Ever wanted to feel like one of those movie hackers from the late 90s? Yes, your basement’s full of overclocked Linux rigs and you’ve made sure all your terminal windows are set to green text on a black background, but that’s not always enough. What you need is an RFID tag that unlocks your PC when you touch the reader with your RFID card. Only then may you resume blasting away at your many keyboards in your valiant attempts to hack the mainframe.
[Luke] brings us this build, having wanted an easier way to log in quickly without foregoing basic security. Seeing as an RC522 RFID reader was already on hand, this became the basis for the project. The reader is laced up with a Sparkfun Pro Micro Arduino clone, with both devices serendipitously running on 3.3V, obviating the need for any level shifters. Code is simple, based on the existing Arduino RC522 library. Upon a successful scan of the correct tag, the Arduino acts as a HID keyboard and types the user’s password into the computer along with a carriage return, unlocking the machine. Simple!
Overall, it’s a tidy build that achieves what [Luke] set out to do. It’s something that could be readily replicated with a handful of parts and a day’s work. If you’re interested in the underlying specifics, we’ve discussed turning Arduinos into USB keyboards before.
Pick a card, any card. [Andrew Quitmeyer] and [Madeline Schwartzman] make sure that any card you pick will match their NYC art installation. “Replantment” is an interactive art installation which invites guests to view full-size leaf
molds casts from around the world.
A receipt file with leaf images is kept out of range in this art installation. When a viewer selects one, and carries it to the viewing area, an RFID reader tells an Arduino which tag has been detected. Solid-state relays control two recycled clothing conveyors draped with clear curtains. The simple units used to be back-and-forth control but through dead-reckoning, they can present any leaf
mold cast front-and-center.
Clothing conveyors from the last century weren’t this smart before, and it begs the question about inventory automation in small businesses or businesses with limited space.
We haven’t seen much long-range RFID, probably because of cost. Ordinary tags have been read at a distance with this portable reader though, and NFC has been transmitted across a room, sort of.
Continue reading “Long-Range RFID Leaflets”
One of Atmel’s smallest microcontrollers, the ATtiny, is among the most inexpensive and reliable chips around for small applications. It’s also one of the most popular. If you don’t need more than a few inputs or outputs, there’s nothing better. As a show of its ability to thrive under adverse conditions, [Trammell Hudson] was able to shoehorn an ATtiny into an RFID circuit in a way that tests the limits of the chip design.
The RFID circuit only uses two of the ATtiny’s pins and neither of which is the ground or power pin. The ATtiny is equipped with protective diodes on its input pins, and if you apply an AC waveform to the input pins, the chip is able to use the leakage current to power itself. Once that little hurdle is crossed, the ATtiny can do the rest of its job handling the RFID circuitry.
This project takes a deep dive into the internals of the ATtiny. If you’ve ever wondered what was going on inside of everyone’s favorite tiny microcontroller, or if you’re looking for an RFID circuit that keeps parts counts to an absolute minimum, this is the project for you. The ATtiny is more than just a rugged, well-designed chip, though. It’s capable of a lot more than such a small chip should be able to.
Thanks to [adnidor] for the tip!
Sometimes we see projects whose name describes very well what is being achieved, without conveying the extra useful dimension they also deliver. So it is with [Prasanth KS]’s Windows PC Lock/Unlock Using RFID. On the face of it this is a project for unlocking a Windows PC, but when you sit down and read through it you discover a rather useful primer for complete RFID newbies on how to put together an RFID project. Even the target doesn’t do it justice, there is no reason why this couldn’t be used with any other of the popular PC operating systems besides Windows.
The project takes an MRFC-522 RFID module and explains how to interface it to an Arduino. In this case the Arduino in question is an Arduino Pro Micro chosen for its ability to be a USB host. The supplied code behaves as a keyboard, sending the keystroke sequence to the computer required to unlock it. The whole is mounted in what seems to be a 3D printed enclosure, and for ease of use the guts of the RFID tag have been mounted in a ring.
As we said above though, the point of this project stretches beyond a mere PC unlocker. Any straightforward RFID task could use this as a basis, and if USB is not a requirement then it could easily use a more run-of-the-mill Arduino. If you’re an RFID newbie, give it a read.
Plenty of RFID projects have made it here before, such as this door lock. And we’ve had another tag in a ring, too.
You’d think that with as many sick people as there are in the world, it wouldn’t be too difficult for a doctor in training to get practice. It’s easy to get experience treating common complaints like colds and the flu, but it might take the young doctor a while to run across a dissecting abdominal aortic aneurysm, and that won’t be the time for on the job training.
Enter the SP, or standardized patient – people trained to deliver information to medical students to simulate a particular case. There’s a problem with SPs, though. While it’s easy enough to coach someone to deliver an oral history reflecting a medical condition, the student eventually needs to examine the SP, which will reveal none of the signs and symptoms associated with the simulated case. To remedy this, [Chris Sanders] and [J Scott Christianson] from the University of Missouri developed an open-source RFID stethoscope to simulate patient findings.
This is one of those “why didn’t I think of that?” ideas. A cheap stethoscope is fitted with an Arduino, and RFID reader, and a small audio board. RFID tags are placed at diagnostic points over an SP’s chest and abdomen. When the stethoscope is placed over a tag, a specific sound file is fetched from an SD card and played over earbuds. The student doesn’t have to ask, “What am I hearing?” anymore – the actual sound of bruits or borborygmi are heard.
We can easily see expanding this system – RFID tags that trigger a faux ultrasound machine to display diagnostic images, or tiny OLED screens displaying tagged images into an otoscope. A good place to start expanding this idea might be this digital stethoscope recorder and analyzer.
Continue reading “RFID Stethoscope Wheezes and Murmurs for Medical Training”
How often do you see problems that need fixing? How often do you design your own solutions to them — even if they won’t be implemented at scale? Seeing that many of the municipal parking lots in his native Sri Lanka use a paper ticketing system which is prone to failure, [Shazin Sadakath] whipped up his own solution: an efficient RFID tag logging system.
Continue reading “Faulty Parking Meter Tracking System? RFID To The Rescue!”
Group entry hacks are a favorite for hacker social groups. Why use old fashioned keys when you can use newfangled electronic keys? If you are looking to build a simple RFID-based security system to secure your important stuff, this project from Resin.io is a good place to start. In it, [Joe Roberts] outlines the process of building a simple RFID-triggered mechanism for their office door.
It’s a pretty simple setup that is composed of an RFID reader, a Rasperry Pi and a Neopixel ring. When someone places an RFID card against the reader hidden behind a poster by their front door, the reader grabs the code and the Pi compares it with a list of authorized users. If the card is on the list, the Pi triggers the door lock using a signal line originally designed to work with an intercom system. If the user isn’t on the list, a laser is triggered that vaporizes the interloper… well, that’s perhaps in the next version, along with an API that will allow someone to open the door from the company chat application.
At the moment, this is a clean, simple build that uses only a few cheap components, but which could be the basis for a more sophisticated security system in the future.