|
The things is 99.9% of entry cards (the place I leave at least) are default-encrypted mifare traditional, making cloning trivial. These are principally a single antenna wired to an array of chips directed by a keypad. That appears viable on paper however you continue to get to carry the card and press the suitable change.The best resolution would be a smart Herz P1 Ring with a reflashable NFC chip, along with a programmable MCU to implement the rolling logic between playing cards. Reflashing the NFC chip on the ring is a little bit of a pain (it takes a second, but if I need to spend a second doing it on daily basis, I'd as well get my keys out). Since every cellphone has an NFC chip these days, although, can't we use that to emulate all our Mifare cards? Mifare playing cards?Unfortunately, no.From my experience at the very least, most access playing cards are simple mifare basic playing cards, and they have no payload: the reader simply bought a list of allowed card IDs, maintained by the building IT.While you may freely rewrite mifare data from Android, it will not let you modify your ID until you root your cellphone. |
|