Apps & LBS Location Integrity

SECURE YOUR MOBILE DEVICE FROM GPS SPOOFING

Reliable positioning at all times

 

COntact us to learn more

 

 

 

Did You Know?

Every single mobile phone is equipped with a built-in GNSS chip, receiving location, and timing information from satellites in space. 
This information is completely exposed and unencrypted. 

From a military Tech to a key component in augmented reality – The evolution of GPS in the mobile industry-1

 

Did You Know?

At any moment, your cellular devices could unwittingly expose sensitive data, through malicious exploits that track locations, hack and eavesdrop - without detection.

From a military Tech to a key component in augmented reality – The evolution of GPS in the mobile industry-1

 

Mobile featured-1

 

 

Spoofing Mobile GPS

Hackers are using GPS spoofing to bypass your app's certain geo-based limitations or fraud for monetary gains. 

Did You Know?

At any moment, your cellular devices could unwittingly expose sensitive data, through malicious exploits that track locations, hack and eavesdrop - without detection.

Mobile featured-1

 

 

Mobile Spoofing Demo

Iphone spoofing and Regulus Detection

 

 

SOUNDS INTERESTING?

ASK FOR OUR REMOTE DEMO TO SEE OUR DETECTION IN ACTION ON A DEVICE OF YOUR CHOICE.

We're not an anti-virus

No Hardware Modificaiton Required

Both standalone and connected

Pyramid GNSS™ algorithms are embedded within your LBS app, providing you with internal capability to detect fake GPS, generated by both mock location app and external transmitter.

Protect

people, IPs and

devices from cellular

threats with FirstPoint

 

 

PROTECT YOUR
BUSINESS
FROM GPS
THREATS WITH
PYRAMID GNSS™

 

PROTECTION CAPABILITIES

CURRENT

Current GNSS chipsets provide PNT (Position, Navigation and Time), either spoofed or authentic.

Graphic_1-02

 

WITH REGULUS

The Regulus Pyramid Algorithm detects and mitigates spoofing, reliably enabling accurate GNSS capabilities even while under a GNSS spoofing attack.

Graphic_1-01

 

 

Protection Capabilities

Protects against all types of spoofing (Multi-Constellation and Multi-Frequency)-3

Complete GNSS Protection

Protects against all types of spoofing, both Multi-Constellation and Multi-Frequency

Detects and alerts GPS hacking attacks (Software)-2

Real-Time Alerts and Response

Detects and alerts when GPS spoofing attacks take place and engages security protocols defined by the app maker.

Graphic_3-12

Seamless Integration In Existing Apps

Pyramid GNSS™ was designed to work as an integral update for existing apps, in both iOS and Android.

Keeps providing valid PNT under spoofing attack (Chip IP Core)-2

Over The Air Updates

Utilizing the phone's connectivity, the anti-spoofing solutions keep evolving via updates, to protect against evolving threats. 

 

Product Highlights

Graphic_3-11

Tested And Proven

The solution was developed based on countless testing and experiments, learning from real GPS hacking scenarios affecting mobile apps.

Software only, works on most common receivers-2

Lightweight Software

Requires very little computing power from the app, enabling smooth operation of the app, even with integration. 

Real time alert to fleet operators and law enforcement-1

Real-Time Alert

Provides instant updates regarding any location manipulation, and provides app makers with an option to choose a customized security protocol. 

Affordable and simple solution-1

Affordable Upgrade

Enhancing the reliability of the existing GPS signals without any expensive software modifications

 

Tested With

android-logo-png-transparent
Apple-logo
 

Contact Us