My work uses the (relatively) recent HID Seos cards and readers for their access control. I’ve looked through the datasheet, and as far as I can tell although the vivokey has cryptographic ability, seos is proprietary and therefore I’m not really sure if it will work as a replacement for my key card. The card I have wasn’t marked with exact branding, but from what I can tell it’s part of their 500x series, and therefore isn’t compatible with any existing legacy technologies. All the relevant branding I could see was the “HID Seos IP” on the bottom left of the card, and on the bottom right “xt”.
Can someone with more experience than me take a look and see if these are compatible, and if possible explain why/why not so I can be more informed?
Thank you.
It looks like SEOS is a java card applet… so no chance of cloning your card to an implant. There may be a future though where SEOS runs on the VivoKey Flex One… just would require cooperation from HID. This would be a Fidesmo question though.
So if my work place uses this same type of cards and readers, is there any implant that can act as one of this cards? Not to clone an existing one but as a completely new one?
It’s the start of a possible seos emulator Java card applet. It would need some significant development, but it might just be possible to create a seos applet for Apex
I was looking at this earlier as well, albeit as a gateway into some other research (I’m curious if there’s a way to emulate iClass SE with Apex). I might poke at it a little more.
I know this is an old post, but I ran across this related paper online. And don’t see it elsewhere. Might be interesting to someone researching Seos.
“A relay attack against HID Seos” - https://eprint.iacr.org/2023/450.pdf
Thanks. I recollect looking at that area once so far, but am often unsure memory wise.
I added a bit more to my comment, as I see they have a revised link to their code.