| Sign In | Join Free | My futurenowinc.com |
|
| Categories | Drone GPS Spoofing |
|---|---|
| Brand Name: | Polaris |
| Model Number: | Hobit M2s |
| Certification: | CE,ISO9002 |
| Place of Origin: | Shenzhen,China |
| MOQ: | 1 |
| Price: | Negotiation |
| Payment Terms: | T/T, Paypal , Etc. |
| Supply Ability: | 50 Pcs/month |
| Delivery Time: | In 7 -14 works day |
| Packaging Details: | Durable case or box |
| Name: | Polaris Hobit M2 |
| Operating band: | 4G and 5G |
| Start-up time: | 40s; |
| Equipment volume: | 242mm*190mm*66mm |
| Detection range: | ≤300 meters |
| Transmission power: | 20W |
| Company Info. |
| Shenzhen Polaris Security Technology Co., Ltd. |
| Verified Supplier |
| View Contact Details |
| Product List |
1.2 GHz And 1.5 GHz UVA GPS Spoofing Devices Compact Navigation Jamming Systems
Introduction
The 1.2 GHz And 1.5 GHz UVA GPS Spoofing Devices Compact Navigation Jamming Systems with drone swarm track history playback and anti-drone detection system is a new generation of DW direction finding products independently developed by our company. It adopts industry-leading 4G/5G multi-frequency concurrent solution with integrated and integrated design, which can realize accurate DW and coded acquisition of mobile terminals in 4G and 5G networks. The device is characterized by full-band coverage, high power, wide detection range, lightweight design and strong concealment, which is very suitable for the relevant departments to use in complex environments.
Basic
Function | Description | ||
Defensive Interference | Interferable frequency bands | 900MHz, 433Mhz; 1.5ghz, 2.4ghz, 5.8ghz; 5.2Ghz | |
other customized frequency bands | |||
Remote OAM | Unattended Mode | Automatic detection and strike | |
A variety of OAM features | Firmware updating | used with the remote server | |
Reset, status inquiry | |||
Self-testing | |||
Parameter configuration | |||
Networking | Multi-device networking | observe the online / abnormal status of each device | |
Remote control through mobile terminals | viewing the operating interface of the device system | ||
receiving alarm information | |||
viewing the black and whitelist | |||
turning on defense function | |||
Data security | High reliability and security | certificate management and data encryption | |
Features
|