Drone Detector With Real-time Alerts And Blacklist And Whitelist Management Capabilities
Introduction
The Drone Detector With Real-time Alerts And Blacklist And Whitelist Management Capabilities is a comprehensive platform Integrated 2-in-1 Detection and Defense ounter-UAV System that rapidly identifies UAV communication links, gathering information such as flight status, paths, and other information in real-time "Monitoring Data stream“ helps users make an informed response as soon as possible. Equipped with advanced sensors and high-speed processing, it can swiftly identify, track, and neutralize unauthorized drones. Its precision and reliability make it ideal for large-scale events, critical sites, and high-security areas.
Basic
Function |
Description |
||
UAV detection |
Detection spectrum bandwidth |
70 MHZ - 6GHZ |
detection focus on the 433Mhz/ 900Mhz/2.4Ghz/5.2Ghz/5.8Ghz |
Simultaneous screening number of UAV |
≧150pcs |
can be customize with 1Ghz -1.4Ghz & 5.1Ghz - 5.9Ghz FPV Bands |
|
The lowest detection height |
≦0 meters |
||
Detection rate |
≧99.99 % |
||
White and Blacklist |
Number of identifiable models |
≧ 400 |
including DJI series drones,and it has the autonomous learning ability |
the accurate identification of target |
Available |
for different targets of the same position, same frequency band, same manufacturer, same type of UAV respectively. |
|
in-depth analysis of UAV signal |
|||
the identification of unique ID |
|||
the black and whitelist to distinguish |
|||
Defensive Interference |
Interferable frequency bands |
900MHz, 433Mhz, 1.5ghz, 2.4ghz, 5.8ghz, 5.2Ghz |
|
other customized frequency bands |
|||
Remote OAM |
Unattended Mode |
Automatic detection and strike |
|
A variety of OAM features |
Firmware updating |
used with the remote server |
|
Reset, status inquiry |
|||
Self-testing |
|||
Parameter configuration |
|||
Networking |
Multi-device networking |
observe the online/abnormal status of each device |
|
Remote control through mobile terminals |
viewing the operating interface of the device system |
||
receiving alarm information |
|||
viewing the black and whitelist |
|||
turning on defense function |
|||
Data security |
High reliability and security |
certificate management and data encryption |
|
Interface Showcase