[Mário] sent us a tip detailing the access control system he and his friends built for the eLab Hackerspace in Faro, Portugal. The space is located in the University of Algarve’s Institute of Engineering, which meant the group couldn’t exactly bore some holes through campus property and needed a clever solution to provide 24/7 access to members.
[Mário] quickly ruled out more advanced Bluetooth or NFC options, because he didn’t want to leave out members who did not have a smartphone. Instead, after rummaging around in some junk boxes, the gang settled on hacking an old Siemens C55 phone to serve as a GSM modem and to receive calls from members. The incoming numbers are then compared against a list on the EEPROM of an attached PIC16F88 microcontroller, which directs a motor salvaged from a tobacco vending machine to open the push bar on the front door. They had to set up the motor to move an arm in a motion similar to that of a piston, thus providing the right leverage to both unlock and reset the bar’s position.
Check out [Mário’s] blog for more details and information on how they upload a log of callers to Google spreadsheets, and stick around for a quick video demonstration below. If you’d prefer a more step by step guide to the build, head over to the accompanying Instructables page. Just be careful if you try to reproduce this hack with the Arduino GSM shield.
Continue reading “Open Your Hackerspace Door With A Phone Call”
Near Field Communication (NFC) enabled devices are starting to appear in our everyday lives. Shown in the picture above is the xNT (fundraiser warning), a 2mm x 12mm fully NFC Type 2 compliant 13.56MHz RFID tag encased in a cylindrical Schott 8625 bioglass ampule. It was created by [Amal Graafstra], who therefore aims to produce the world’s first NFC compliant RFID implant. The chip used is the NTAG203, which is (for the sake of simplicity) a 144bytes EEPROM with different protection features.
We can only start thinking of the different possibilities this chip will create in the near future, but also wonder which precedent this may set for future NFC enabled humans. Embedded after the break is the presentation video of xNT but also an interview I conducted with [Amal Graafstra], who has already been living for 8 years with RFID tags in each hand.
Continue reading “Hackaday Interview With Amal Graafstra, Creator Of XNT Implant Chip”
Let’s rollback the hobby electronics calendar a few decades with [myvideoisonutube’s] alarm activation control circuit using a matrix style phone keypad. The circuit is quite old using CMOS 4081 with 4 ‘AND’ gates to hardwire the access code. [myvideoisonutube] references [Ron’s] “Enhanced 5-Digit Alarm Keypad” schematic for this build changing the recommend keypad with a more common matrix style keypad found in touch pad phones. These types of matrix keypads wouldn’t work outright for the input so he cut some traces and added hookup wires to transform it into a keypad with common terminals and separately connected keys. We love seeing such hacked donor hardware even when it requires extensive modifications. [Ron’s] source circuit included a simple enough to build tactical button keypad if you can’t find a suitable donor phone.
Learning how to use mostly discrete components instead of a microcontroller would be the core objective to build this circuit outside of needing a key-code access point or other secure 12 V relay activated device. Such a device would be quite secure requiring a 4 digit “on” code and 5 digits for “off”. You couldn’t just pull off the keypad and hotwire or short something to gain access either. The 4 digit on “feature” does knock the security down quite a lot. However, all keys not in the access code are connected to the same point so you could increase your security by using a pad with more keys.
On [Ron’s] site you will find a detailed construction guide including top and bottom view for placement of all the components on veroboard. Join us after the break to watch [myvideoisonutube] demo his version.
Continue reading “5 Digit Security Code Activated Relay Using Mostly Discrete Circuitry”