Frequency Range: | 20Hz---20kHz |
---|---|
Frequency: | 20Hz---20kHz |
Application: | Conference Center |
Suppliers with verified business licenses
Audited by an independent third-party inspection agency
The "Concealed" Recording Shield is a highly integrated high-tech security product developed by AL ASAR TECH. When a criminal uses a recording device (such as a mobile phone, voice recorder, recorder, etc.) to record you, the recording mask produces a random noise signal that can suppress the interference of the voice signal, so that the recording device can only pick up Noise information, and can not distinguish voice information, thus ensuring the security of voice information.
Item | performance parameter |
Shielding type | Mobile phones, recording pens and other sound acquisition devices |
Shielding distance | >2.5m (shielding distance of different recording equipment is different) |
Function angle | >120 degree |
Opening mode | remote control |
Remote control distance | >10m |
Battery Capacity | 8000mah/12v |
size | 283*133*157mm |
weight | 1.5kg |
ambient temperature | -40ºC~55ºC |
relative humidity | 35~85% |
The power adapter | AC 100V~240V DC 12v 5A |
Packing instructions | Protective box |
leading offices, secret meeting rooms, business negotiation rooms,
powered by
This product uses two power supply modes: power adapter and battery.
1. When the adapter is powered. Simply plug the power adapter into the power and charging ports of Figure 2.
2. This product has 8000Mha battery, which is used to power the battery without power adapter.
use
After checking the product, check the package first: one host; one remote control; one power adapter
1. Turn on the power switch of Figure 2, the power indicator lights up, and the machine enters the standby state;
2. Press the unlock button of the remote control to turn on the machine, press the lock button of the remote control to turn off the machine and enter the standby state.
3. Turn off the power switch in Figure 2 and disconnect the power from the machine.
Note: The built-in large-capacity battery has a working time of more than 19 hours. It is recommended to use the battery if it has electricity.
As shown in Figure 1, the transmitter is at the front of the machine. For best shielding, adjust the position and angle according to the actual situation. For details, see Figure 3. As shown in Figure 3, for general recording equipment, the cutoff distance of this product is about 1.5 meters, and the cutoff angle is about 90 degrees. The distance and angle may vary for different recording devices. Some models have a distance greater than 2 meters and an angle greater than 120 degrees, but a few models may have a distance of less than 1 meter and an angle of less than 60 degrees.
The higher the end of the general model, the better the effect. When using, please try to make the distance between the transmitter's transmitting end and the recording device within 1.5 meters. The angle (mainly the MIC port) is within 45 degrees. The closer the distance is, the smaller the angle is, the better the cutting effect is.
Please note that the above data is obtained without any barrier between the transmitter and the recording device (such as clothes, body, etc.). In the case of blocking, the cutting distance will be shortened.
The recording jammer uses a high-security encryption algorithm to generate random high-power interference signals.
The frequency range of the interference signal is within the receiving range of the pickup of the recording device.
When the recorder conducts illegal recording, the pickup can pick up the interference signal while picking up the voice signal.
The intensity of the interference signal is much greater than the voice signal, and even exceeds the maximum received power threshold of the pickup. This will form a suppressive interference to the voice signal, and even cause the pickup to fail to work normally, so that the pickup can only pick up a piece of noisy noise information.
The signal source that generates the interference signal is an encrypted random random sequence, so the original voice information cannot be restored through related technologies, and the purpose of protecting the voice information and eliminating the hidden danger of eavesdropping is achieved.