U-PROX SE keypad
Universal SE series reader with OSDP and keypad
Anti-vandal reader with OSDP
Protect access control system identifiers from cloning and data spoofing
All keys in your smartphone
Your smartphone can become an electronic key for access to the premises.
Contactless active identifier for authorizing users of the access control system in hands-free mode.
It can work in two modes:
Contactless active identifier for vehicle authorization in the access control system
Reader configuration with mobile app
Full configuration of the reader from the mobile application
Photos and videos
Contact partner companies to purchase or install security and automation devices.
Become an official distributor, reseller or installer of U-PROX security and safety systems.
Generation | Second edition of U-PROX SmartLine Readers |
---|---|
Mifare®, 13.56 MHz |
ISO14443A, 4, 7, 10 bytes UID: Mifare®Classic 1K/4K Mifare®Standard Mifare®Ultralight Mifare®Hi-Memory Mifare® Plus S 2K Mifare® Plus S 4K Mifare® Plus SE 1K Mifare® Plus X 2K Mifare®Plus X 4K Mifare®Plus EV1 2K Mifare® Plus EV1 4K Mifare® DESfire Mifare® DESfire EV1 Mifare® DESfire EV2 |
NFC, 13.56 MHz | U-PROX ID (Android only) |
Payment cards |
PayPass PayWave Cards in Apple Wallet Cards in Google Wallet |
RFID, 125 kHz |
ASK FSK |
2.4 GHz mobile ID |
U-PROX ID U-PROX Tag U-PROX Auto Tag |
Read range |
NFC, Mifare and RFID 125 kHz - up to 4 cm, 2.4 GHz mobile ID - adjustable 10 cm - 12 m |
Power | +9...+15 VDC, consumption < 80 mA |
Interfaces |
Wiegand Auto, 26, 32, 34, 37, 40, 42, 56, 58, 64, 80 bits, RS-232, TouchMemory, OSDP v 2.2 |
Wiring and distance |
8 wire cable: TouchMemory - up to 30 m, Wiegand - up to 150 m, OSDP - up to 1000 m |
Dimensions | 106.3 x 74,3 x 14 mm |
Weight | 210 gramms |
Case colour | steel |
Case material | 1.2 mm stainless steel |
Ambient |
IP65, -40°С to +60°С |
Firmware |
30.хх - аll in one firmware Update via NFC (Android only) |
Proximity sensor | metal detector |
Complete set |
1. U-PROX SE steel; 2. Mounting kit; 3. Quick start guide |
U-PROX SE steel – the adjustable universal vandal resistant SmartLine reader for mobile credentials and proximity identifiers.
In conjunction with the U-PROX ID application and mobile identifiers U-PROX IDs allow any access control system to use smartphones as access system credentials.
1. Make small recess or hole (diameter is 14 mm) to connect cable under the reader’s case
2. Carry out wiring to the control panel
3. Mount the reader on the wall using supplied plastic dowels and screws
Installation on the metal surfaces may cause decrease of reading range.
Do not place readers closer than 20 cm one from another. It is possible to install two readers at a distance 10-15 cm of each other when their yellow wires (Hold/Sync) interconnected. This synchronizes the work of the readers, they will work alternately.
Seamless and easy connection to existing and new access systems, due to the OSDP, Wiegand 26, 32, 34, 37, 40, 42, 56, 58, 64, 80 bits interfaces, Wiegand with automatic selection, RS232 and TouchMemory supports.
We recommend to use multi-core signal cable with 0.22 mm2 cross-section of each wire between reader and panel.
The reader connection wires functions are listed in the table.
We recommended to use following whiring when reader connected to the control panel with twisted pair.
The reader connection wires functions are listed in the table.
We recommended to use following whiring when reader connected to the control panel with twisted pair.
The reader connection wires functions are listed in the table.
The reader connection wires functions are listed in the table.
We recommended to use following whiring when reader connected to the control panel with twisted pair.
With the free mobile application U-Prox Config, the reader can be completely adjusted — from the indication to the encryption modes.
The reader is supplied without the engineering password for programming specified. To connect and (re) set the password — connect inputs D0 (green) and D1 (white) with each other and apply power to the reader.
Warning!!! The reader firmware can be updated with an NFC-enabled Android smartphone only.
Reader supports digital personal mobile credential. It is processed and stored in the user’s smartphone using the U-PROX ID application. It can be transferred over NFC and/or 2.4 GHz radio between the reader and the smartphone.
Reader supports hardware active mobile identifiers U-PROX Tag and U-PROX Auto Tag.
Reader supports 3 operation modes for smartphones with U-Prox ID:
Free mobile application U-PROX ID receives, stores and transmits mobile credentials between the reader and the smartphone.
You can purchase mobile IDs from our dealers
The reader supports 125 kHz cards with amplitude (ASK – EmMarine, etc.) and frequency modulation (FSK – Temik, etc.)
These cards do not have cloning protection, but are very popular due to their low cost
The reader supports work with Mifare® cards, reads encrypted identifiers with a user-assigned card number, with a static or diversified encryption key.
Up to five encryption profiles can be used simultaneously.
The least secure series of cards, has a Crypto 1 (SL1) encryption algorithm vulnerability.
When using it, it is recommended to encrypt all card sectors with a diversified encryption key.
The reader supports SL1 and SL3 modes for Mifare®Plus. It is recommended to use SL3 mode as it has the highest security and AES encryption algorithm.
The reader supports Mifare DESFire EV1, EV2 and EV3 cards. AES encryption algorithm is supported.
Warranty for U-PROX devices (except batteries) is valid for two years after the purchase date. If the device operates incorrectly, please contact support@u-prox.systems at first, maybe it can be solved remotely.
Completed SIA OSDP Verified program for secure profile and added to OSDP Verified product list
Quick start guide
Certifiacte of conformity RED
Declaration of conformity RoHS
Latest firmware
Lifestyle photos
Photos for online shops
You can buy U-Prox equipment from our partners.
Everything that is in U-PROX, from the idea to the engineering implementation is done exclusively in Ukraine.
Yes, if the security system uses the U-PROX PIR Cam detector with photo fixation.
Thanks to it, users of the U-PROX Home mobile application can receive a photo from the detector at any time by pressing one button.
Also, when a photo is received on request, it is possible to save it to the user’s smartphone photo gallery and enlarge it if necessary.
The owner of the security system can also configure permissions to send photos in case of alarm to security companies.
You can prevent water leaks in your apartment or house thanks to automation devices from U-PROX. The flood prevention system warns you of an unwanted water leak in the U-PROX Home app and automatically shuts off the water supply in case of a pipe burst or a malfunction of the washing machine.
The smart valve control and power supply device allows you to automatically shut off/open the water supply when arming/disarming the room.
You can also create personalized schedules for arming/disarming/operating the relay/water valve.
It is reliable communication that distinguishes the U-PROX security system from its competitors. We use DSTU GOST28147-89 encryption with reverse gamma, 256-bit key (3DES level).
Any of our radio devices operates in the notification (notification) mode, not polling, that is, as soon as an event occurs, it is immediately transmitted to U-PROX. In turn, the security center confirms the reception of the data packet by sending a response. The communication is two-way, imitation-resistant: the packet contains the detector serial number and the packet sequence number, which makes it impossible to replace the detector or send the same data packet by an intruder.
The detector periodically sends data about its status to U-PROX, notifying that it is “alive”. We call this a “heartbit”. In response, it receives confirmation and additional commands.
If the detector is installed in a place with poor conditions, it is used:
In turn, the basic U-PROX device has 2 transceivers that work simultaneously to receive signals on different channels and speeds. And of course, there is a definition of radio jamming.
The sensors are powered by their own batteries.
And the U-PROX security center is equipped with a lithium-ion battery, which will provide autonomous power for 24 hours.
And if this is not enough, then you can use the design feature of U-PROX devices – an input power supply 12V DC, which means that an external uninterruptible power supply can be used, or a car battery, then the autonomous life can be increased, even up to several weeks.
Your device communicates with the security company via two GPRS/LTE channels and the Internet – Wi-Fi or Ethernet.
If you try to “jam” or somehow block the communication channel, U-PROX will send a signal about it.
If the animal is no more than 25 kg, then we will install special sensors that do not react to such animals, it is not required to restrict pets in movement.
If the animal is large, then we recommend allocating a space for it in the room, where sensors that react to movement will not be installed, there you can install a sensor that responds to glass breakage, or sensors for opening doors and windows.
Most of the sensors are powered by lithium batteries. They have sufficient capacity and operating temperature range.
Thanks to the adaptive power of the radio transmitters and the optimized data transmission protocol, the service life can be up to 7 years. The shortest service life of alkaline batteries “finger” or AAA, which are installed in the keyboard – up to 2 years.
But the replacement does not even require a screwdriver, the keyboard is removed using a regular plastic discount or bank card.
Modern systems work via an Internet connection, this is mobile Internet in LTE networks or fixed cable.
U-PROX uses both connections, thus providing data transmission redundancy to the monitoring station in case of blocking or jamming of GSM-communication or cable breakage.
Control of communication with the device is provided by the monitoring panel.
We use a proprietary technology called “U-PROX BAND”, it operates in the 868.0-868.6 MHz frequency range allocated for such systems and transmitter powers allowed without licensing up to 25 MW in the basic device, up to 20 mW in detectors, 10 mW in key fobs, with dynamic adjustment (the first exchange attempt is always at minimum power).
U-PROX BAND has significant advantages over its competitors: the length of the packets transmitted over the air is almost two times less, the optimized retry algorithm (this is energy consumption), the sensitivity of the detector receivers is higher (this is the range both in line of sight and in building conditions). The U-PROX security center has two transceivers operating at different frequencies in the permitted range, providing redundant data transmission from sensors.
One of the “tricks” of U-PROX BAND is the function of updating the software of all elements over the air. If any shortcomings are corrected or the functionality of the device is added, then the owner and the security company do not need to worry about dismantling, sending for an update. The update will occur automatically after the automatic update of the basic device.
The security group is a logically independent unit in the security system.
It combines a group of sensors, which is placed and removed from protection separately and independently of others.
This can be done by a user who is authorized to manage a specific group.
This is a function that can work in any of the security groups.
It is implemented as follows. Consider the example of the house. When people put guards in this mode, the sensors that protect the perimeter: doors, windows, or even the entire first floor – become active. Other sensors – indoors – inactive. So, you can move freely inside the room, and intrusion from the outside will be detected.
You can install the U-PROX Security System even if you have no wired internet.
Since the backup communication source is the LTE/GSM network (the mobile operator card is installed).
But in this case, you lose one of the communication channels.
Wi-Fi is a wireless technology for connecting devices to the wired Internet.
It is implemented in the all security centers (hubs).
The central unit in this case can be placed anywhere.
This is implemented using cloud technology.
With the security panel, the system works directly, “without intermediaries”.
With the user’s smartphone, the mediator is the cell of the device in the cloud, through which events are displayed on the smartphone and control commands from the user are passed.
If the phone is out of network, the security system remote control and watch events will not work.
But you can get an alarm notification if you set up a call from the device to the user’s phone. This mode is indispensable if the system operates autonomously, without remote monitoring.
We advise you to entrust security only to specialized companies, which will monitor your facility 24/7 and respond in case of alarm notification.
U-PROX is the best wireless device for remote protection.
Everything that is in U-PROX, from the idea to the engineering implementation is done exclusively in Ukraine.
The U-PROX security system has a refined design.
As standard, the case of devices is executed in white or black color.
For WDC sensors, the white starter kit includes replaceable dark brown housings.
The use of mobile applications U-PROX Home and U-PROX Installer allowed to separate system settings and management.
The U-PROX Home application is used to control the U-PROX security system. The application implements the required set of functions:
U-PROX Installer is used to configure the security system. Through an application is performed the primary activation of the sensors
PACS — Physical Access Control System —an access control and management system is a set of hardware and software control and management tools.
The main goal is to restrict and register the entry-exit of objects in a given area through “points of passage”: doors, gates, etc.
The main task is to control access to a given territory (who to let in, at what time and to what territory), including also:
Areas of application have a wide range of ACS:
An identifier is the basic element of an access control system that stores a code.
Each client is assigned a specific key (code), which serves to determine the owner’s rights – identification.
A card, a key fob, a tag can perform the function of an identifier.
The control panes is the “brain” of the system, which determines whether or not the owner of the identifier is allowed to enter the door.
It has a built-in memory that stores identifier codes with a list of access rights for each of them.
When a person presents (brings to the reader) an identifier, the code read from it is compared with the one stored in the database, on the basis of which a decision is made to open the door.
A reader is a device that reads the code (key) of the identifier and transmits it to the controller.
Open formats JSON and SOAP (XML) allow interaction between different applications, exchange data with access control systems and create applications that complement and extend the standard functionality of the U-PROX Web system.
API capabilities:
U-PROX WEB provides a full range of solutions for quick installation, configuration and daily use of IP ACS by enterprises of any size, from a small office to a large company with many branches.
U-PROX Web has a full-featured web interface with fine-tuning of all ACS capabilities and provides the ability to monitor events, configure equipment, manage personnel access, and generate reports.
You can buy U-Prox equipment from our partners.
15 years ago massively used wired phones, mobile phones were either business or luxury. Now almost everyone has mobile phones. It’s not only comfortable. The quality of wireless communication is steadily increasing.
The same situation with security systems. Wired systems require high-quality cable, trained personnel with electrical education, quality installation with line inspection, construction work with drilling, wiring, and other inconveniences. All this requires a lot of time.
As a result, we have a total cost which includes work. And compared with wireless systems, it is much higher. The wireless security system can be installed independently, the kit includes everything you need for installation.
The U-PROX security system has U-PROX BAND radio communication technology. It has unsurpassed characteristics in range, resistance to interference, due to channel redundancy, and is very efficient in terms of energy consumption.
It is very easy to install the U-PROX security system. Everything you need for installation: screws, fasteners, come complete with each sensor. The devices have simple mounts. Installation of the sensors to the required space can be done using screws or using two-way tape.
The overall security system installation will take about 10-15 minutes.It is very easy to install the U-PROX security system.
Everything you need for installation: screws, fasteners, come complete with each sensor. The devices have simple mounts.
Installation of the sensors to the required space can be done using screws or using two-way tape.
The overall security system installation will take about 10-15 minutes.