The proposed security systems for cars have different levels of protection. With rare exceptions, the rule “The more expensive the signaling, the more advanced vehicle protection algorithms are used in it” applies here. But even budget car alarms in our time are equipped with engine blocking systems or, for example, a gasoline pump, which immobilize the car when trying to steal. Complexes of a higher rank increase the level of reliability of the vehicle protection system.

Classification

The simplest "car alarms" keep a one-way connection with the vehicle, ensuring the transmission of commands from the key fob to the car without a response. Most models provide two-way communication, when the key fob receives information about the current mode of operation of the complex, alerts about an attempt to penetrate, etc. are received. In the spirit of the present time, keyless anti-theft systems are made - they rely on identification tags, support remote control from a smartphone, or are tied to a regular car key.

In "signals" with two-way communication, the key fob screen shows basic information about the security mode and vulnerabilities.

In general, an extensive family of car alarms can be classified according to the type of tasks performed:

  • Warning systems are simple “signals”, the tasks of which are to monitor the state of the vehicle, detect hacking attempts and give light and sound alarms. The basic functionality of warning complexes is often supplemented by autostart and engine blocking systems.
  • Passive security systems - based on electronic beacons and satellite bookmarks, which are designed to track the coordinates of the location of the car in case of its theft.
  • Active security systems - prevent car theft attempts. They are equipped with an immobilizer, devices for blocking the engine, steering wheel, gearbox or pedals, a hood lock, and all kinds of electronic "secrets". The complexes configured for active security can be equipped with individual devices from the above list, or all at once to ensure the maximum degree of anti-theft protection.

The simplest modern car alarms have one or two security zones, in advanced models their number often exceeds a dozen and a half. They have the ability to monitor the opening of each door, hood, trunk, ignition, etc. Almost mandatory attributes of a self-respecting “signaling” are tilt and displacement sensors, with the help of which alerts are implemented about jacking and towing the vehicle.

Immobilizer

Attempts to steal a car on their own are eliminated by the immobilizer, which is introduced into advanced instances of car alarms. On his shoulders lies the function of breaking the electrical circuit associated with the launch of the power unit. For the correct operation of remote engine start systems, a prerequisite is the presence of crawlers of a standard immobilizer, which is installed "from the factory" on board the lion's share of modern vehicles.

In alarms with auto-start systems of the power unit, a standard immobilizer crawler is required.

Bypassers of a standard immobilizer imitate the presence of a key or an identification tag in the car. They can be represented by a duplicate of a tag or chip that is physically located in the car, or they rely on software algorithms using a CAN / LIN bus and additional equipment.

To disable the immobilizer, "secrets" are used in the manner of entering an individual PIN code with standard buttons in the car, pressing the necessary combination of buttons on the key fob, bringing an identifier label to a certain zone on the dashboard, etc. It all depends on the preferences of the driver, imagination and direct hands of car alarm installers.

"Secrets" can be installed in any convenient place on the dashboard. Until you activate them by entering a PIN code or other available methods, the car will not start.

It is possible to transfer the reins of government with individual copies of advanced "signals" into the hands of a regular key fob. This was done in order to minimize the number of key fobs to control the functions of the car and the convenience of user interaction with the vehicle.

ID tags and keyless entry

Many modern "cars" use keyless access systems that involve contactless authorization of the car owner by key. If your car does not have such a function, it does not matter - for keyless entry, you can use special identifier tags that come with the corresponding security systems. When moving away from the car, a person with the “signaling” tag automatically becomes armed, and when approaching a short distance, it is removed from it.

A paired smartphone can be used as an identifier tag for advanced security systems.

Key fobs for “signaling” often perform another important function - every time the ignition is turned on and the movement starts, the system checks for the presence of a tag. An attempt to leave without it will be unsuccessful - the engine lock will turn on and the car will stop. In reserve, backup radio or Bluetooth tags are attached to such car alarms. Several tags provide access to the car at the same time to several people - the driver and passengers.

In models that support remote control from a smartphone, the interactive key function can be played by a mobile device with pre-installed software for interconnecting with the signaling system.

Smartphone control

The distance of finishing off the signal from the key fob to the electronic control unit for car alarms has a certain threshold. Under perfect conditions, it is up to 2 km in the line-of-sight zone (with a minimum number of obstacles and radio interference on the signal path). Unlimited range of interaction is implemented in security systems with a GSM module, which are able to receive calls and SMS messages or work in 3G/LTE networks. The condition for the operation of the GSM module is the availability of mobile communication coverage.

Mobile applications provide ample opportunities for fine-tuning car alarms, as well as controlling everything and everyone.

The GSM module allows you to use a mobile phone as a key fob to control a car alarm. As a rule, this is done in a two-way format with the possibility of receiving notifications on the phone. Alarm notifications are sent to the paired smartphone in the form of short SMS, phone calls and notifications in a proprietary application. In fact, the specific method of interconnection depends on the specific capabilities of the selected security complex.

The most advanced is the remote control of the "signaling" through a mobile application. The programme provides for the functions of opening / closing the car, remotely starting the power unit (including according to a pre-arranged schedule), blocking the engine or turning off the fuel pump when the vehicle is stolen, tracking the location of the car, adjusting the sensitivity of security sensors. The software is made different and its functionality differs depending on the manufacturer and model of the car alarm.

Auto engine start

The hallmark of current car alarms is the engine auto-start system. In the cold season, it will help warm up the power unit and the interior of the car in anticipation of the trip, in the summer it cools the interior, ensuring the operation of the air conditioner or climate control.

The car engine is started “remotely” by a command from the key fob, a pre-set schedule, engine temperature, voltage in the on-board network, etc.

In security systems for cars, there are several options for autostarting the engine:

A separate line in the characteristics of security systems is written to support the W-bus protocol for the correct start of Webasto equipment (for example, preheaters), turbo timer mode, which is responsible for the operation of the engine for some time after removing the ignition key on turbocharged cars, the ability to start diesel power units.

Location Tracking

A fairly effective method of protecting a vehicle from theft is GPS monitoring of the movements of the car. The stolen "car" can be found according to the GPS module in the equipment of car alarms or special beacons that do not connect to the vehicle's on-board network and "hide" from intruders' electronic devices.

You can track the car using the GPS module data in any corner of the globe.

In signaling models controlled from a smartphone, the track of the car's movements is usually drawn in a mobile application. You can monitor the movements of the vehicle at any time of the day or night - there are no lunch breaks with GPS coordinate tracking systems.

Smart features

The CAN module in the equipment of security systems allows you to dock the alarm with any modern car that has a digital CAN bus. As a result, when installing such an anti-theft system, a minimum of interference with the standard wiring of the car is made, and curious “chips” are provided to the user, such as receiving data from the car’s own sensors, reading error codes, etc.

When docking with the car's digital CAN bus, advanced "signals" read error codes.

In models with support for the LIN interface, the security systems manage and interact with some of the standard functional systems of the vehicle : engine preheating, climate control, and others.

Advanced alarms with a built-in GSM module often understand voice commands given through an associated mobile application or virtual assistants (for example, Siri). “Start the car”, “close the car”, “turn off the engine”, “turn on / off the preheater” are just a small list of simple commands recognized by security systems.

The user has the right to invent commands for Siri to control the car alarm on his own.

The smart functionality of individual instances of car alarms also comes down to sending pictures from a connected camera to a mobile application. The thing is rare, but very useful in terms of assessing the situation of what is happening next to the car or in the vehicle interior (when installing a video surveillance system inside the car).

______________________________

Car alarms have grown qualitatively in recent years and continue to improve day by day. From simple "tweeters" to scare away negligent intruders, they have degenerated into multi-stage security systems guarding the comprehensive protection of the vehicle from hacking or theft.