What is an alarm with a dialogue code. Dialog or dynamic coding in alarms, which is better? Dialogue car alarm

We often hear that the command sent by the remote control can be intercepted special device- the so-called code grabber or scanner.

A good example is a car alarm.

The radio channel through which data is transmitted between the alarm and the key fob has one big drawback - the radio waves do not propagate in a direction and the exchange can be listened to while being far from the car owner. Such communication channels are called insecure and the data transmitted through them is encrypted.

Data is transmitted over a radio channel in the form of small sequences - packets. Each packet can be thought of as a command such as "Open the lock", a response to a command such as "The lock is open".

The very first signaling with a radio channel had a static code - each command had its own command packet. The package format was chosen by the user (or the installer), switching the engines inside the key fob, or soldering the jumpers.

Since there were few code options, sometimes you could open someone else's car with the same alarm with your key fob - the packet formats matched. Of course, such coding did not provide any protection - it was enough to listen to the packet corresponding to the "Disarm" command once, so that later, simply by repeating it, you would gain access to the car.

Probably, it was then that the first code grabbers appeared - technical devices, intended for interception, decoding and code repetition. The ultimate goal of an attacker who uses a code grabber is to disarm the car they like, and then steal it from the passenger compartment or steal it.

Even for the very first code grabbers, static code was not a problem, so soon all alarm manufacturers switched to dynamic coding.

Dynamic code differs from static code in that each time you click on the button, the package format changes.

The package changes according to a certain law, which is known only to the alarm and the key fob programmed into it. This means that it is impossible to simply repeat the recorded packet - the signaling discards old packets.

Figure 1. Dynamic code

At first, it seemed that this would be enough, and that the problem of codegabbers was solved - but it was not there! Dynamic coding also failed to resist the new code grabbers.

The most famous dynamic encoding algorithm is Keeloq.

Rumors about the Keeloq hack have been circulating on the Internet for a long time, but this is not true. Analytically, the Keeloq algorithm has not yet been cracked - its unsuccessful implementations have been cracked. For example, many car manufacturers "sin" by using the same key for all systems, which allows you to create so-called "manufactory" code grabbers.

Hack dynamic coding in several ways.

The first way: analytical. This method is based on "holes" that the developers of the system accidentally or deliberately left in the algorithm. An example is given above - the same keys for regular security systems some cars.

The second way: replacing the code, a method that at one time made a lot of noise and forced alarm manufacturers to spread the arming and disarming commands to different key fob buttons. When using this method, the code grabber records several messages from the user's key fob, and then uses one of them to disarm the car.

Many manufacturers of car security systems have developed their own dynamic codes, making various improvements. Some of them have not yet been opened, and seem to be used in security systems. However, it must be understood that no dynamic code guarantees protection against hacking.

Dialogue coding is considered the most cryptographic and reliable, which requires a two-way communication channel, that is, the presence of a receiver and transmitter, both in the main module and in the key fob.

It is convenient to explain the dialog coding algorithm using the family: husband and wife.

Imagine that the “husband” is in the house and does not want to let anyone in except for the “wife”. There is no peephole in the door, and there are no windows in the house. After the “husband” heard a knock on the door, he needs to determine whether “his own” is really standing behind the door, i.e. "wife". Most The best way is to ask a question, the correct answer to which can only be given by "wife". If the person behind the door answers correctly, feel free to open the door - this is “your own”.

The alarm works the same way. dialogue code:

1. When you press the button, the key fob sends a packet with a request for authorization ("knocking on the door").

2. The main module, having accepted this package, comes up with a "riddle", the answer to which can be only one. The "mystery" is transmitted to the key fob via radio.

3. The key fob, having solved the "riddle", answers with a confirmation package.

4. The main module checks the answer and, if it is correct, executes the key fob command ("opens the door").

Figure 2. Dialog code structure

Now let's add one more "alien" character to our story, who really wants to get into our family's house. At certain conditions A "stranger" can eavesdrop on a conversation between a husband and wife, and find out the answer to the "husband's" riddle. Therefore, the riddles should be different every time.

In dialogue coding, the role of a riddle is played by a random number that is generated by a special algorithm. The "randomness" of this number is very high. In this case, the answer to the riddle must be received within a strictly allotted time interval - in a fraction of a second.

Imagine that the questions "husband" asks are dates historical events. What will the “stranger” do if he finds out about this? Prepare an answer and be able to get into the house?

In dialogue coding, the process of solving the "riddle" is unique for each "signaling" - "keychain" system. This is implemented - unique key encryption that is created when the key fob is linked to the system.

The system, having received a dynamically encoded command ("password"), does not execute it immediately, but sends a confirmation request - a random number, also dynamically encoded. The key fob accepts it both with the help of a secret key and complex algorithm generates a "feedback", again dynamically recodes and sends to the system. If the feedback is correct, then the system executes the command, and the process takes a fraction of a second. Unlike a keychain, a code grabber in the hands of even the most seasoned hijacker does not know the algorithm for changing the code, the encryption key and is not able to generate a response in the allotted time.


Figure 3. Generalized view of the dialog code

As a result, today (and for a long time to come) full protection against electronic hacking is provided only by an interactive code with individual encryption keys.

Do you know how identification systems are arranged in military aviation? There is a request system “Friend or foe”, i.e. dialog coding. If the aircraft does not respond correctly to a request from the ground, it is shot down!

AT electronic locks"ARBAT" we use dialogue coding - an identification system, like in an airplane.

This article, of course, will not please manufacturers car alarms. But the task of Auto Tips is to help ordinary motorists understand what modern car alarms are. You will be able to independently make a choice whether you need to install such a device or you can do without it. To date, there is a great number of different car alarms costing from 20 to 1000 dollars. Let's try to clarify why such a spread in prices. After all, the tasks performed by these alarms are approximately the same. Give a sound, light signal and radio signal (for alarms with two-way communication) about unauthorized entry into the vehicle or mechanical action on it (impact, jacking, towing, etc.).

Block the operation of the vital circuits of the car to prevent the engine from starting. It could be a starter, an ignition circuit, fuel pump, crankshaft position sensor, fuel injection nozzle circuit, controller power. Next come the service secondary functions, which in general have nothing to do with protection against theft. Remote trunk opening, engine start, interior temperature control, battery voltage control, vehicle location control. If you have to track the location of the car, then this is no longer protection from theft, but escort of theft ...

Security functions have all alarms in the entire price range. Manufacturing quality of all famous brands also excellent. The essential difference is which radio code is used: dynamic KeeLoq code (most modern alarms) or conversational code. It is not my task to tell you how they differ, it is important for us to know that the dynamic code is easily intercepted by modern code grabbers, the alarm is turned off, the central lock opens and the car can be gutted or stolen. And the dialogue code is not yet amenable to intercept and turn off the car alarm. 95% of modern alarms use KeeLoq dynamic code. They continue to release as if nothing had happened!

Strange, really. Why produce, sell and install alarms for which electronic master keys, that is, code grabbers, are freely sold on the Internet? Clearly, such alarms cannot be set. This is money thrown to the wind. Then what do we choose alarms with a dialogue code. Their selection is relatively small. Look for them among these trade names. Magic Systems, Pandora, Star Line, Cyclon. Their prices are biting and the installation is expensive, but the sense is small. I explain why. All modern cars in order to save wires, that is, copper, are used CAN bus. These are two wires twisted together through which digital electrical control signals are transmitted to many car devices.

So, modern dialogue alarms are connected to the CAN bus. Now it is enough to connect two wires from the alarm to this bus and two power supply wires, and then, through an external computer, program the car alarm to perform certain functions already on the car’s on-board controller: control of the central lock, parking lights, starting the engine, controlling the power window, etc.. That is, now you can not bother looking for circuits to block the engine, but entrust this to the standard car controller, this is the vulnerability of this connection option.

Device for starting the engine through the diagnostic connector.

There are devices for starting the engine through the diagnostic connector of the car. Here, as they say, they arrived. The inability (currently) to apply an electronic lock to an alarm with a dialogue code is not a significant factor in countering car theft. It's like putting a good safe lock on a safe made of cardboard! Indeed, the car is made of thin metal, which can be easily drilled in the right place and open the doors with a special hook, a lot of other methods can be used for the same purpose. And then start the engine through the diagnostic connector.

It turns out that here, too, money is thrown to the wind. Two-way communication of car alarms is very unreliable. All key fobs operate at the same frequency, which is very easy to drown out. Testing dialogue alarms at the operating range of the alert key fob near shopping centers in Moscow showed that communication is unstable on the fourth floors and in elevators. Sometimes 200 meters is an insurmountable distance. What is the point of paying a thousand dollars for such alarms? But the car can be stolen by ordinary manual loading, as shown in the photo at the beginning of the article. Read about other tricks of hijackers

We draw conclusions. Alarms with dynamic code- this is yesterday and their installation should be prohibited! Expensive alarms with a dialogue code are not yet subject to electronic master keys, but security functions largely shifted to the regular car controller. Or you need to install additional wireless blocking relays. It's all for an additional fee Control via CAN bus makes life easier for alarm installers and car thieves.

You naturally have questions. What to put on the car so that it is not stolen? What equipment to use? I will answer these questions in the next article. In the meantime, I'm waiting for your comments. Good luck to you!

Here, for example, is testing the range of the key fob of dialogue alarms.

So that the car alarm you bought becomes reliable protection, it is necessary to choose it correctly. One of the main parameters affecting the efficiency of signaling is the method of signal coding. In this article, we will try to explain in an accessible way what dynamic signal coding means and what a dialogue code in a car alarm means, which type of coding is better, what positive and negative sides each has.

Dynamic coding in car alarms

The confrontation between alarm developers and hijackers began since the creation of the first car alarms. With the advent of new, more advanced security systems, the means of hacking them were also improved. The very first alarms had a static code, which was easily cracked by selection. The response of the developers was to block the possibility of code selection. The next step of the hackers was the creation of grabbers - devices that scanned the signal from the key fob and reproduced it. In this way, they duplicated the commands from the owner's key fob, removing the car from protection at the right time. To protect car alarms from being hacked by a grabber, they began to use dynamic signal coding.

How dynamic coding works

Dynamic code in car alarms is a constantly changing data packet transmitted from the key fob to the alarm unit via a radio channel. With each new command, a code is sent from the key fob that has not been used before. This code is calculated according to a specific algorithm provided by the manufacturer. Keelog is considered the most common and reliable algorithm.

The alarm works according to the following principle. When the car owner presses the key fob button, a signal is generated. It carries information about the number of clicks (this value is necessary to synchronize the operation of the key fob and the control unit), the serial number of the device and the secret code. This data is encrypted before being sent. The encryption algorithm itself is freely available, but in order to decrypt the data, you need to know secret code, which is put into the key fob and control unit at the factory.

There are also original algorithms developed by alarm manufacturers. Such coding virtually eliminated the possibility of selecting a command code, but over time, attackers bypassed this protection as well.

What you need to know about dynamic code hacking

In response to the introduction of dynamic coding in car alarms, a dynamic grabber was created. The principle of its operation is to create interference and intercept the signal. When the car owner gets out of the car and presses the key fob button, strong radio interference is created. The signal with the code does not reach the alarm control unit, but it is intercepted and copied by the grabber. The surprised driver presses the button again, but the process is repeated and the second code is also intercepted. From the second time, the car is put on defense, but the command comes from the thief's device. When the owner of the car calmly goes about his business, the hijacker sends a second, previously intercepted code and removes the car from protection.

What protection is used for dynamic code

Manufacturers of car alarms solved the problem of hacking quite simply. They began to install two buttons on key fobs, one of which put the car on protection, and the second - deactivated the protection. Accordingly, different codes were sent to install and remove protection. Therefore, no matter how much interference the thief puts when setting the car to protection, he will never receive the code required to deactivate the alarm.

If you pressed the “set to protect” button and the car did not respond, then you may have become the target of a hijacker. In this case, you do not need to thoughtlessly press all the buttons on the key fob in an attempt to somehow correct the situation. It is enough to press the button again. If you accidentally press the "disarm" button, the thief will receive the code he needs, which he will soon use and steal your car.

Alarms with dynamic coding are already somewhat outdated, they do not provide one hundred percent protection of the car from theft. They were replaced by devices with conversational coding. If you are the owner of an inexpensive car, then you do not need to worry, since the likelihood of your property being attacked by a thief equipped with the most modern equipment is very low. To protect your property, use multi-level protection. Install additional . It will protect the car in case of car alarm hacking.

Dialogue coding in astosignalings

After the advent of dynamic grabbers, car alarms running on dynamic code have become very vulnerable to intruders. Also a large number of encoding algorithms have been hacked. To protect the car from being hacked by such devices, alarm developers began to use conversational signal coding.

How Dialog Coding Works

As the name implies, this type of encryption is carried out in the dialogue mode between the key fob and the car alarm control unit located in the car. When you press the button, the keyfob sends a request to execute the command. In order for the control unit to make sure that the command came from the owner's key fob, it sends a signal with a random number to the key fob. This number is processed according to a certain algorithm and sent back to the control unit. At this time, the control unit processes the same number and compares its result with the result sent by the key fob. If the values ​​match, the control unit executes the command.

The algorithm by which calculations are performed on the key fob and control unit is individual for each car alarm and is incorporated into it at the factory. Let's consider the simplest algorithm for understanding:

X∙T 3 - X∙S 2 + X∙U - H = Y

T, S, U and H are the numbers that are put into the alarm at the factory.

X is a random number that is sent from the control unit to the key fob for verification.

Y is a number that is calculated by the control unit and the key fob according to a given algorithm.

Let's consider the situation when the owner of the alarm pressed the button and a request was sent from the key fob to the control unit to disarm the car. In response, the control unit generated a random number (for example, take the number 846) and sent it to the key fob. After that, the CU and the key fob calculate the number 846 according to the algorithm (for example, we will calculate according to the simplest algorithm above).

For calculations, we will accept:

T=29, S=43, U=91, H=38.

We will be able to:

846∙24389 - 846∙1849 + 846∙91- 38 = 19145788

The key fob will send the number (19145788) to the control unit. At the same time, the control unit will perform the same calculation. The numbers will match, the control unit will confirm the key fob command, and the car will disarm.

Even to decrypt the elementary algorithm above, it will take four times (in our case, four unknowns in the equation) to intercept data packets.

It is almost impossible to intercept and decrypt a data packet of an interactive car alarm. To encode the signal, so-called hash functions are used - algorithms that convert strings of arbitrary length. The result of such encryption can contain up to 32 letters and numbers.

Below are the results of number encryption using the most popular MD5 encryption algorithm. For example, the number 846 and its modifications were taken.

MD5(846)=;

MD5(841)=;

MD5(146)=.

As you can see, the results of encoding numbers that differ by only one digit are absolutely different from each other.

Similar algorithms are used in modern conversational car alarms. It has been proven that for reverse decoding and obtaining an algorithm, modern computers it will take more than a century. And without this algorithm, it will be impossible to generate verification codes to confirm the command. Therefore, now and in the near future, cracking the dialogue code is impossible.

Alarms that work on a conversational code are safer, they are not amenable to electronic hacking, but this does not mean that your car will be completely safe. You can accidentally lose your key fob or have it stolen from you. To increase the level of protection, you must use additional funds, such as and .

If an inquisitive motorist asks the question of whether they can intercept the key fob code of his alarm and, thus, steal a car, he most often receives the following answer from the car alarm installer: "The code is dynamic (sometimes they add the name of the encryption algorithm), it changes with each new message ". Usually, after this answer, no questions arise and the joyful car owner leaves home, calm and contented. Of course, there can be no question of peace of mind only on the basis that the car alarm has been set up and its code is dynamic ... And this is not about cryptographic strength! - the fact is that one alarm is not enough - any installer will tell you this.

All specialists and service workers agree on the following issues:
1. It is advisable to use an immobilizer or a relay controlled by standard wiring in addition to the car alarm, which, in principle, at this stage in the development of the industry is one and the same.
2. A hood lock is almost necessary (mechanical or electromechanical)
3. The degree of theft resistance almost half depends on the approach to installation and the professionalism of the master. It's hard to disagree with this!

However, if you take a completely "decent" and expensive security complex, consisting of a car alarm, a remote relay hanging on a regular wire and controlled from an alarm, as well as, for example, an electromechanical lock on the hood Defentime (controlled from a car alarm), then electronic key from a car alarm is all a car thief needs to get into your car and drive away..... How sad! The conclusion suggests itself - it is difficult to overestimate the importance of the cryptographic strength of your car alarm !!!

Let's dive a little into history and see how all these Kilogs and other encryption algorithms came into being.

In obsolete alarms, codes with up to 512 combinations were used. The selection of such a code takes less than 1 minute. Number of code combinations in modern alarms can reach several thousand billion. The first dynamic code structure was proposed by the Italian company Autotechnica back in 1995. But the real revolution in the application of this technology occurred when Microchip produced sets of encoders and decoders, accompanied by their implementation guides. This "technical intervention" has encouraged various manufacturers to develop their own original algorithms. However, Microrochip products are still in great demand, and the Keeloq technology is known to everyone who has not stopped their acquaintance with the car at the ignition switch, door and balloon.

It is here that I will make a digression and tell motorists about such a concept as anti-scanning, which is almost a standard option for modern car alarms. This term means that an attacker will not be able to disarm the alarm using a scanner. The scanner is a relatively simple device that sequentially reproduces codes in a hackable signaling format. The anti-scanning system cannot be turned off by enumerating the key fob codes, since when an incorrect code is received, it is blocked for a while, increasing the time required for scanning. The lock is released by repeatedly sending the correct code. When enough large numbers The list of possible codes will take an unrealistically long time. Anti-scan technology has been around for several years and is not new. Systems with anti-scanning are not protected from intercepting codes from the air using special devices (grabbers or code interceptors). The anti-scanning pause is also a necessary attribute in systems with dynamic code.

What is dynamic code...

The technology of floating codes makes it impossible both to intercept codes from the air and to select them. The actual code is encrypted in such a way that a completely different code message is emitted externally with each transmission. At the receiver, the actual code is reconstructed by mathematical processing. Interception of codes becomes meaningless, since it is impossible to predict which next code combination will disarm the alarm. A simple repetition of the previous message will not turn off the signaling, since the messages that were in the past are considered invalid. It is theoretically possible to predict the future package only if you know the code encryption algorithm, which is kept secret by the manufacturer, and a sufficient number of code samples for analysis. Code combinations are repeated with a very large interval. Studies of the MICROCAR 052.1 model showed that for this model this period is more than 65,000 clicks. We can say that, during operation, the transmitted code combinations are never repeated - the machine does not serve for 20 years. Identifier codes for car alarm key fobs with floating codes are recorded at the factory and are unique and cannot be replaced during operation. The floating code technology is very effective in protecting the alarm system from being tampered with by electronic means. The degree of protection against decryption depends on the encoding algorithm used. This is where one big "BUT" lies (see below "Double dynamic code")

Let's take a closer look at what dynamic code is based on the same Keeloq

The keeloq technology is based on the concept of secret encoding / decoding keys (ciphers), which convert the original information into encoded and encoded data into the original.

However, the developers had to add a few more data structures to the encoding key. special purpose. Let's look at them briefly.

Encoding (secret) key A 64-bit combination formed by a generating function from a serial number (kernel) and a 64-bit manufacturer's key. The encoding key is used to encode and the decoding key is used to decode the message. The key value cannot be read and is never transmitted.

Synchronization counter A 16-bit counter pattern transmitted each time an encoder (encoder) is activated, for example by pressing a key fob button. The synchronization counter is generated in the encoder and transmitted in coded form as part of the variable part of the message. This structure allows you to track the synchronism of the steps of the decoder and encoder. The current value of the synchronization counter from each encoder is stored in the decoder and makes it possible to distinguish the received next message from the previous or out of order, created not in accordance with the algorithm.

Discriminator A 12-bit random combination transmitted by the encoder in encoded form as part of the variable part of the message. It is used to check the integrity of the decoding process.

Serial number unique number of each encoder (keyfob-transmitter) of 28 or 32 bits. It is formed during the manufacture of the encoder and is transmitted in unencoded form in the permanent part of the message.

Each encoder is characterized by a set of the four values ​​described above: encoding key, synchronization counter, discriminator and serial number. Since the values ​​of all these values ​​are different for different encoders, the decoder must store as many sets in memory as there are encoders used by the system (usually no more than 6 8).

The formation of the coding key in the encoder is performed by a special programmer in the process of manufacturing the encoder. To generate an encryption key, you need serial number and manufacturer's key.

Manufacturer key A 64-bit combination used to form the encoding key and to ensure that the entire code space of the bursts is shared between different manufacturers. The manufacturer's key is also written to the memory of the decoder. Naturally, to work with all encoders of the system produced by one manufacturer, it is enough to memorize one manufacturer's key.

In order for the alarm system to recognize "its" key fobs, the key fob code package and the alarm decoder memory contain the same identifier codes, which are remembered by the alarm system during programming ("training") of the key fobs. Code - the identifier of each key fob is unique and, most often, is written into the key fob encoder during manufacture.

In order to prevent the identifier code from being intercepted from the air, all (more precisely, almost all) already transmitted codes must be filtered out as invalid. In addition, the identifier code and service information cannot be transmitted explicitly. This can be done if different non-repeating masks are applied to the code before transmission. To be able to remove the mask on reception, it must be numbered. The encoder and decoder include the so-called. synchronization counter. The synchronization counter contains the current mask number. Each press of the keyfob button leads to an increase in the state of the keyfob synchronization counter and a change in the applied mask. The typical capacity of the clock counter is 16 bits. Thus, the keychain generates 65,000 non-repeating masks.

Code key fobs

The alarm code key fob is a miniature transmitter operating in the decimeter wave range (200 ... 450 MHz). Less common are models that work on infrared rays, they have a short range.
For alarms equipped with IR key fobs, the interception of codes is very difficult due to the small range and direction of the transmitter trinkets (when using them, they have to be directed to a certain place in the car interior from a distance of no more than a few meters). This feature can create inconvenience when using. Alarms with IR key fobs: BOSH Blocktronic IR-US, BOSH Blocktronic IM-US

The operating frequencies of the transmitters are constant and are standardized by the telecommunications control authorities of the countries into which these devices are imported.

To transmit the code on the air, a single-transistor generator operating at one of the above frequencies is used. In modern alarm systems, in order to avoid frequency drift when temperature and humidity changes, the transmission frequency is stabilized using filters on surface acoustic waves. To reproduce the code - the identifier in key fobs, specialized microcircuits - encoders, as well as appropriately programmed microcontrollers are used.

Double dynamic code

Since the grabber code has ceased to be exotic and is available to hijackers, everyone great importance is given to the degree of secrecy of the code message transmitted from the key fob. As a result of this process, all more systems are issued with a dynamic code. Nobody disputes its benefits. However, it cannot be considered a panacea for all cases. If the change algorithm becomes known (and it is known, at least to the developer), then it remains a matter of technology to infiltrate the system. It is not for nothing that the coding system is so carefully classified and hidden by alarm manufacturers. To exclude this possibility for electronic hacking, the so-called D2 code has been developed, the essence of which is that each key fob, in addition to the bit number, is also assigned its own individual code change law. This individual rule is written to the decoder once when entering (programming) the key fob, it no longer appears on the air and is not available for radio interception. Thus, even a system developer, having all necessary information about the coding methods and the corresponding equipment, will not be able to decipher this code.

Every motorist sooner or later asks the question: which car alarm is better. To answer this question, it is necessary, first of all, to understand on what principle this or that protection system works. There are several types of control code used in car alarms: static, dynamic and interactive.

  • Static code is the most primitive type of encryption that was used in the first anti-theft devices. Static code is permanent, which means that it is not difficult for a hijacker to crack it.
  • Dynamic code uses a different principle of operation: each time you press the key fob button, a new code is generated. However, this type of encryption is gradually becoming a thing of the past.
  • The dialogue code used in modern car alarms is borrowed from military aviation. Its main feature is that the key fob is identified in several stages.

The principle of the dialogue code

When you press a button on the key fob, it sends its ID number to base unit. The base receives the information and checks if the key fob is registered in the system. If the key fob is identified successfully, a dynamically generated code is sent to it. The key fob receives the code, encodes a command with it (activate / deactivate protection) and sends it to the base unit, which, in turn, decodes the received information, executes the command and sends a confirmation to the key fob.

Benefits of Dialog Code

The main advantage of the dialogue code in comparison with the methods of data encryption adopted earlier is that it is not possible to disarm such a system using an external device, for example, a code grabber. This is due to the fact that the request is sent as a random number and this happens more than once.

Car alarms with a dialogue principle of operation

The most popular alarms with a dialogue code today are StarLine systems, Pandora and Magic Systems. Car alarms Star Line B6 Dialog (an inexpensive system with a dialogue code) and Star Line B9 Dialog (a system with a function remote start engine). In addition, not so long ago, StarLine developed a number of new products: StarLine A62 Dialog, StarLine A92 Dialog, StarLine B62 Dialog, StarLine B92 Dialog. Another line of reliable systems with dialogue code: Pandora car alarms. Pandora DXL 3000 and Pandora DXL 3300, among other things, have a wide range of functionality and an enviable range of work. There are new items in this line: Pandora DXL 3500, information about which will appear a little later. Magic Systems launches its line of systems equipped with dialogue code: MS 505 LAN, MS 600 Light Stalker LAN, MS 600 Stalker LAN 3, MS Dialog.