Product Details
Place of Origin: china
Brand Name: JDY
Model Number: JDY-2000P
Payment & Shipping Terms
Minimum Order Quantity: 1
Price: $57143
Packaging Details: Flight case
Delivery Time: 30days
Payment Terms: T/T
Supply Ability: 200 per month
|
Functions:
|
Protect Public Security
|
Detection Alarm Method:
|
Audible And Visual Alarms
|
Antenna Power Capacity:
|
100W
|
Detection Band:
|
2.4Ghz, 5.8Ghz
|
Gain:
|
3±1dBi
|
Battery Life:
|
Approximately 2 Hours Of Continuous Use
|
Safety Features:
|
Automatic Shut-off To Prevent Overheating
|
Receiver Tech:
|
LekDro 915MHz Rx ELRS
|
Jamming Modes:
|
5 Bands Selectable
|
Frequency:
|
900MHz/1.5Ghz/2.4Ghz/5.8Ghz
|
Usage Method:
|
Integrated Single-Soldier Handheld
|
Frequency Range:
|
2.4 GHz And 5.8 GHz
|
Countermeasure Range:
|
≥1500m
|
Carrying Method:
|
Portable
|
Frequency Band:
|
1.4Ghz-6Ghz
|
|
Functions:
|
Protect Public Security
|
|
Detection Alarm Method:
|
Audible And Visual Alarms
|
|
Antenna Power Capacity:
|
100W
|
|
Detection Band:
|
2.4Ghz, 5.8Ghz
|
|
Gain:
|
3±1dBi
|
|
Battery Life:
|
Approximately 2 Hours Of Continuous Use
|
|
Safety Features:
|
Automatic Shut-off To Prevent Overheating
|
|
Receiver Tech:
|
LekDro 915MHz Rx ELRS
|
|
Jamming Modes:
|
5 Bands Selectable
|
|
Frequency:
|
900MHz/1.5Ghz/2.4Ghz/5.8Ghz
|
|
Usage Method:
|
Integrated Single-Soldier Handheld
|
|
Frequency Range:
|
2.4 GHz And 5.8 GHz
|
|
Countermeasure Range:
|
≥1500m
|
|
Carrying Method:
|
Portable
|
|
Frequency Band:
|
1.4Ghz-6Ghz
|
The Long-Range UAV Detection, Strike, Navigation, and Deception Integrated Equipment is a multi-functional drone defense system designed to counter various drone threats. This equipment boasts powerful frequency band jamming and interception capabilities, supporting radio interference across multiple frequency bands with a wide strike range. By jamming the communication, control, and navigation signals of drones, it effectively prevents them from entering sensitive areas or carrying out malicious missions. Whether it's a small drone flying at low altitude or a large drone flying at high altitude and high speed, this system can effectively identify and strike them, ensuring the safety of the surrounding airspace.
![]()
| Parameter Item | Description |
|---|---|
| Detection Distance | 300MHz-6G |
| Key Detection Frequency Bands | 2.4G/5.8G/400M/800M/900M/1.4G |
| Detection Distance | 1-12KM |
| Positioning Accuracy | <10m |
| Pilot Positioning Accuracy | <5m |
| Response Time | ≤0.25s |
| Interference Frequency Bands | 900M1.5G2.4G5.2G5.8G |
| Interference Distance | >1-5KM |
| Response Time | ≤3s |
| Spoofing Signal System | GPS/BDS/GLONASS/Galileo |
| Spoofing Distance | 1-10KM |
| Product Dimensions | 450*450X*850mm |
| Packaging Dimensions | 960*530*455mm |
| Product Weight | 20KG |
| Total Product Weight | 47KG |
This device possesses powerful data transmission capabilities, enabling real-time transmission of detected UAV information to the command center or other access devices. Through a high-speed data link, detected threat information can reach the target location within seconds, providing timely threat warnings to defense personnel. Encryption technology is employed during data transmission to ensure information security and confidentiality. Users can monitor the UAV's movements in real time through a control terminal and take appropriate protective measures.
This system incorporates highly efficient deception technology, capable of interfering with the UAV's navigation system by generating false signals. When a UAV attempts to rely on navigation signals for positioning and navigation, the deception device can send false signals, causing the UAV to deviate from its original flight path or even become disoriented. This technology is particularly suitable for electronic warfare against enemy UAVs, effectively disrupting their mission execution and achieving strategic objectives.
This device supports large-capacity data storage, allowing it to store various types of detected data in real-time into internal storage units for later analysis and retrospective review. By analyzing historical data, users can identify potential threat patterns, optimize defense strategies, and enhance the system's intelligent identification capabilities. Furthermore, the stored data can be used for further research and technological improvements, helping to develop more advanced defense measures.