U-PROX SE steel

Anti-vandal reader with OSDP

Vandal resistant case
Mobile Identification
Protection against cards forgery
Top ID formats
Adjustable from smartphone
OSDP Verified
Compatible most ACS

Protection against cards forgery

Protect access control system identifiers from cloning and data spoofing

    • Mifare Desfire EV1, Mifare Desfire EV2, Mifare Desfire EV3
    • AES encryption
    • SL1 and SL3 support
    • AES encryption
    • Special algorithm to avoid vulnerability in Crypto 1
    • Encrypted container with data in U-PROX ID
    • Data protection based on smartphone security
    • Secure communication channel
    • OSDP v2.2
    • OSDP Verified
    • OSDP Secure profile
    • AES encryption

Mobile identification

All keys in your smartphone

Reading U-Prox ID

Your smartphone can become an electronic key for access to the premises.

  • Opening up close and at a distance of up to 15m via BLE
  • Opening up close via NFC (Android only)
  • Receiving and storing identifiers
  • Identifier backup
  • Remote door opening in the cloud access system

Reading U-PROX Tag

Contactless active identifier for authorizing users of the access control system in hands-free mode.

It can work in two modes:

  • Hands-free and button
  • Button only

Reading U-PROX Auto Tag

Contactless active identifier for vehicle authorization in the access control system

Configuration from your smartphone

Reader configuration with mobile app

Full configuration of the reader from the mobile application

  • Indication
  • Output interfaces
  • Allowed types of identifiers
  • Encryption keys
  • Mobile identification modes
  • Updating firmware
  • Saving configuration templates

Lifestyle gallery

Photos and videos

Certificates

Related products

Want to buy?

Contact partner companies to purchase or install security and automation devices.

Want to sell?

Become an official distributor, reseller or installer of U-PROX security and safety systems.

TECHNICAL SPECIFICATIONS

Generation Second edition of U-PROX SmartLine Readers
Mifare®, 13.56 MHz ISO14443A, 4, 7, 10 bytes UID:
Mifare®Classic 1K/4K
Mifare®Standard
Mifare®Ultralight
Mifare®Hi-Memory
Mifare® Plus S 2K
Mifare® Plus S 4K
Mifare® Plus SE 1K
Mifare® Plus X 2K
Mifare®Plus X 4K
Mifare®Plus EV1 2K
Mifare® Plus EV1 4K
Mifare® DESfire
Mifare® DESfire EV1
Mifare® DESfire EV2
NFC, 13.56 MHz U-PROX ID (Android only)
Payment cards PayPass
PayWave
Cards in Apple Wallet
Cards in Google Wallet
RFID, 125 kHz ASK
FSK
2.4 GHz mobile ID U-PROX ID
U-PROX Tag
U-PROX Auto Tag
Read range NFC, Mifare and RFID 125 kHz - up to 4 cm,
2.4 GHz mobile ID - adjustable 10 cm - 12 m
Power +9...+15 VDC, consumption < 80 mA
Interfaces Wiegand Auto, 26, 32, 34, 37, 40, 42, 56, 58, 64, 80 bits,
RS-232,
TouchMemory,
OSDP v 2.2
Wiring and distance 8 wire cable:
TouchMemory - up to 30 m,
Wiegand - up to 150 m,
OSDP - up to 1000 m
Dimensions 106.3 x 74,3 x 14 mm
Weight 210 gramms
Case colour steel
Case material 1.2 mm stainless steel
Ambient IP65,
-40°С to +60°С
Firmware 30.хх - аll in one firmware
Update via NFC (Android only)
Proximity sensor metal detector
Complete set 1. U-PROX SE steel;
2. Mounting kit;
3. Quick start guide
Color

U-PROX SE steel User manual

Description

U-PROX SE steel – the adjustable universal vandal resistant SmartLine reader for mobile credentials and proximity identifiers.

In conjunction with the U-PROX ID application and mobile identifiers U-PROX IDs allow any access control system to use smartphones as access system credentials.

Installation

1. Make small recess or hole (diameter is 14 mm) to connect cable under the reader’s case

 

2. Carry out wiring to the control panel

3. Mount the reader on the wall using supplied plastic dowels and screws

Installation on the metal surfaces may cause decrease of reading range. 

Do not place readers closer than 20 cm one from another. It is possible to install two readers at a distance 10-15 cm of each other when their yellow wires (Hold/Sync) interconnected. This synchronizes the work of the readers, they will work alternately.

Connection

Seamless and easy connection to existing and new access systems, due to the OSDP, Wiegand 26, 32, 34, 37, 40, 42, 56, 58, 64, 80 bits interfaces, Wiegand with automatic selection, RS232 and TouchMemory supports.

We recommend to use multi-core signal cable with 0.22 mm2 cross-section of each wire between reader and panel.

Wiegand

The reader connection wires functions are listed in the table.

We recommended to use following whiring when reader connected to the control panel with twisted pair.

OSDP

The reader connection wires functions are listed in the table.

We recommended to use following whiring when reader connected to the control panel with twisted pair.

RS-232

The reader connection wires functions are listed in the table.

TouchMemory

The reader connection wires functions are listed in the table.

We recommended to use following whiring when reader connected to the control panel with twisted pair.

Configuration

With the free mobile application U-Prox Config, the reader can be completely adjusted — from the indication to the encryption modes.

The reader is supplied without the engineering password for programming specified. To connect and (re) set the password — connect inputs D0 (green) and D1 (white) with each other and apply power to the reader.

Warning!!! The reader firmware can be updated with an NFC-enabled Android smartphone only.

Mobile identification

Reader supports digital personal mobile credential. It is processed and stored in the user’s smartphone using the U-PROX ID application. It can be transferred over NFC and/or 2.4 GHz radio between the reader and the smartphone.

Reader supports hardware active mobile identifiers U-PROX Tag and U-PROX Auto Tag.

Reader supports 3 operation modes for smartphones with U-Prox ID:

  • “Door-Proximity” – 10-20 cm, reader activates by built-in proximity sensor. Recommended for double-sided doors and turnstiles
  • “Door” – up to 60-70 cm
  • “Barrier/Gate” – adjustable range of interaction from 1 to 12 m.

U-PROX ID application

Free mobile application U-PROX ID receives, stores and transmits mobile credentials between the reader and the smartphone.

How to obtain mobile ID

You can purchase mobile IDs from our dealers

RFID, 125 kHz 

The reader supports 125 kHz cards with amplitude (ASK – EmMarine, etc.) and frequency modulation (FSK – Temik, etc.)

These cards do not have cloning protection, but are very popular due to their low cost

Mifare® identifiers

The reader supports work with Mifare® cards, reads encrypted identifiers with a user-assigned card number, with a static or diversified encryption key.

Up to five encryption profiles can be used simultaneously.

Mifare®Classic

The least secure series of cards, has a Crypto 1 (SL1) encryption algorithm vulnerability.

When using it, it is recommended to encrypt all card sectors with a diversified encryption key.

Mifare®Plus

The reader supports SL1 and SL3 modes for Mifare®Plus. It is recommended to use SL3 mode as it has the highest security and AES encryption algorithm.

Mifare®Defire

The reader supports Mifare DESFire EV1, EV2 and EV3 cards. AES encryption algorithm is supported.

Warranty

Warranty for U-PROX devices (except batteries) is valid for two years after the purchase date. If the device operates incorrectly, please contact support@u-prox.systems at first, maybe it can be solved remotely.

13 August 2024
U-PROX SE readers now is OSDP Verified

Completed SIA OSDP Verified program for secure profile and added to OSDP Verified product list

13 August 2024
U-PROX readers firmware update
  • Able to use new bank cards of VISA payment systems as access identifiers
  • Increased reliability of saving the reader settings in case of a connection failure with the U-PROX Config configurator
  • Added support for the new Bluetooth stack, guaranteeing more stable operation via BLE
  • Improved interaction with U-PROX Tag contactless identifiers
  • Updated OSDP protocol to fully support OSDP Verified certification requirements
  • Improved OSDP performance, which allows you to increase the number of compatible devices.

FAQ

Filter
  • You can buy U-Prox equipment from our partners.

    More information on our website.

  • Everything that is in U-PROX, from the idea to the engineering implementation is done exclusively in Ukraine.

  • Yes, if the security system uses the U-PROX PIR Cam detector with photo fixation.

    Thanks to it, users of the U-PROX Home mobile application can receive a photo from the detector at any time by pressing one button.

    Also, when a photo is received on request, it is possible to save it to the user’s smartphone photo gallery and enlarge it if necessary.

    The owner of the security system can also configure permissions to send photos in case of alarm to security companies.

  • You can prevent water leaks in your apartment or house thanks to automation devices from U-PROX. The flood prevention system warns you of an unwanted water leak in the U-PROX Home app and automatically shuts off the water supply in case of a pipe burst or a malfunction of the washing machine.

    The smart valve control and power supply device allows you to automatically shut off/open the water supply when arming/disarming the room.

    You can also create personalized schedules for arming/disarming/operating the relay/water valve.

  • It is reliable communication that distinguishes the U-PROX security system from its competitors. We use DSTU GOST28147-89 encryption with reverse gamma, 256-bit key (3DES level).
    Any of our radio devices operates in the notification (notification) mode, not polling, that is, as soon as an event occurs, it is immediately transmitted to U-PROX. In turn, the security center confirms the reception of the data packet by sending a response. The communication is two-way, imitation-resistant: the packet contains the detector serial number and the packet sequence number, which makes it impossible to replace the detector or send the same data packet by an intruder.

    The detector periodically sends data about its status to U-PROX, notifying that it is “alive”. We call this a “heartbit”. In response, it receives confirmation and additional commands.

    If the detector is installed in a place with poor conditions, it is used:

    • increasing the radio communication power – 3 gradations of the transmitting device power are available,
    • switching the data rate to improve the sensitivity of the receiving path,
    • switching to other (backup) channels in the frequency range of 868.0 … 868.6 MHz.

    In turn, the basic U-PROX device has 2 transceivers that work simultaneously to receive signals on different channels and speeds. And of course, there is a definition of radio jamming.

    1. We believe that this is our future – in 2-3 years, wireless equipment will occupy a large part of the security systems market. Almost everything will be wireless, and prices for such solutions will decrease.
    2. Wireless solutions are fast, convenient, and reliable.
    3. Вo not spoil the interior design and renovation during installation, as require a minimum of installation work.
    4. Minimize the time spent on installing the security system.
    5. U-PROX WDC, U-PROX Wireport, U-PROX Multiplexer  and U-PROX Siren have wired inputs to which wired devices can also be connected.
  • The sensors are powered by their own batteries.

    And the U-PROX security center is equipped with a lithium-ion battery, which will provide autonomous power for 24 hours.

    And if this is not enough, then you can use the design feature of U-PROX devices – an input power supply 12V DC, which means that an external uninterruptible power supply can be used, or a car battery, then the autonomous life can be increased, even up to several weeks.

  • Your device communicates with the security company via two GPRS/LTE channels and the Internet – Wi-Fi or Ethernet.

    If you try to “jam” or somehow block the communication channel, U-PROX will send a signal about it.

  • If the animal is no more than 25 kg, then we will install special sensors that do not react to such animals, it is not required to restrict pets in movement.

    If the animal is large, then we recommend allocating a space for it in the room, where sensors that react to movement will not be installed, there you can install a sensor that responds to glass breakage, or sensors for opening doors and windows.

  • Most of the sensors are powered by lithium batteries. They have sufficient capacity and operating temperature range.

    Thanks to the adaptive power of the radio transmitters and the optimized data transmission protocol, the service life can be up to 7 years. The shortest service life of alkaline batteries “finger” or AAA, which are installed in the keyboard – up to 2 years.

    But the replacement does not even require a screwdriver, the keyboard is removed using a regular plastic discount or bank card.

  • Modern systems work via an Internet connection, this is mobile Internet in LTE networks or fixed cable.

    U-PROX uses both connections, thus providing data transmission redundancy to the monitoring station in case of blocking or jamming of GSM-communication or cable breakage.

    Control of communication with the device is provided by the monitoring panel.

  • We use a proprietary technology called “U-PROX BAND”, it operates in the 868.0-868.6 MHz frequency range allocated for such systems and transmitter powers allowed without licensing up to 25 MW in the basic device, up to 20 mW in detectors, 10 mW in key fobs, with dynamic adjustment (the first exchange attempt is always at minimum power).

    U-PROX BAND has significant advantages over its competitors: the length of the packets transmitted over the air is almost two times less, the optimized retry algorithm (this is energy consumption), the sensitivity of the detector receivers is higher (this is the range both in line of sight and in building conditions). The U-PROX security center has two transceivers operating at different frequencies in the permitted range, providing redundant data transmission from sensors.

    One of the “tricks” of U-PROX BAND is the function of updating the software of all elements over the air. If any shortcomings are corrected or the functionality of the device is added, then the owner and the security company do not need to worry about dismantling, sending for an update. The update will occur automatically after the automatic update of the basic device.

  • The security group is a logically independent unit in the security system.

    It combines a group of sensors, which is placed and removed from protection separately and independently of others.

    This can be done by a user who is authorized to manage a specific group.

  • This is a function that can work in any of the security groups.

    It is implemented as follows. Consider the example of the house. When people put guards in this mode, the sensors that protect the perimeter: doors, windows, or even the entire first floor – become active. Other sensors – indoors – inactive. So, you can move freely inside the room, and intrusion from the outside will be detected.

  • You can install the U-PROX Security System even if you have no wired internet.

    Since the backup communication source is the LTE/GSM network (the mobile operator card is installed).

    But in this case, you lose one of the communication channels.

  • Wi-Fi is a wireless technology for connecting devices to the wired Internet.

    It is implemented in the all security centers (hubs).

    The central unit in this case can be placed anywhere.

  • This is implemented using cloud technology.

    With the security panel, the system works directly, “without intermediaries”.

    With the user’s smartphone, the mediator is the cell of the device in the cloud, through which events are displayed on the smartphone and control commands from the user are passed.

  • If the phone is out of network, the security system remote control and watch events will not work.

    But you can get an alarm notification if you set up a call from the device to the user’s phone. This mode is indispensable if the system operates autonomously, without remote monitoring.

    We advise you to entrust security only to specialized companies, which will monitor your facility 24/7 and respond in case of alarm notification.

    U-PROX is the best wireless device for remote protection.

  • Everything that is in U-PROX, from the idea to the engineering implementation is done exclusively in Ukraine.

    1. Modern energy-saving technologies allow you to not think about replacing batteries for several years (2-7 years).
    2. 2 weeks before the full discharge, the security system will warn you and the service security organization about the discharge.
    3. Popular battery sizes are used ААА, CR2, CR123A і CR2032.
  • The U-PROX security system has a refined design.

    As standard, the case of devices is executed in white or black color.

    For WDC sensors, the white starter kit includes replaceable dark brown housings.

  • The use of mobile applications U-PROX Home and U-PROX Installer allowed to separate system settings and management.

    The U-PROX Home application is used to control the U-PROX security system. The application implements the required set of functions:

    • Arming.
    • Disarming.
    • Arming in night mode.
    • Alarm button.
    • Event history with simple filters.
    • View temperature from sensors.
    • Add camcorders with zones.
    • Watch the video from a connected camera.
    • In the event of any failure in the system application, U-PROX brings this information to the home screen, and notify the user via Push message.

    U-PROX Installer is used to configure the security system. Through an application is performed the primary activation of the sensors

  • PACS — Physical Access Control System —an access control and management system is a set of hardware and software control and management tools.

    The main goal is to restrict and register the entry-exit of objects in a given area through “points of passage”: doors, gates, etc.

    The main task is to control access to a given territory (who to let in, at what time and to what territory), including also:

    • restricting access to a given territory;
    • identification of a person who has access to a given territory.
  • Areas of application have a wide range of ACS:

    • company offices, business centers;
    • banks;
    • educational institutions (schools, technical schools, universities);
    • industrial enterprises;
    • protected areas;
    • parking lots;
    • places of passage of vehicles;
    • private houses;
    • residential complexes;
    • cottages;
    • hotels;
    • public institutions (sports complexes, museums, metro, etc.)
  • An identifier is the basic element of an access control system that stores a code.

    Each client is assigned a specific key (code), which serves to determine the owner’s rights – identification.

    A card, a key fob, a tag can perform the function of an identifier.

  • The control panes is the “brain” of the system, which determines whether or not the owner of the identifier is allowed to enter the door.

    It has a built-in memory that stores identifier codes with a list of access rights for each of them.

    When a person presents (brings to the reader) an identifier, the code read from it is compared with the one stored in the database, on the basis of which a decision is made to open the door.

  • A reader is a device that reads the code (key) of the identifier and transmits it to the controller.

  • Open formats JSON and SOAP (XML) allow interaction between different applications, exchange data with access control systems and create applications that complement and extend the standard functionality of the U-PROX Web system.

    API capabilities:

    • Secure data exchange over a computer network.
    • WEB service – the opportunity to interact with any platform and programming environment for SOAP and JSON protocol.
    • Implementation of the user interface using the API.
    • The ability to integrate with other systems and applications implemented by third-party developers.
  • U-PROX WEB provides a full range of solutions for quick installation, configuration and daily use of IP ACS by enterprises of any size, from a small office to a large company with many branches.

    U-PROX Web has a full-featured web interface with fine-tuning of all ACS capabilities and provides the ability to monitor events, configure equipment, manage personnel access, and generate reports.

  • You can buy U-Prox equipment from our partners.

    More information on our website.

    1. Connect wires D0 (green) and D1 (white) with each other
    2. Apply power to the reader
    3. Connect to the reader with application U-Prox Config installed on smartphone.
    4. Select “Settings”
    5. Set a password
    6. Go back
    7. Press “Save Settings”
    8. Press “Disconnect”

  • 15 years ago massively used wired phones, mobile phones were either business or luxury. Now almost everyone has mobile phones. It’s not only comfortable. The quality of wireless communication is steadily increasing.

    The same situation with security systems. Wired systems require high-quality cable, trained personnel with electrical education, quality installation with line inspection, construction work with drilling, wiring, and other inconveniences. All this requires a lot of time.

    As a result, we have a total cost which includes work. And compared with wireless systems, it is much higher. The wireless security system can be installed independently, the kit includes everything you need for installation.

    The U-PROX security system has U-PROX BAND radio communication technology. It has unsurpassed characteristics in range, resistance to interference, due to channel redundancy, and is very efficient in terms of energy consumption.

  • It is very easy to install the U-PROX security system. Everything you need for installation: screws, fasteners, come complete with each sensor. The devices have simple mounts. Installation of the sensors to the required space can be done using screws or using two-way tape.

    The overall security system installation will take about 10-15 minutes.It is very easy to install the U-PROX security system.

    Everything you need for installation: screws, fasteners, come complete with each sensor. The devices have simple mounts.

    Installation of the sensors to the required space can be done using screws or using two-way tape.

    The overall security system installation will take about 10-15 minutes.

Still have questions? Can't find the answer you're looking for?