Sign In | Join Free | My burrillandco.com |
|
Function | Descriptions |
UAV detection | Detection spectrum bandwidth: 70 MHZ - 6GHZ, detection focus on the
433Mhz,868Mhz,915Mhz,2.4Ghz,5.2Ghz,5.8Ghz FPV
Detection:300Mhz-6.2Ghz Analog Signal of FPV DronesSimultaneous
screening number of UAV: more than 150pcs The lowest detection height: ≤0 metersDetection rate: more than99.99 %s |
Drones Location | For UAVs with Remote ID (China GB42590-2023, US ASTM F3411-22a, EU
ASD-STAN PrEN4709-002) and Drone ID (such as DJI Mavic2, Mavic3,
air3s, Matrice4, etc., some require network decryption), it can
parse detailed information such as drone location and pilot
location. |
White and Blacklist | The Systemcan identify more than 400 different model UAV including
DJI series drones,and it has the autonomous learning ability. The
Systemcan carry on the accurate identification of target, in-depth
analysis of UAV signal, the identification of unique ID, and the
black and whitelist to distinguish. Whitelist and a blacklist can
be set for different targets of the same position, same frequency
band, same manufacturer, same type of UAV respectively. |
DefensiveInterference | PS The Systemhas interference capabilities of 900MHz, 433Mhz;
1.5ghz, 2.4ghz, 5.8ghz; 5.2Ghz and other customized frequency
bands, and covers most of the UAV communication available in
market. |
Remote OAM | After turning on the fully self-movable defense, it can enter
unattended mode, detect, and strike autonomously. And a variety of
OAM features are available when used with the remote server,
including firmware updating, resetting, status inquiry,
self-testing, parameter configuration, and more. |
GPS | The Systemcan detect its current position using its built-in GPS. |
Networking | The Systemcan network multiple devices through the cloud server,
observe the online/abnormal status of each device, and control the
device remotely through the mobile terminal (mobile phone IPAD),
including but not limited to viewing the operating interface of the
device system, receiving alarm information, viewing the black and
whitelist, and turning on defense functions. |
Data security | Use certificate management and data encryption between the
equipment and server to ensure data reliability and security. |
![]() |