Paget's NFC CARD RFID cloning device was presented at the recent RSA Security Conference in San Francisco , where he demonstrated what sort of device could be employed to steal access codes from HID brand proximity cards, store them, then utilize the stolen codes to fool a HID card reader.
His presentation at Black Hat would have included schematics and source code that attendees might use to generate their particular cloning device, and a discussion of vulnerable implementations of RFID technology in a wide variety of devices,
a security alarm researcher who worked for Internet Security Software Systems during the time.
HID combo cards claimed that Paget's talk would infringe upon two patents the company owns, one dating to 1991 and the other dating to 1992 . Both cover methods of detecting RFID signals from the transponder baked into a tool plus an "interrogator," according to an origin knowledgeable about HID's claims.
|