Getting Useful Data From A Dirt Cheap RFID Reader

cheap-rfid-reader

[Aaron] was looking for a cheap RFID reader that had some easy to follow documentation and a standardized interface. Most everything he saw was pretty expensive, so he decided to buy a cheap $10 reader from eBay to see how easy it would be to work with.

The reader came with very little documentation, but [Aaron] did know that the device identifies itself as a USB keyboard, outputting scan tag data into a text editor. That functionality wasn’t incredibly useful, so he took it apart to see if he could interface with it in some other manner. Exposing the PCB revealed an unknown IC for which he could find no documentation, but the board did include some breakout pins, so [Aaron] started by probing those for data.

He tried reading the data in both a terminal program and with a logic analyzer, but nothing seemed to make a whole lot of sense. He turned the sampling rate of the sniffer down, and things started looking a little better. After comparing the data from the sniffer with known tag codes, he noticed that each digit had an offset of 39 applied, so he whipped up a bit of code to correct the numbers.

[Aaron] did a good amount of legwork to get usable data from the reader, but at a cost of $10 it can’t be beat. We certainly know what we’re going to be hunting for on eBay this afternoon…

Jarvis Opens The Door At P-Space

It seems like every Hackerspace should have some type of kludged together access system on their entry door. [Vasilis] wrote in to share the system called Jarvis that controls access to P-Space, a Hackerspace in Patras, Greece. It’s an RFID-based system that offers a few nice features.

They already have a server running the webpage, so basing their entry system off of a computer was an easy option. You can get in one of two ways; by presenting your valid RFID tag to a reader at the front door, or by ringing the bell and having a member inside press the Big Button of Doom (BBoD) which is a wireless controller.

The BBoD has an Xbee module inside which lets it send an unlock command back to the computer. The remote is powered by two AA batteries, and since it’s never on unless the button is pressed the team estimates these batteries should last around one year.

There’s even a feedback system. The computer posts the last few events to the webpage. So you can go online and see when the BBoD was used, or who’s tag has recently unlocked the entrance to tell if your friends are there.

RFID Reading And Spoofing

Locks are always temporary hindrances. After deciding to open the RFID-secured lock in his department, [Tixlegeek] built a device to read and spoof RFID tags (French, Google translate here).

The system is built around an ATMega32 microcontroller with a 16×2 LCD display. A commercial RFID reader module takes care of all the sniffing/cloning duties, and a small modulation circuit handles pumping those bits over to a lock. Right now, the spoofer can only handle reading and spoofing 125kHz RFID tags with no encryption or authorization. A tag that’s more complex than the duct tape RFID tag doesn’t work.

[Tixlegeek]’s little project does open up a few interesting avenues of exploring stuff that’s most certainly illegal. A smaller version of the project could be emplaced near a door or other RFID reader and left to crack a lock with a 32+62 bit password at 125 kilohertz. It wouldn’t be the fastest safecracker in the business, but it would work automatically as long as there is power.

If you’ve got any other ideas on what [Tixlegeek]’s RFID spoofer could do, leave a note in the comments.

beer-security

Beer Security System Keeps Freeloaders Out Of Your Stash

The crew at the Milwaukee Hackerspace are pretty serious about their beer. They used to have a fridge filled with cans, available to all at the hackerspace, but they decided to beef things up and create a secured beer dispensing system.

Like many others we have seen, their kegerator is built into an old refrigerator, complete with a tap built into the door. To ensure that interlopers are kept from their precious brew, they have secured the refrigerator using an Arduino and RFID tags to grant access. They use the same RFID key fobs members carry to gain access to the space for tracking beer consumption, unlocking the tap whenever a valid tag is swiped past the sensor.

They are still in the midst of tweaking and revising the system, but it looks good so far. It’s a great way to keep uninvited guests from their beer stash, while giving them a way to track consumption at the same time. We’re looking forward to seeing more details and code once things are completely wrapped up.

[via BuildLounge]

PopCARD Vending Machine Enhancement Gets Upgraded

[Alex] wrote in to let us know he just completed a pretty major upgrade to his PopCARD RFID vending machine system. You may remember that earlier this year he added an Arduino based RFID reader to a soda machine so that thirsty patrons could pay with plastic instead of cold hard cash. That system worked, but at the beginning of the video after the break [Alex] goes over some of its flaws. There was a button to add cash from the card to the machine in $1 increments, rather than the system just knowing how much to charge you. Also, if you accidentally selected something that was out of stock you were out of luck and were charged anyway.

The new system does away with the button, and knows what product is sold out. The control hardware was upgraded to an Arduino mega to gain extra I/O pins. The device now sits in between the machine’s buttons and its own controller. When cash is used, the Arduino sits passively and lets the machine do its thing. But when a card is scanned, it takes over control of the buttons, sensing your selection, then simulating coin and button presses to vend accordingly. The new setup also uses an Ethernet shield which allows [Alex] to tell what items are running low without being at the machine itself.

Continue reading “PopCARD Vending Machine Enhancement Gets Upgraded”

magic_music_table_accessible_jukebox

Magic Table Gives Disabled Child Control Over Her Music

Instructables user [XenonJohn] recently put together a fantastic tutorial detailing how he made an RFID-controlled jukebox. The Magic Music Table was created for a disabled child, who is unable to use a CD payer, nor navigate small buttons and menus on MP3 players. He originally though about making the buttons more accessible a la the Frankenkindle, but ultimately settled on making the table instead.

Embedded in the center of the Music Table under a piece of plexiglass is a small project box containing an iPod, Arduino Mega, and a Parallax RFID reader. He crafted small RFID “bricks” that can be waved over the RFID reader, triggering the iPod to play a specific album from a large playlist. The Arduino acts as the middleman, controlling the RFID reader and relaying the appropriate information to the iPod when required.

The system looks pretty sturdy, and [XenonJohn] says that it works great. We think it’s a wonderful use of technology – you certainly can’t argue with brightening up a child’s day.

Continue reading to see a video of the Magic Music Table in action.

Continue reading “Magic Table Gives Disabled Child Control Over Her Music”

Passive RFID Tag Cloning

Here’s an open source RFID cloner design that is about the same size as a standard RFID key card. It doesn’t need a battery to capture key codes, just the magnetic field generated by an RFID reader. You can see the functionality demonstrated in the video after the break. By holding the bottom button as the cloner is moved in range of the RFID reader, the microcontroller goes into learning mode. Now just hold up the card you wish to clone and the LED just above the buttons will light up when it has captured the code. Now the device will act just as the original RFID tag did.

This was developed by [Ramiro], the same person who built the barebones RFID emulator we saw a few days ago. When researching that story we complete skipped over this gem. He’s posted a ton of information on the tag itself. It doesn’t look like he has any PCBs or kits left, but the schematic and code are available for download. You should check in on the design considerations section because it discusses the read/write function that isn’t built into the current version. That’s why you see some add-on components on the hardware used in the demo video.

It seems like this is a lot more user-friendly than the last RFID spoofer we looked at.

Continue reading “Passive RFID Tag Cloning”