- Products
- Learn
- Local User Groups
- Partners
- More
Secure Your AI Transformation
9 April @ 12pm SGT / 3pm CET / 2PM EDT
Check Point WAF TechTalk:
Introduction and New Features
AI Security Masters E6: When AI Goes Wrong -
Hallucinations, Jailbreaks, and the Curious Behavior of AI Agents
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
CheckMates Go:
CheckMates Fest
For this purpose I have created a software in the last weeks, which implements this RFID autentication function with R81. For this I used the new "Generic Data Center feature" in R81.
The Generic Data Center feature provides the ability to enforce access to/from IP addresses defined in JSON files located in external web servers ona Raspberry Pi. The „Generic Data Center Objects“ are updated automatically on the Security Gateway each time the JSON file change. There is no need to install policy for the updates to take effect.
Objects created based on these files can be used as a source or a destination in the access control policy.
How does it work:
I have developed a software and hardware with Raspberry Pi that used RFID authentication. When a correct RFID token is detected, the IP of the detected user is written to a JSON file „checkpoint.txt“. In my example the RFID detection software recognised my RFID token and the IP 10.10.52.181 of my laptop IP is insert in the JSON file. The JSON file is read every second by the management server and the IP is enabled in real time on the gateways depending on the rulebase.
PDF with hardware and software instructions:
Raspberry Hardware and Software Installation Guide.pdf
WOW
very impressive project
👍🏻
Hi @HeikoAnkenbrand,
Which RFID chips are supported?
Hi @Joerg_B,
The RC522 RFID Reader module is designed to create a 13.56MHz electromagnetic field that it uses to communicate with the RFID tags (ISO 14443A standard tags).
Champion Heiko strikes again!
How can I replicate the project?
Where can I find instructions?
I believe @HeikoAnkenbrand attached them to the post, actually
Which python versions did you use for this project?
Python 3 (latest version)
nice solution
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 13 | |
| 10 | |
| 8 | |
| 8 | |
| 6 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 |
Tue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesWed 08 Apr 2026 @ 07:00 PM (CST)
ERM al Descubierto: Amenazas Ocultas que Pondrán a Prueba tu Empresa en 2026Tue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesWed 08 Apr 2026 @ 07:00 PM (CST)
ERM al Descubierto: Amenazas Ocultas que Pondrán a Prueba tu Empresa en 2026Tue 14 Apr 2026 @ 03:00 PM (PDT)
Renton, WA: Securing The AI Transformation and Exposure ManagementThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY