
Dialogue systems are naturally somewhat more expensive than dynamic ones, but this is more than offset by a high degree of security.
Price graph
Convoy MP-60D LCD often compared
Convoy MP-60 LCD often compared