Product Details
Place of Origin: China
Brand Name: jindowin
Certification: Design Patent Certificate,Computer Software Copyright Registration Certificate,Utility Model Patent Certificate,Testing Report of Lightning Protection Products Testing Center of Shanghai Lightning Protection Center, etc.
Model Number: JDY-2000
Payment & Shipping Terms
Minimum Order Quantity: 1
Price: $ 35714
Packaging Details: Flight Case
Delivery Time: 30 days
Payment Terms: T/T,D/A,L/C,D/P,Western Union,MoneyGram
Supply Ability: 200 per month
|
Product Name:
|
Fixed Uav Detection, Jamming & Deception System
|
Core Tech:
|
Passive Detection, 4-Sector Strike, Gnss Deception
|
Detection Freq:
|
300MHz~6000MHz; 100MHz~6000MHz (Partial)
|
Key Detection Bands:
|
2.4G/5.8g/400MHz/800MHz/900MHz/1.4GHz
|
Detection Dist:
|
1~5km; 1~12km (Jdy-2000p)
|
Jamming Bands:
|
2.4G/5.2g/5.8g/GPS/Bds/Glonass/Galileo
|
Jamming Dist:
|
1~3km; 1~5km (Jdy-2000p)
|
Deception Signals:
|
GPS/Bds/Glonass/Galileo
|
Deception Dist:
|
500~1000m
|
Transmission Power:
|
500W; ≤2000W (Jdy-2000p Total)
|
Power Supply:
|
AC220V→DC24V; DC27V (Partial)
|
Weight:
|
≤15kg; ≤50kg (Jdy-2000p)
|
Operating Temp:
|
-35ºC~50ºC (Built-in Radiator)
|
Protection Level:
|
IP66
|
Positioning Accuracy:
|
≤10m (Uav); ≤5m (Operator)
|
|
Product Name:
|
Fixed Uav Detection, Jamming & Deception System
|
|
Core Tech:
|
Passive Detection, 4-Sector Strike, Gnss Deception
|
|
Detection Freq:
|
300MHz~6000MHz; 100MHz~6000MHz (Partial)
|
|
Key Detection Bands:
|
2.4G/5.8g/400MHz/800MHz/900MHz/1.4GHz
|
|
Detection Dist:
|
1~5km; 1~12km (Jdy-2000p)
|
|
Jamming Bands:
|
2.4G/5.2g/5.8g/GPS/Bds/Glonass/Galileo
|
|
Jamming Dist:
|
1~3km; 1~5km (Jdy-2000p)
|
|
Deception Signals:
|
GPS/Bds/Glonass/Galileo
|
|
Deception Dist:
|
500~1000m
|
|
Transmission Power:
|
500W; ≤2000W (Jdy-2000p Total)
|
|
Power Supply:
|
AC220V→DC24V; DC27V (Partial)
|
|
Weight:
|
≤15kg; ≤50kg (Jdy-2000p)
|
|
Operating Temp:
|
-35ºC~50ºC (Built-in Radiator)
|
|
Protection Level:
|
IP66
|
|
Positioning Accuracy:
|
≤10m (Uav); ≤5m (Operator)
|
This system employs advanced network deception and channel simulation technology to realistically simulate remote controller or ground control station signals, enabling network deception and intrusion control of target drones. By precisely replicating communication protocols, frequency modulation methods, and encryption modes, the system can gradually take over drone flight permissions without triggering alarms. Whether it's a commercial drone, an aerial photography drone, or a positioning-enhanced industrial drone, this system can use protocol simulation, GPS deception, and telemetry data countermeasures to force a return to home, make an emergency landing, or hover, ensuring area security is not threatened.
![]()
| Parameters | Content |
|---|---|
| Model | Anti-Drone Deception and Defense System |
| Deception Signal System | GPS/BDS/GLONASS/Galileo |
| Deception Distance | 1-3KM |
| Operating Frequency Range | 300 MHz–6 GHz |
| Deployment Form | Fixed |
| Response Speed | Millisecond-level signal injection |
| Operating Mode | Fully automatic/remote manual control |
| Product Dimensions | 450*450X*850mm |
| Product Weight | 15KG |
| Operating Environment | -30℃ to +55℃, all-weather operation |
The system adopts a modular architecture design, allowing for rapid adjustment of deployment methods according to application requirements. Users can choose fixed site installation, vehicle-mounted deployment, or portable mobile construction solutions to achieve multi-dimensional protection capabilities from area defense to tactical emergency response. The modular design supports extended frequency bands, signal protocols, detection ranges, and control logic, enabling the system to have long-term upgradeability to adapt to future changes in drone communication and navigation technologies.
This system is particularly suitable for sensitive areas such as military bases, border outposts, artillery testing areas, airport no-fly zones, and critical energy facilities. Through real-time spectrum analysis and intelligent identification algorithms, the system can instantly detect drones entering its threat radius and execute targeted deception or jamming operations, effectively blocking reconnaissance, intelligence gathering, or potential attack activities.
The portable version features a lightweight design, allowing for deployment by a single soldier within minutes. It supports on-site disassembly and assembly, mobile switching, and emergency combat scenarios, making it particularly suitable for temporary security checks, field missions, convoy escorts, and tactical patrols, enabling mobile drone countermeasures and ensuring the safety of critical mission execution.