Here’s an open source RFID cloner design that is about the same size as a standard RFID key card. It doesn’t need a battery to capture key codes, just the magnetic field generated by an RFID reader. You can see the functionality demonstrated in the video after the break. By holding the bottom button as the cloner is moved in range of the RFID reader, the microcontroller goes into learning mode. Now just hold up the card you wish to clone and the LED just above the buttons will light up when it has captured the code. Now the device will act just as the original RFID tag did.
This was developed by [Ramiro], the same person who built the barebones RFID emulator we saw a few days ago. When researching that story we complete skipped over this gem. He’s posted a ton of information on the tag itself. It doesn’t look like he has any PCBs or kits left, but the schematic and code are available for download. You should check in on the design considerations section because it discusses the read/write function that isn’t built into the current version. That’s why you see some add-on components on the hardware used in the demo video.
It seems like this is a lot more user-friendly than the last RFID spoofer we looked at.
Continue reading “Passive RFID tag cloning”
How long has it been since you’ve played a game of tag?
[Sylvia Cheng, Kibum Kim, and Roel Vertegaal] from Queen’s University’s human media lab have concocted a fun twist on the classic game that just might compel you to start playing again.
Their game, called TagURIt, arms two players with Lumalive LED t-shirts which sport embedded touch sensors. A third player, known as the “chaser” attempts to touch either of the other players in order to capture the token displayed on the player’s chest-based LED matrix. The game is score-based, awarding points to the chaser for capturing tokens, while giving the other players points for avoiding capture.
If both players wearing the LED shirts are near to one another, the token will jump to the other player in an attempt to thwart the chaser. In this game, each player is a location-tagged URI, and proximity is determined by either tracking the users with cameras indoors, or via RF sensors if the game is played outside.
It is definitely an interesting way of playing tag, and we imagine it could be quite fun in large groups.
Continue reading to see a video demonstration of the TagURIt game being played.
[via Adafruit blog]
Continue reading “Bringing the game of tag into the digital age”
When the cat’s away the mice will play, but a least you’ll know when they came home if you use this time clock. It’s called the Kid-e-log and [John Boxall] developed it to help a friend who wanted to keep track of their teenage children’s after school activities while they were still at work. He figured having them punch a time clock would at least let you know if they came straight home as they were supposed to. An RFID tag was issued to each (no, they didn’t implant the tags) and used to record the time. To keep fraud to a minimum the hardware has a battery back-up for its real-time clock, and the tag read events are stored to EEPROM for retention between power cycles. This doesn’t prevent common tricks like taking the reader with you, or sending your tag with a sibling, but it’s a start. See it in action after the break.
Continue reading “Keep your kids in line with a time clock”
Here’s a field-programmable RFID spoofer developed by [Doug Jackson]. He was inspired by the spoofers we looked at near the end of September that didn’t have source code available. With the idea seeded in his mind he figured he could develop his own version, and then decided to share the build details with the rest of us.
The tags that he purchased for testing and developing the spoofer have a code printed on the back of them. A bit of sleuthing at the data from a tag reader and he managed to crack the code. From there he built this tag spoofer with a keypad on which you enter the number from the back of any 125 kHz tag and the device becomes that tag. If you have been waiting to test your RFID hacking skills there should be nothing holding you back now that [Doug] shared the details of his own adventure.
More and more today, it is becoming harder to avoid having some sort of RFID tag in your wallet. [bunnie], of bunnie:studios decided to ease the clutter (and wireless interference) in his wallet by transplanting the RFID chip from one of his subway cards into his mobile phone. Rather than the tedious and possibly impossible task of yanking out the whole antenna, he instead pulled the antenna of a much more accessible wristband with an RFID chip of similar frequency instead. Nothing too technical in this hack, just a great idea and some steady handiwork. We recommend you try this out on a card you haven’t filled yet, just in case.
[Matt] has mixed up a batch of two RFID reading door lock systems. While the “door lock” part of the setup has yet to come into existence, the “RFID reading” section is up and running. By using the Parallax RFID readers (for cheap, remember?) and an Arduino, [Matt] is able to parse an RFID tag, look its number up in a database, and then have a computer announce “Access Denied” in a creamy “Douglas Adam’s sliding door of Hitchiker’s Guide” kind of way with Python.
Good books aside, catch a not as exciting as you’re thinking video after the jump.
Continue reading “Arduino, RFID, and you”
[Carl] has done a lot of work developing a collection of RFID hardware. The two cards you see above are spoofers that can be programmed in the field using the keypad on the left, or the rather intimidating banks of DIP switches on the right. We also enjoyed his look at the Atmel T5557 and ATA5567 on-card chips used for the tags themselves. He shared the schematics for his designs but unfortunately he’s not distributing the firmware. None-the-less, if you’re interested in learning more about RFID this is a wonderful resource as it covers readers, writers, spoofer, and tags.