miamicanes
Active Member
Does anybody know whether (unofficially) a Samsung Android phone with NFC can spoof a card and be "read" by the M1PR (Elk's proximity-card reader)?
I know you can spoof *some* rfid cards (at least, if your phone's rooted and you aren't depending upon the official API to do it *grin*), but I have no idea what frequency Elk's reader uses, or how 'smart' its cards are.
Alternatively, how "smart" is the M1PR? Does it do all the heavy lifting, then just send a ~128-bit id to the keypad via rs485/i2c/spi/whatever? Or is the M1 itself intimately involved in the transaction (picking challenges, exchanging encryption keys, etc)? If the M1PR itself does all the heavy lifting & ultimately just sends a bare ID, I could probably build my *own* Android-compatible reader ;-)
I know you can spoof *some* rfid cards (at least, if your phone's rooted and you aren't depending upon the official API to do it *grin*), but I have no idea what frequency Elk's reader uses, or how 'smart' its cards are.
Alternatively, how "smart" is the M1PR? Does it do all the heavy lifting, then just send a ~128-bit id to the keypad via rs485/i2c/spi/whatever? Or is the M1 itself intimately involved in the transaction (picking challenges, exchanging encryption keys, etc)? If the M1PR itself does all the heavy lifting & ultimately just sends a bare ID, I could probably build my *own* Android-compatible reader ;-)