How Convexum Works
Convexum uses radio frequency sensors to detect the presence of a drone and determine the drone make and model based with reference to their drone database. Where a RPA is deemed to be a threat, these systems use protocol manipulation techniques to take control of the RPA and land it in a predetermined location. Protocol manipulation, also known as spoofing, involves manipulating the RPA command protocol by sending it signals and deceiving it to believe that the system is the actual RPA controller. This allows the system to assume the rights of the pilot, take control of it, and counter its current actions.
Convexum can detect drones that are turned on within the protected perimeter and use protocol manipulation to send signals to the drone that will prevent it from taking off. Where a drone flies into a protected perimeter, the Convexum system uses protocol manipulation to take over control of the drone and send it to a predefined safe landing location. Convexum’s radio frequency (RF) sensor has an effective range of up to 1.5km, are simple to install with a one cable connection and does not interfere with existing RF signals in the environment. Like all radio frequency (RF) based detection systems, Convexum maintains a drone database that includes 80% of the consumer drones on the market with new models added every system update.
The Convexum software interface is intuitive, easy to use, and consists of a full dashboard with incident logging, has easy to establish no-fly zones, can be set to automatically or manually respond to a threat, and integrates into existing systems.