Opening a garage door by hand is a lot of work and a hassle, hence the advent of the garage door opener. Nowadays, some people may even say just pushing the button of a remote control requires too much effort. [nodcah] is one of those people so he came up with a fingerprint scanner that controls a pre-installed garage door opener. All kidding aside, it is a cool project that lets you into your garaage, keeps unknown people out and doesn’t require you to remember to carry a key or remote.
In the center of this project is an ATmega328 that runs a custom Arduino code. This ATmega328 is responsible for controlling a 16 character, 2 line LCD screen as well as communicate with an off the shelf fingerprint scanner from Sparkfun. The fingerprint scanner has a built in CPU, can store up to 20 fingerprints and does all its own processing of fingerprint scans. It then communicates to the ATmega328 with simple commands over serial Tx and Rx lines.
The ATmega328, LCD and fingerprint scanner are all mounted outside the garage in a 3D printed enclosure. If the wires for the internal-garage open/close button were just run straight into this outdoor module, anyone could open it up, short the wires and get into the garage. To prevent this, if the ATmega328 gets the ‘OK’ from the fingerprint scanner, then it sends a signal to an ATtiny85 that is inside the garage. If the ATtiny85 receives the correct signal, it will then actuate the garage door opener by shorting the open/close button contacts. This prevents anyone from sneaking into the garage.
[nodcah] did a great service to the community by making all of the part list, schematics, instructions and Arduino code available so anyone can easily put this project together.
Continue reading “Fingerprint Scanner Both Simplifies And Complicates Opening Garage Door”
We would be remiss if we didn’t mention that all of SparkFun’s open source hardware is now on Upverter.
Not wanting to tie up an iPad as a mini-gaming cabinet [Hartmut] hacked an Arcadi cabinet to use EUzebox instead.
Time travel happens in the bedroom as well. But only if you have your very own Tardis entrance. [AlmostUseful] pulled this off with just a bit of word trim and a very nice paint job. [via Reddit]
[Pierre] tricks an iPhone fingerprint scanner by making a replica out of hot glue.
Some of the guys from our parent company were over in Shanghai on business. [Aleksandar Bradic] made time to visit the Shanghai hackerspace while in town and wrote about the experience over on their engineering blog.
[Gregory Charvat] is a busy guy. In fact we’ve got a juicy hack of his saved up that we still need to wrap our minds around before featuring. In the mean time check out the Intern-built coffee can radar that he took over and tested on a multi-million dollar Spherical Near Field Range.
And finally, everyone loves coffee hacks, right? Here’s what [Manos] calls a Greek style instant coffee machine.
[Greg] sent in his biometric pistol safe lock. He keeps his guide light on details so not every Joe can crack the system (there is a thread to sift through if you really wanted to), but the idea runs fairly simple anyway. [Greg] took an old garage door opening fingerprint scanner and wired it into a half broken keypad based pistol safe. While he did have some issues finding a signal that only fired when the correct fingerprint is scanned, a little magic with a CMOS HEX inverter fixed that problem quick.
This does bring one question to our minds, are fingerprint scanners as easy to crack as fingerprint readers?
AU Optronics Corp has unveiled a new LCD panel that doubles as a fingerprint scanner. Each pixel is equipped with 4 optical sensors, so a 320×240 screen would have a scanning resolution of 640×480. They have also experimented with different sensors, such as UV. You can see an LCD panel that detects and displays the UV index above. Why did they use a secondary display to show the data though?
[Irongeek] has been working on changing the OS fingerprint of his Windows box. Common network tools like Nmap, P0f, Ettercap, and NetworkMiner can determine what operating system is being run by the behavior of the TCP/IP stack. By changing this behavior, you can make your system appear to be another OS. [Irongeek] started writing his own tool by checking the source of Security Cloak to find out what registry keys needed to be changed. His OSfuscate tool lets you define your own .os fingerprint file. You can pretend to be any number of different systems from IRIX to Dreamcast. Unfortunately this only works for TCP/IP. Other methods, like Satori‘s DHCP based fingerprinting, still work and need to be bypassed by other means. Yes, this is just “security through obscurity”, but it is something fun to play with.
In the same vein as our recent Defcon article on biometric cloning, White Wolf Security has released this article about turning a biometric door lock into a trojan. They note that there are many common ways to break into one, from harvesting fingerprints to using gummy bears to fake a finger. This hack involves having full access to the unit so you can disassemble it.
The unit has a system built-in where you can touch a 9-volt battery to some connectors on the bottom to power it in case of a building power failure. The researchers simply routed some wires from the motorized lock to the plates used for the 9-volt and then reassembled the lock. The door can then be opened at any time without verification, even if the software on the unit is reset.