High Frequency RFID Key Fob Duplication Instructions
🔐 Schlage 9651T, MIWA, Dormakaba and Vingcard — Cloning Instructions
The Schlage 9651T, MIWA, and Vingcard is a high-frequency encrypted key fob. It is duplicated using the USB reader included in your kit.
✅ High Frequency (Encrypted)
Use the USB reader and PN532 cloning software to decrypt and duplicate the fob.
💻 High Frequency Cloning — USB Reader
- Plug the USB reader into your computer.
-
Download the cloning software for your operating system:
https://github.com/jumpycalm/pn532-cloner/releases/
💻 Choose the Correct File for Your Computer
- PN532-Cloner-Mac-x64.tar — for MacOS
- PN532-Cloner-Win-x64.exe — for Windows
Download and open the version that matches your computer.
🍎 Mac Users — Important Setup Instructions
The file downloaded from GitHub is in .tar format. Double-click the file to extract (unzip) it.
After extraction, locate the unzipped executable file. Hold Control and click the file, then select Open With → Terminal.
If your Mac blocks the app because Apple cannot verify the developer, go to System Settings → Privacy & Security, scroll down, and click “Open Anyway.”
▶️ Cloning Steps
- Download and run the PN532-Cloner file. This will open a Terminal window where the cloning software runs.
- MacOS: Opens the Terminal app.
- Windows: Opens Command Prompt / Windows Terminal.
- Place your original fob on the reader.
⚠️ Do not use the reader on a metal surface.
⚠️ Keep your computer awake during the process. - In the Terminal window, type
rand press Enter. - Wait until you see “Read Success.”
- Remove the original fob and place your blank fob on the reader.
- Type
wand press Enter. - When you see “Write Success”, your new fob is ready to use 🎉
Need help? support@sumokey.com