U-PROX SL keypad v2
Universal SL series reader with keypad
Vandal resistant reader
Protect access control system identifiers from cloning and data spoofing
All keys in your smartphone
Your smartphone can become an electronic key for access to the premises.
Contactless active identifier for authorizing users of the access control system in hands-free mode.
It can work in two modes:
Use 40.xx firmware to enable tag support
Contactless active identifier for vehicle authorization in the access control system
Use 40.xx firmware to enable tag support
Reader configuration with mobile app
Full configuration of the reader from the mobile application
Contact partner companies to purchase or install security and automation devices.
Become an official distributor, reseller or installer of U-PROX security and safety systems.
Generation | First edition of U-PROX SmartLine Readers |
---|---|
Mifare®, 13.56 MHz |
ISO14443A, 4, 7, 10 bytes UID: Mifare®Classic 1K/4K Mifare®Standard Mifare®Ultralight Mifare®Hi-Memory Mifare® Plus S 2K Mifare® Plus S 4K Mifare® Plus SE 1K Mifare® Plus X 2K Mifare®Plus X 4K Mifare®Plus EV1 2K Mifare® Plus EV1 4K Mifare® DESfire Mifare® DESfire EV1 Mifare® DESfire EV2 |
NFC, 13.56 MHz | U-PROX ID (Android only) |
Payment cards |
PayPass PayWave Cards in Apple Wallet Cards in Google Wallet |
RFID, 125 kHz |
ASK FSK |
2.4 GHz mobile ID | U-PROX ID |
Read range |
NFC, Mifare and RFID 125 kHz - up to 4 cm, 2.4 GHz mobile ID - adjustable 10 cm - 12 m |
Power | +9...+15 VDC, consumption < 80 mA |
Interfaces |
Wiegand Auto, 26, 32, 34, 37, 40, 42, 56, 58, 64, 80 bits, RS-232, TouchMemory |
Wiring and distance |
8 wire cable: TouchMemory - up to 30 m, Wiegand - up to 150 m |
Dimensions | 80 х 114 х 16 mm |
Weight | 260 gramms |
Case colour | steel |
Case material | 1.2 mm stainless steel |
Ambient |
IP65, -40°С to +60°С |
Firmware |
30.хх - RFID 125 kHz, Mifare 13.56 MHz, Mobile ID 2.4 GHz. 40.xx - Mifare 13.56 MHz, Mobile ID 2.4 GHz, U-PROX Tag, U-PROX Auto Tag. Update via 2.4 GHz radio (BLE) |
Proximity sensor | metal detector |
Complete set |
1. U-PROX SL steel; 2. Mounting kit; 3. Quick start guide |
U-PROX SL steel – the adjustable SmartLine reader for mobile credentials and proximity identifiers.
In conjunction with the U-PROX ID application and mobile identifiers U-PROX IDs allow any access control system to use smartphones as access system credentials.
1. Make small recess or hole (diameter is 14 mm) to connect cable under the reader’s case
3 Carry out wiring to the control panel
4. Mount the reader on the wall using supplied plastic dowels and screws
Installation on the metal surfaces may cause decrease of reading range.
Do not place readers closer than 20 cm one from another. It is possible to install two readers at a distance 10-15 cm of each other when their yellow wires (Hold/Sync) interconnected. This synchronizes the work of the readers, they will work alternately.
Seamless and easy connection to existing and new access systems, due to the Wiegand 26, 32, 34, 37, 40, 42, 56, 58, 64, 80 bits interfaces, Wiegand with automatic selection, RS232 and TouchMemory supports.
We recommend to use multi-core signal cable with 0.22 mm2 cross-section of each wire between reader and panel.
The reader connection wires functions are listed in the table.
We recommended to use following whiring when reader connected to the control panel with twisted pair.
We recommended to use following whiring when reader connected to the control panel with twisted pair.
The reader connection wires functions are listed in the table.
The reader connection wires functions are listed in the table.
We recommended to use following whiring when reader connected to the control panel with twisted pair.
With the free mobile application U-Prox Config, the reader can be completely adjusted — from the indication to the encryption modes.
The reader is supplied without the engineering password for programming specified. To connect and (re) set the password — connect inputs D0 (green) and D1 (white) with each other and apply power to the reader.
Reader supports digital personal mobile credential. It is processed and stored in the user’s smartphone using the U-PROX ID application. It can be transferred over NFC and/or 2.4 GHz radio between the reader and the smartphone.
40.xx firmware is required to work with the U-PROX Tag and U-PROX Auto Tag.
Reader supports 3 operation modes for smartphones with U-Prox ID:
Free mobile application U-PROX ID receives, stores and transmits mobile credentials between the reader and the smartphone.
You can purchase mobile IDs from our dealers
The reader supports 125 kHz cards with amplitude (ASK – EmMarine, etc.) and frequency modulation (FSK – Temik, etc.)
These cards do not have cloning protection, but are very popular due to their low cost
The reader supports work with Mifare® cards, reads encrypted identifiers with a user-assigned card number, with a static or diversified encryption key.
Up to five encryption profiles can be used simultaneously.
The least secure series of cards, has a Crypto 1 (SL1) encryption algorithm vulnerability.
When using it, it is recommended to encrypt all card sectors with a diversified encryption key.
The reader supports SL1 and SL3 modes for Mifare®Plus. It is recommended to use SL3 mode as it has the highest security and AES encryption algorithm.
The reader supports Mifare DESFire EV1, EV2 and EV3 cards. AES encryption algorithm is supported.
Warranty for U-PROX devices (except batteries) is valid for two years after the purchase date. If the device operates incorrectly, please contact support@u-prox.systems at first, maybe it can be solved remotely.
Quick start guide
Certifiacte of conformity RED
Declaration of conformity
Declaration of conformity RoHS
Latest firmware 30.xx
Latest firmware 40.xx (Tag support)
Photos for online shops
The control panes is the “brain” of the system, which determines whether or not the owner of the identifier is allowed to enter the door.
It has a built-in memory that stores identifier codes with a list of access rights for each of them.
When a person presents (brings to the reader) an identifier, the code read from it is compared with the one stored in the database, on the basis of which a decision is made to open the door.
A reader is a device that reads the code (key) of the identifier and transmits it to the controller.
PACS — Physical Access Control System —an access control and management system is a set of hardware and software control and management tools.
The main goal is to restrict and register the entry-exit of objects in a given area through “points of passage”: doors, gates, etc.
The main task is to control access to a given territory (who to let in, at what time and to what territory), including also:
An identifier is the basic element of an access control system that stores a code.
Each client is assigned a specific key (code), which serves to determine the owner’s rights – identification.
A card, a key fob, a tag can perform the function of an identifier.
Areas of application have a wide range of ACS:
Everything that is in U-PROX, from the idea to the engineering implementation is done exclusively in Ukraine.
You can buy U-Prox equipment from our partners.
Open formats JSON and SOAP (XML) allow interaction between different applications, exchange data with access control systems and create applications that complement and extend the standard functionality of the U-PROX Web system.
API capabilities:
U-PROX WEB provides a full range of solutions for quick installation, configuration and daily use of IP ACS by enterprises of any size, from a small office to a large company with many branches.
U-PROX Web has a full-featured web interface with fine-tuning of all ACS capabilities and provides the ability to monitor events, configure equipment, manage personnel access, and generate reports.