U-PROX SL mini
Universal miniature reader






Protection against cards forgery
Protect access control system identifiers from cloning and data spoofing
-
- Mifare Desfire EV1, Mifare Desfire EV2, Mifare Desfire EV3
- AES encryption
-
- SL1 and SL3 support
- AES encryption
-
- Special algorithm to avoid vulnerability in Crypto 1
-
- Encrypted container with data in U-PROX ID
- Data protection based on smartphone security
- Secure communication channel

Mobile identification
All keys in your smartphone
Reading U-Prox ID
Your smartphone can become an electronic key for access to the premises.
- Opening up close and at a distance of up to 15m via BLE
- Opening up close via NFC (Android only)
- Receiving and storing identifiers
- Identifier backup
- Remote door opening in the cloud access system


Reading U-PROX Tag
Contactless active identifier for authorizing users of the access control system in hands-free mode.
It can work in two modes:
- Hands-free and button
- Button only
Reading U-PROX Auto Tag
Contactless active identifier for vehicle authorization in the access control system

Configuration from your smartphone
Reader configuration with mobile app
Full configuration of the reader from the mobile application
- Indication
- Output interfaces
- Allowed types of identifiers
- Encryption keys
- Mobile identification modes
- Updating firmware
- Saving configuration templates

Lifestyle gallery
Photos and videos
Certificates
NEW PRODUCTS
Want to buy?
Contact partner companies to purchase or install security and automation devices.
Want to sell?
Become an official distributor, reseller or installer of U-PROX security and safety systems.
TECHNICAL SPECIFICATIONS
Generation | First edition of U-PROX SmartLine Readers, revision 2 |
---|---|
Mifare®, 13.56 MHz |
ISO14443A, 4, 7, 10 bytes UID: Mifare®Classic 1K/4K Mifare®Standard Mifare®Ultralight Mifare®Hi-Memory Mifare® Plus S 2K Mifare® Plus S 4K Mifare® Plus SE 1K Mifare® Plus X 2K Mifare®Plus X 4K Mifare®Plus EV1 2K Mifare® Plus EV1 4K Mifare® DESfire Mifare® DESfire EV1 Mifare® DESfire EV2 |
NFC, 13.56 MHz | U-PROX ID (Android only) |
Payment cards |
PayPass PayWave Cards in Apple Wallet Cards in Google Wallet |
RFID, 125 kHz |
ASK FSK |
2.4 GHz mobile ID |
U-PROX ID U-PROX Tag U-PROX Auto Tag |
Read range |
NFC, Mifare and RFID 125 kHz - up to 5 cm, 2.4 GHz mobile ID - adjustable 10 cm - 15 m |
Power | +9...+15 VDC, consumption < 80 mA |
Interfaces |
Wiegand Auto, 26, 32, 34, 37, 40, 42, 56, 58, 64, 80 bits, RS-232, TouchMemory |
Wiring and distance |
8 wire cable: TouchMemory - up to 30 m, Wiegand - up to 150 m |
Dimensions | 45 х 80 х 12.5 mm |
Weight | 70 gramms |
Case colour |
black light gray |
Case material | ABS+PC plastic |
Ambient |
IP65, -40°С to +60°С |
Firmware |
30.хх - аll in one firmware Update via NFC (Android only) |
Proximity sensor | metal detector |
Complete set |
1. U-PROX SL mini; 2. Mounting kit; 3. Quick start guide |














U-PROX SL mini User manual
Description
U-PROX SL mini – the adjustable universal SmartLine reader for mobile credentials and proximity identifiers.
In conjunction with the U-PROX ID application and mobile identifiers U-PROX IDs allow any access control system to use smartphones as access system credentials.
Installation
1. Make small recess or hole (diameter is 14 mm) to connect cable under the reader’s case
2. Loosen the screw at the bottom of the reader
3. Remove the top cover, remove the back plate
4. Mount the back plate of reader on the wall using supplied plastic dowels and screws
5. Carry out wiring to the control panel
6. Insert the reader in the back plate
7. Place the top cover and tighten it with a screw
Installation on the metal surfaces may cause decrease of reading range.
Do not place readers closer than 20 cm one from another. It is possible to install two readers at a distance 10-15 cm of each other when their yellow wires (Hold/Sync) interconnected. This synchronizes the work of the readers, they will work alternately.
Connection
Seamless and easy connection to existing and new access systems, due to the Wiegand 26, 32, 34, 37, 40, 42, 56, 58, 64, 80 bits interfaces, Wiegand with automatic selection, RS232 and TouchMemory supports.
We recommend to use multi-core signal cable with 0.22 mm2 cross-section of each wire between reader and panel.
Wiegand
The reader connection wires functions are listed in the table.
We recommended to use following whiring when reader connected to the control panel with twisted pair.
RS-232
The reader connection wires functions are listed in the table.
TouchMemory
The reader connection wires functions are listed in the table.
We recommended to use following whiring when reader connected to the control panel with twisted pair.
Configuration
With the free mobile application U-Prox Config, the reader can be completely adjusted — from the indication to the encryption modes.
The reader is supplied without the engineering password for programming specified. To connect and (re) set the password — connect inputs D0 (green) and D1 (white) with each other and apply power to the reader.
The reader firmware can be updated with an NFC-enabled Android smartphone only.
Mobile identification
Reader supports digital personal mobile credential. It is processed and stored in the user’s smartphone using the U-PROX ID application. It can be transferred over NFC and/or 2.4 GHz radio between the reader and the smartphone.
Reader supports hardware active mobile identifiers U-PROX Tag and U-PROX Auto Tag.
Reader supports 3 operation modes for smartphones with U-Prox ID:
- “Door-Proximity” – 10-20 cm, reader activates by built-in proximity sensor. Recommended for double-sided doors and turnstiles
- “Door” – up to 60-70 cm
- “Barrier/Gate” – adjustable range of interaction from 1 to 15 m.
![]() |
|
![]() |
U-PROX ID application
Free mobile application U-PROX ID receives, stores and transmits mobile credentials between the reader and the smartphone.
How to obtain mobile ID
You can purchase mobile IDs from our dealers
RFID, 125 kHz
The reader supports 125 kHz cards with amplitude (ASK – EmMarine, etc.) and frequency modulation (PSK – Temik, etc.)
These cards do not have cloning protection, but are very popular due to their low cost
Mifare® identifiers
The reader supports work with Mifare® cards, reads encrypted identifiers with a user-assigned card number, with a static or diversified encryption key.
Up to five encryption profiles can be used simultaneously.
Mifare®Classic
The least secure series of cards, has a Crypto 1 (SL1) encryption algorithm vulnerability.
When using it, it is recommended to encrypt all card sectors with a diversified encryption key.
Mifare®Plus
The reader supports SL1 and SL3 modes for Mifare®Plus. It is recommended to use SL3 mode as it has the highest security and AES encryption algorithm.
Mifare®Defire
The reader supports Mifare DESFire EV1, EV2 and EV3 cards. AES encryption algorithm is supported.
Warranty
Warranty for U-PROX devices (except batteries) is valid for two years after the purchase date. If the device operates incorrectly, please contact support@u-prox.systems at first, maybe it can be solved remotely.

Meet the new product that is already available for order - the U-PROX PIR Cam wireless motion detector.
If the detector is triggered, it will send one or a series of photos to assess the situation to the U-PROX Home mobile app and the central monitoring station of the security company. The photo will be sent only during an obvious alarm.
This detector also has the “pet immune” function, which means that it is not sensitive to the movement of animals weighing up to 20 kg and up to 1 m high.
Simple installation, easy addition to the new generation U-PROX MPX security system hub, and an unrivaled communication range with the hub allow you to find a good location in your space.
Clear photo verification of the alarm has the highest quality specifications:
- motion detection range up to 12 m
- photo resolution: 640×480, 320×240, 240×176 pixels
- infrared illumination up to 8 meters for shooting in the dark and low light
- photo transfer time up to 9 seconds.
It should also be noted that U-PROX PIR Cam uses intelligent algorithms to eliminate false alarms. This allows you to be sure that you receive notifications only in case of a real threat.
Choose the new U-PROX PIR Cam with photo verification, because clarity adds peace of mind and comfort to life!
Uploads
Quick start guide
Certifiacte of conformity RED
Declaration of conformity
Declaration of conformity RoHS
Latest firmware
Lifestyle photos
Photos for online shops
FAQ
-
The control panes is the “brain” of the system, which determines whether or not the owner of the identifier is allowed to enter the door.
It has a built-in memory that stores identifier codes with a list of access rights for each of them.
When a person presents (brings to the reader) an identifier, the code read from it is compared with the one stored in the database, on the basis of which a decision is made to open the door.
-
A reader is a device that reads the code (key) of the identifier and transmits it to the controller.
-
PACS — Physical Access Control System —an access control and management system is a set of hardware and software control and management tools.
The main goal is to restrict and register the entry-exit of objects in a given area through “points of passage”: doors, gates, etc.
The main task is to control access to a given territory (who to let in, at what time and to what territory), including also:
- restricting access to a given territory;
- identification of a person who has access to a given territory.
-
An identifier is the basic element of an access control system that stores a code.
Each client is assigned a specific key (code), which serves to determine the owner’s rights – identification.
A card, a key fob, a tag can perform the function of an identifier.
-
Areas of application have a wide range of ACS:
- company offices, business centers;
- banks;
- educational institutions (schools, technical schools, universities);
- industrial enterprises;
- protected areas;
- parking lots;
- places of passage of vehicles;
- private houses;
- residential complexes;
- cottages;
- hotels;
- public institutions (sports complexes, museums, metro, etc.)
-
Everything that is in U-PROX, from the idea to the engineering implementation is done exclusively in Ukraine.
-
You can buy U-Prox equipment from our partners.
-
Open formats JSON and SOAP (XML) allow interaction between different applications, exchange data with access control systems and create applications that complement and extend the standard functionality of the U-PROX Web system.
API capabilities:
- Secure data exchange over a computer network.
- WEB service – the opportunity to interact with any platform and programming environment for SOAP and JSON protocol.
- Implementation of the user interface using the API.
- The ability to integrate with other systems and applications implemented by third-party developers.
-
U-PROX WEB provides a full range of solutions for quick installation, configuration and daily use of IP ACS by enterprises of any size, from a small office to a large company with many branches.
U-PROX Web has a full-featured web interface with fine-tuning of all ACS capabilities and provides the ability to monitor events, configure equipment, manage personnel access, and generate reports.
-
- Connect wires D0 (green) and D1 (white) with each other
- Apply power to the reader
- Connect to the reader with application U-Prox Config installed on smartphone.
- Select “Settings”
- Set a password
- Go back
- Press “Save Settings”
- Press “Disconnect”