Menu

Tree [fbf9c1] master /
 History

HTTPS access


File Date Author Commit
 auth 2013-05-14 Rafael Vuijk Rafael Vuijk [c96cc3] Initial commit
 hello 2013-05-14 Rafael Vuijk Rafael Vuijk [c96cc3] Initial commit
 howto 2013-05-14 Rafael Vuijk Rafael Vuijk [c96cc3] Initial commit
 lib 2013-05-14 Rafael Vuijk Rafael Vuijk [c96cc3] Initial commit
 functions.txt 2013-05-14 Rafael Vuijk Rafael Vuijk [c96cc3] Initial commit
 lib.txt 2013-05-14 Rafael Vuijk Rafael Vuijk [c96cc3] Initial commit
 pocketdev_readme.txt 2013-05-14 Rafael Vuijk Rafael Vuijk [fbf9c1] update readme
 readme.txt 2013-05-14 Rafael Vuijk Rafael Vuijk [fbf9c1] update readme

Read Me

Google Authenticator for PocketStation

Based on MikoTools(tm) Pocket Library project.


blog article below (I'm lazy)
http://darkfader.blogspot.nl/2011/10/pocketstation-google-authenticator.html
------------------

 PocketStation Google Authenticator
 Do you have a Google account and want to be more secure? Own a Sony PocketStation? Now you can use this device as a security token to login with 2-factor authentication on the Google site and even use it for logging into your linux machine using a PAM module.
 It supports one key using the 30-second Time-based One-time Password algorithm. It's hashing up a secret key together with the current time to come to a 6 digit number. The small program takes up one memory block.

 I used to collect handheld game devices and other gadgets. The PocketStation once caught my eye but could not easily find it here. It's a PlayStation-memory-card device with a small display that can run mini-games. It was supposed to be better than the Dreamcast VMU, which I owned already. The PocketStation has infrared, better CPU, better battery life, better software support, bettter looks.
 When I went to Japan for holiday some year or two ago, I finally bought a 2nd hand PocketStation. I'm not playing so many games anymore, so it was just waiting for me to get a good idea and get the tools set up.
 The idea was to use this device instead of my iPhone doing the authenticator part. Of course, malware on a phone would not be good anyway, but getting the key out of the authenticator app is a lot easier than hijacking a browser session. Also, switching between the authenticator and browser can take some while and has a risk of apps being closed when running out of memory. That sums up the risks of jailbroken iPhone I guess.
 Anyways, with one small PocketStation made, I could try to find other applications. One idea I just came up with is using the infrared as a replacement for an Apple remote and lock my MacBook using the iAlertU application.

 Anyways, what I currently have for you:
 [imagine a picture here] < Emulator screenshot.

 YouTube video of real device.
	http://www.youtube.com/watch?v=3echEnfSEfE
 Pre-compiled zip. (only need to add your key.)
	https://www.dropbox.com/s/9itmlyhia2h9mku/auth.compiled.zip
 Source-only zip.
	https://www.dropbox.com/s/9itmlyhia2h9mku/auth.src.zip
 More info in the readme contained in the zip files.

 For programming the PocketStation,
 1) I used an official Sony PS3 memory adapter. It's normally used to transfer old savegames into the PS3. For this, I used a program called MCRWwin.
 There are other ways to do it but I have not investigated them yet:
 2) Using and old hacked PlayStation and some save game editor homebrew application.
 3) Use a different interface device, such as a parallel port. Check out the PSXGameEdit or PSX Memory Card Manager pages for more information. 
	http://moberg-dybdal.dk/psxge/  &   http://psxmem.raphnet.net/
 
credits
-------
http://www.geocities.co.jp/Playtown-Bingo/3888/
http://www.pocketdev.f2s.com

MikoTools(tm) Pocket Library for PocketStation Version 1.03 are 
Copyright(c) 1999-2000 Miko.Hoshina

Thanks to gothi (gothi@pocketdev.f2s.com) for his English translation.