RFID security systems have become quite common these days. Many corporations now use RFID cards, or badges, in place of physical keys. It’s not hard to understand why. They easily fit inside of a standard wallet, they require no power source, and the keys can be revoked with a few keystrokes. No need to change the locks, no need to collect keys from everyone.
[Shawn] recently set up one of these systems for his own office, but he found that the RFID cards were just a bit too bulky for his liking. He thought it would be really neat if he could just use his cell phone to open the doors, since he always carries it anyways. He tried searching for a cell phone case that contained an RFID tag but wasn’t able to come up with anything at the time. His solution was to do it himself.
[Shawn] first needed to get the RFID tag out of the plastic card without damaging the chip or antenna coil. He knew that acetone can be used to melt away certain types of plastic and rubber, and figured he might as well try it out with the RFID card. He placed the card in a beaker and covered it with acetone. He then sealed the beaker in a plastic bag to help prevent the acetone from evaporating.
After around 45 minutes of soaking, [Shawn] was able to peel the plastic layers off of the electronics. He was left with a tiny RFID chip and a large, flat copper coil. He removed the cover from the back of his iPhone 4S and taped the chip and coil to the inside of the phone. There was enough room for him to seal the whole thing back up underneath the original cover.
Even though the phone has multiple radios, they don’t seem to cause any noticeable interference. [Shawn] can now just hold his phone up to the RFID readers and open the door, instead of having to carry an extra card around. Looking at his phone, you would never even know he modified it.
[Thanks Thief Dark]
It’s kind of a convoluted title, but [Hudson’s] attempt to replace multiple HID Prox cards with one AVR chip didn’t fully pan out. The project started when he wanted to reduce the number of RFID access cards he carries for work down to just one. The cards use the HID Proximity protocol which is just a bit different from the protocols used in most of the hobby RFID projects we see. He ended up taking an AVR assembly file that worked with a different protocol and edited it for his needs.
The device above is the complete replacement tag [Hudson] used. It’s just an AVR ATtiny85 and a coil made of enameled wire. The coil pics up current from the card reader’s magnetic field, and powers the chip through the leakage on the input pins (we’ve seen this trick a few times before). The idea he had was to store multiple codes on the device and send them all in a row. He was able to get the tag to work for just one code, but the particulars of the HID Prox reader make it difficult if not impossible to send multiple codes. The card must send the same code twice in a row, then be removed from the magnetic field before the reader will poll for another combination.
This RFID card has a lot of nice features. But the one that stands out the most is the ability to learn the code from anther RFID tag or card.
You can see that the board includes an etched coil to interact with an RFID reader. This is the sole source of power for the device, letting it pick up enough induced current from the reader to power the PIC 12F683 seen on the upper left of the board. The underside of the PCB hosts just three components: an LED and two switches. One of the switches puts the device in learning mode. Just hold down that button as you move the board into the magnetic field of the reader. While in learning mode a second RFID tag is held up to the reader. It will identify itself and the emulator will capture the code sent during that interaction. This is all shown of in the video after the break. We wonder how hard it would be to make a version that can store several different codes selected by holding down a different button as the emulator is held up to the reader?
If you want to build your own card reader too here’s a project that does it from scratch.
Continue reading “RFID emulator card includes a learning mode”
[Monirul Pathan] decided to make the card as unique as this gift when getting ready for a birthday. He designed and built his own musical card with LED edge-lit acrylic to display the message.
The electronic design seeks to keep things as flat as possible. The card-shaped acrylic panel has a void to fit the PCB exactly, and the components are relatively flat. One thing we found quite interesting is that the ATtiny85 which drives the device is surface mounted, but it is not a surface mount component. The layout includes though-hole pads, but instead of drilling holes [Monirul] clipped off the excess of the DIP legs and soldered the remainder directly to the copper. We suppose this isn’t going to get a lot of use so it just needs to hold together for one day.
As you can see in the video after the break, the speaker plays ‘Happy Birthday’ followed by ‘Under the Sea’. At the same time, four blue LEDs pulse to the music, lighting up the words that are engraved in the plastic.
Continue reading “Edge-lit musical birthday card”
Cards you should crank
These greeting cards must be the product of a mechanical engineer run amok. They come with a crank and are designed to entertain with their simple, yet elegant movements. [Thanks Phil]
Magnetic card stripe reader
[JP] built an Arduino based magnetic card reader. It uses off-the-shelf parts but if you don’t mind buying the components this will get you up and running in no time. If you want more info there’s also this Teensy based version.
Homemade Airsoft sentry gun
This sentry gun has an amazingly fast firing rate that can continue for quite a while, thanks to the big flashlight housing that is holds a lot of ammo. [Thanks David]
Scanner easter egg
The engineers over at HP had a little fun building an easter egg into this scanner. If you know what you’re doing you can get it to play the Ode to Joy. It needs to join the old-hardware band from our Links post earlier in the month. [Thanks Googfan]
The laundry machines at [Hans Viksler’s] apartment were converted over from coin operation to stored value cards. We’ve all dealt with these cards before and [Hans] thought it would be fun to do a little sniffing around at how this particular company implements them. We’ve covered how to read these cards and there have been several stories regarding how to bypass the security that they use.
But [Hans] wasn’t interested in stealing value, just in seeing how things work. So he stuck the card in his reader and after looking around a bit he figured out that they use the Atmel AT88SC0404C chip. He downloaded the datasheet and started combing through the features and commands. The cards have a four-wrong-password lockout policy. He calculated that it would take an average of over two million cards to brute force the chip’s stored password. But further study showed that this is a moot point. He fed the default password from the datasheet to his card and it worked.
We know it takes quite a bit of knowledge for the average [Joe] to manipulate these cards at home, but changing the default password is literally the very least the company could have done to protect their system.
Breaking from his usually routine of winning at everything, [Glacial Wanderer] has posted one of his projects that didn’t actually work. It’s a Rube Goldberg style card shuffling machine. He wanted something that was visually interesting while still randomizing the cards. A blower would be mounted to the top to mix the cards similar to a lottery ball machine. The cards would then drop into a chute that would make sure all of the cards were oriented correctly before being presented to the user. After building the first prototype, several problems were apparent. The first of which was the fan not being strong enough. His interest was waning and it looked like the time he’d have to invest in fixes was growing quickly, so he decided to cut his loses. He still posted about the prototype in hopes that it could help someone else exploring this sort of machine. A video of the mechanism can be found below.
Continue reading “Card shuffling machine failure”