Generation 1 • Board V4

Secure Wireless
Relay Control

Industrial wireless control system enabling secure, authenticated switching of solid-state relays over Sub-GHz radio links with ECDH encryption and AES-CMAC authentication.

915
MHz ISM Band
P-256
ECDH Curve
2
SSR Channels
22
dBm Max TX
TX/RX Pair System
Connected
Encrypted
PLL Lock
Core Capabilities

Industrial-Grade Features

Built for critical applications requiring secure, reliable wireless control.

Sub-GHz LoRa Radio

Long-range communication in the 915 MHz ISM band. Better penetration and range than 2.4 GHz alternatives.

Frequency 902-928 MHz
TX Power 14-22 dBm

ECDH + AES-CMAC

Hardware-accelerated P-256 key exchange. Every packet authenticated with truncated CMAC tags.

Key Exchange ECDH P-256
MAC AES-256-CMAC

PLL-Synchronized TDMA

Software phase-locked loop for precise timing synchronization. Adaptive beacon intervals based on link state.

Active Beacon 354 ms
Timing Accuracy ±1 ms

Opto-Isolated Channels

Two opto-isolated "dry contact" channels per unit. Can be used as switch inputs or controlled outputs.

Channels 2 per unit
Type Dry Contact

PinSync Wireless I/O

Three bidirectional I/O lines for wireless level shifting. Board V4 exclusive feature.

I/O Lines 3 bidirectional
Direction Toggle switch

VISA/SCPI Ready

Desktop service with REST API, WebSocket telemetry, and native NI-MAX/LabVIEW integration.

HTTP localhost:8081
VISA localhost:5025
Technical Specifications

Built for Industrial
Reliability

Every parameter derived from firmware documentation and verified against source code. No invented specifications.

Full Specifications

Radio

Frequency 915 MHz
Bandwidth 125-500 kHz
SF 7-12
Power 14-22 dBm

Security

Key ECDH P-256
MAC AES-CMAC
Tag Size 4 bytes
Accelerator STM32WL PKA

Timing

Active 354 ms
Idle 5000 ms
Handshake 500 ms
ACK Timeout 500 ms

Physical

Relay Channels 2
Buttons 2
LEDs 5
PinSync I/O 3
Cryptographic Security

Industrial-Grade Security

Unpaired devices cannot control SSR outputs. Every packet is cryptographically authenticated.

1

ECDH Key Exchange

One-time pairing using P-256 curve. Public keys exchanged over 11 radio packets, shared secret stored in flash.

2

Session Establishment

Previously paired devices reconnect with SESSION_START/CONFIRM handshake. Session key derived per connection.

3

Per-Packet Authentication

Every operational packet includes 4-byte truncated CMAC. 8-bit sequence numbers prevent replay attacks.

Security States

NO_KEY
Not paired with any device
PAIRING
ECDH handshake in progress
BONDED
Paired but not connected
CONNECTED
Authenticated active link
Applications

Built for Your Use Case

From button-initiated control to automated test systems, WiEPOut T1 adapts to your workflow.

🎛️

Wireless Relay Control

User presses button on TX unit to toggle SSR outputs on RX unit. CMAC-authenticated commands with confirmed ACK responses.

Primary Use Case • Button-initiated
💻

Host-Controlled Operation

Host PC sends UART commands to TX unit, which relays them wirelessly to RX. REST API, WebSocket, and VISA/SCPI interfaces available.

Secondary • Automated testing
🔌

Wireless I/O Sync

Toggle switch changes synchronize wirelessly between TX and RX units. Functions as a "wireless level shifter" for discrete I/O.

Board V4 • PinSync feature
WiEPOut Overseer
Fleet Overview
3 online
WiEPOut-A1
Lab Bench 1
2s
WiEPOut-B2
Production Floor
5s
WiEPOut-C3
Warehouse
8s
Fleet Monitoring

WiEPOut Overseer

Monitor your entire WiEPOut device fleet from a single web interface. The self-hostable Overseer Dashboard provides real-time visibility into device health, status, and telemetry.

Real-Time Monitoring

Live device status and telemetry via WebSocket

Fleet Overview

View all connected devices on a single dashboard

REST API

Programmatic access for automation and integration

Self-Hostable

Deploy on your own infrastructure for complete control

Multi-Platform

Runs on Linux, Windows, and macOS

Ready to Get Started?

Contact us for pricing, technical consultation, and volume discounts on WiEPOut T1 systems.