SlideShare a Scribd company logo
1 of 9
Download to read offline
Latch Mycar Installation and User
Manual
Diego Alejandro Gamboa Peña
Bogota-Colombia.
Installation
Summary
This hack is intended to control the start of a vehicle from latch. It is divided into two parts; The first is
a web application that is responsible for storing in a database the serial of the vehicle (It is understood
by serial of the vehicle to the code associated with the raspberry pi) associated with the accountid of
the user latch, The second consists of a script designed in Python that controls the boot circuit from the
constraints determined by latch for the vehicle serial corresponding to the larch user's accountid.
Web Application
To facilitate the use of the plugin was implemented an application that will provide the pairing service
between the device and latch. The application is built in PHP (from template) and allows the registration
of users and through a serial associated with the raspberry pi, it performs the synchronization between
the device and latch storing the user's accountId.
The built application is in the GitHub CarSec repository, it consists of a registration form, an entry form,
and a restAPI used by the client application to obtain the data needed to connect with latch.
Description.
- CarSec: Is a web application in php that allows the pairing of the raspberry with latch and
provides the services and information necessary for the status queries of latch services. At this
time the application of tests can be seen at http://107.170.113.246/carsec/
- Mycar: Plugin in python for consumption of latch services and state checking.
- Latch: Service of elevenpaths described with amplitude in latch.elevenpaths.com
In the following flow diagram we see the basic sequence to perform the pairing of our mycar System with
latch.
Illustration 1 Pairing Sequence Diagram
1. User registration in the application: in this step the user account is created in CarSec, application
that will be in charge of orchestrating the services between latch and the vehicle. In screen 1
we can see the data needed to register.
Image 1
1. Login: using a simple login screen the user will be able to access the application.
Image 2
2. Initial screen: after login in the application we will see image 3. This screen shows the list of
vehicles we have with MyCar devices
Image 3
3. In the Subscribe Vehicle option is where we will do the pairing of devices, three fields must be
completed:
Vehicle: Name you want to give the vehicle in the application.
Device Serial Number: Serial number enrolled in raspberry PI.
Latch Pair Code: Pairing code generated in the latch application.
If the process is successful we will see our vehicle registered in the home page.
Image 4
In case you want to install the CarSec application on our own server the installation process will be very
simple:
Prerequisite software:
1. Linux distribution (Tested on Ubuntu 16.04).
2. Apache web server
3. MySQL
4. php
Installation:
1. Download the source code from GITHUB:
https://github.com/skyg4mb/LatchMyCar/tree/master/carsec
2. Placing it in the path that was determined as Apache web server, is regularly /var/www/html
3. Modify the following files with the connection data of your database.
a. dbconnect.php
b. include/config.php
c. server_response.php
4. Create database:
a. The database must contain for the minimum operation.
i. Usuarios table:
ii. Vehicles table:
Client
For the installation of the plugin is necessary both hardware and software, the hardware listing is as
follows:
- RaspBerry Pi 3 model B
- 1 Resistence 1.1 kohms
- 1 Resistence 330 ohms
- 1 Rele array for Raspberry
Prerequisite software:
- Raspbian https://www.raspberrypi.org/downloads/raspbian/
- Latch mycar https://github.com/skyg4mb/LatchMyCar/tree/master/mycar
Software installation:
The software does not need additional installation to be downloaded inside the raspberry pi, it is advised
to store in the path / opt / LatchMyCar
The following files must be modified:
- Detect.py
o In the method called latchService ()
 AppId: App ID given by latch
 SecretId: Secret code of application, granted by latch
 url: Serial number of the raspberry-pi, for now it can be any numeric code but
must match the one registered in the web page.
Hardware Installation.
In this case the installation test was carried out on a Ford EcoSport 2106, the ignition method of this
vehicle is explained in illustration 2.
Illustration 2 Ignition Ford EcoSport Original
To implement the Latch Mycar system the circuit will be modified by the one shown in figure 3, the
description of each compose is next:
Emergency: This switch serves to disable latch mycar in case of emergency.
R1: 1K
R2: 330
RLY1: A specific ras arrangement is recommended for raspberry pi.
RBPI: Raspberry pi 3 model B
R3: 330
R4: 1k
P4-P22: GPIO ports.
Illustration 3 Ignition circuit modified with LatchMyCar
Here is the sequence diagram used by the client application, in case the service is not blocked:
Figure 4 Sequence diagram in case of service available
Use case diagram in case of service blocked:
Figure 5 Sequence diagram in case of service blocked

More Related Content

Similar to Latch Mycar Installation and User Manual

IRJET- Car Black Box System for Accidental Evidence Collection
IRJET- Car Black Box System for Accidental Evidence CollectionIRJET- Car Black Box System for Accidental Evidence Collection
IRJET- Car Black Box System for Accidental Evidence CollectionIRJET Journal
 
Raspberry Pi Vehicles Number Plate Recognition
Raspberry Pi Vehicles Number Plate RecognitionRaspberry Pi Vehicles Number Plate Recognition
Raspberry Pi Vehicles Number Plate RecognitionIRJET Journal
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET-  	  Recognition of Vehicle Number Plate using Raspberry PIIRJET-  	  Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET Journal
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET Journal
 
VPMS-PPT-wgubsa.pptx
VPMS-PPT-wgubsa.pptxVPMS-PPT-wgubsa.pptx
VPMS-PPT-wgubsa.pptxMadanNR
 
[MBF2] Webinar API Orange Partner #2
[MBF2] Webinar API Orange Partner #2[MBF2] Webinar API Orange Partner #2
[MBF2] Webinar API Orange Partner #2BeMyApp
 
IRJET- Automatic Toll Collection System using ALPR and Biometrics System.
IRJET- Automatic Toll Collection System using ALPR and Biometrics System.IRJET- Automatic Toll Collection System using ALPR and Biometrics System.
IRJET- Automatic Toll Collection System using ALPR and Biometrics System.IRJET Journal
 
IRJET- Automatic Toll Collection System using ALPR and Biometrics System
IRJET- Automatic Toll Collection System using ALPR and Biometrics SystemIRJET- Automatic Toll Collection System using ALPR and Biometrics System
IRJET- Automatic Toll Collection System using ALPR and Biometrics SystemIRJET Journal
 
IRJET - Vahaan Registration System
IRJET - Vahaan Registration SystemIRJET - Vahaan Registration System
IRJET - Vahaan Registration SystemIRJET Journal
 
Open stack gbp final sn-4-slideshare
Open stack gbp final sn-4-slideshareOpen stack gbp final sn-4-slideshare
Open stack gbp final sn-4-slideshareSumit Naiksatam
 
All you need to know to deploy applications on Kubernetes
All you need to know to deploy applications on KubernetesAll you need to know to deploy applications on Kubernetes
All you need to know to deploy applications on KubernetesOleksandr Slynko
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET Journal
 
No_parking_ANRP_phase_bnkgdssrgiggdsdfhkbvxsfhjbcdfhhvcdfyhvxdghbcddyhvddyhh2...
No_parking_ANRP_phase_bnkgdssrgiggdsdfhkbvxsfhjbcdfhhvcdfyhvxdghbcddyhvddyhh2...No_parking_ANRP_phase_bnkgdssrgiggdsdfhkbvxsfhjbcdfhhvcdfyhvxdghbcddyhvddyhh2...
No_parking_ANRP_phase_bnkgdssrgiggdsdfhkbvxsfhjbcdfhhvcdfyhvxdghbcddyhvddyhh2...Geetha982072
 
15minutesintroductiontoappdynamics1.pdf
15minutesintroductiontoappdynamics1.pdf15minutesintroductiontoappdynamics1.pdf
15minutesintroductiontoappdynamics1.pdfAnuSelvaraj2
 
Trimantra - Project Portfolio_NET
Trimantra - Project Portfolio_NETTrimantra - Project Portfolio_NET
Trimantra - Project Portfolio_NETMihir G.
 
IRJET - Automated Gate for Vehicular Entry using Image Processing
IRJET - Automated Gate for Vehicular Entry using Image ProcessingIRJET - Automated Gate for Vehicular Entry using Image Processing
IRJET - Automated Gate for Vehicular Entry using Image ProcessingIRJET Journal
 
Beyond Web Interfaces
Beyond Web InterfacesBeyond Web Interfaces
Beyond Web Interfacesciacchi
 

Similar to Latch Mycar Installation and User Manual (20)

IRJET- Car Black Box System for Accidental Evidence Collection
IRJET- Car Black Box System for Accidental Evidence CollectionIRJET- Car Black Box System for Accidental Evidence Collection
IRJET- Car Black Box System for Accidental Evidence Collection
 
Raspberry Pi Vehicles Number Plate Recognition
Raspberry Pi Vehicles Number Plate RecognitionRaspberry Pi Vehicles Number Plate Recognition
Raspberry Pi Vehicles Number Plate Recognition
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET-  	  Recognition of Vehicle Number Plate using Raspberry PIIRJET-  	  Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
 
VPMS-PPT-wgubsa.pptx
VPMS-PPT-wgubsa.pptxVPMS-PPT-wgubsa.pptx
VPMS-PPT-wgubsa.pptx
 
[MBF2] Webinar API Orange Partner #2
[MBF2] Webinar API Orange Partner #2[MBF2] Webinar API Orange Partner #2
[MBF2] Webinar API Orange Partner #2
 
Online banking
Online bankingOnline banking
Online banking
 
IRJET- Automatic Toll Collection System using ALPR and Biometrics System.
IRJET- Automatic Toll Collection System using ALPR and Biometrics System.IRJET- Automatic Toll Collection System using ALPR and Biometrics System.
IRJET- Automatic Toll Collection System using ALPR and Biometrics System.
 
Backtrack Manual Part4
Backtrack Manual Part4Backtrack Manual Part4
Backtrack Manual Part4
 
IRJET- Automatic Toll Collection System using ALPR and Biometrics System
IRJET- Automatic Toll Collection System using ALPR and Biometrics SystemIRJET- Automatic Toll Collection System using ALPR and Biometrics System
IRJET- Automatic Toll Collection System using ALPR and Biometrics System
 
IRJET - Vahaan Registration System
IRJET - Vahaan Registration SystemIRJET - Vahaan Registration System
IRJET - Vahaan Registration System
 
Open stack gbp final sn-4-slideshare
Open stack gbp final sn-4-slideshareOpen stack gbp final sn-4-slideshare
Open stack gbp final sn-4-slideshare
 
All you need to know to deploy applications on Kubernetes
All you need to know to deploy applications on KubernetesAll you need to know to deploy applications on Kubernetes
All you need to know to deploy applications on Kubernetes
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable Software
 
Sst hackathon express
Sst hackathon expressSst hackathon express
Sst hackathon express
 
No_parking_ANRP_phase_bnkgdssrgiggdsdfhkbvxsfhjbcdfhhvcdfyhvxdghbcddyhvddyhh2...
No_parking_ANRP_phase_bnkgdssrgiggdsdfhkbvxsfhjbcdfhhvcdfyhvxdghbcddyhvddyhh2...No_parking_ANRP_phase_bnkgdssrgiggdsdfhkbvxsfhjbcdfhhvcdfyhvxdghbcddyhvddyhh2...
No_parking_ANRP_phase_bnkgdssrgiggdsdfhkbvxsfhjbcdfhhvcdfyhvxdghbcddyhvddyhh2...
 
15minutesintroductiontoappdynamics1.pdf
15minutesintroductiontoappdynamics1.pdf15minutesintroductiontoappdynamics1.pdf
15minutesintroductiontoappdynamics1.pdf
 
Trimantra - Project Portfolio_NET
Trimantra - Project Portfolio_NETTrimantra - Project Portfolio_NET
Trimantra - Project Portfolio_NET
 
IRJET - Automated Gate for Vehicular Entry using Image Processing
IRJET - Automated Gate for Vehicular Entry using Image ProcessingIRJET - Automated Gate for Vehicular Entry using Image Processing
IRJET - Automated Gate for Vehicular Entry using Image Processing
 
Beyond Web Interfaces
Beyond Web InterfacesBeyond Web Interfaces
Beyond Web Interfaces
 

More from Telefónica

Índice de libro "Historias Cortas sobre Fondo Azul" de Willy en 0xWord
Índice de libro "Historias Cortas sobre Fondo Azul" de Willy en 0xWordÍndice de libro "Historias Cortas sobre Fondo Azul" de Willy en 0xWord
Índice de libro "Historias Cortas sobre Fondo Azul" de Willy en 0xWordTelefónica
 
Índice del libro: Máxima Seguridad en Windows: Secretos Técnicos. 6ª Edición ...
Índice del libro: Máxima Seguridad en Windows: Secretos Técnicos. 6ª Edición ...Índice del libro: Máxima Seguridad en Windows: Secretos Técnicos. 6ª Edición ...
Índice del libro: Máxima Seguridad en Windows: Secretos Técnicos. 6ª Edición ...Telefónica
 
Índice del libro "Hacking Web3: Challenge Acepted!" de 0xWord
Índice del libro "Hacking Web3: Challenge Acepted!" de 0xWordÍndice del libro "Hacking Web3: Challenge Acepted!" de 0xWord
Índice del libro "Hacking Web3: Challenge Acepted!" de 0xWordTelefónica
 
Índice del libro "Amazon Web Services: Hardening de Infraestructuras Cloud Co...
Índice del libro "Amazon Web Services: Hardening de Infraestructuras Cloud Co...Índice del libro "Amazon Web Services: Hardening de Infraestructuras Cloud Co...
Índice del libro "Amazon Web Services: Hardening de Infraestructuras Cloud Co...Telefónica
 
Índice del Libro "Ciberestafas: La historia de nunca acabar" (2ª Edición) de ...
Índice del Libro "Ciberestafas: La historia de nunca acabar" (2ª Edición) de ...Índice del Libro "Ciberestafas: La historia de nunca acabar" (2ª Edición) de ...
Índice del Libro "Ciberestafas: La historia de nunca acabar" (2ª Edición) de ...Telefónica
 
Índice del Libro "Storytelling para Emprendedores"
Índice del Libro "Storytelling para Emprendedores"Índice del Libro "Storytelling para Emprendedores"
Índice del Libro "Storytelling para Emprendedores"Telefónica
 
Digital Latches for Hacker & Developer
Digital Latches for Hacker & DeveloperDigital Latches for Hacker & Developer
Digital Latches for Hacker & DeveloperTelefónica
 
Índice del libro "Hardening de servidores GNU / Linux 5ª Edición (Gold Edition)"
Índice del libro "Hardening de servidores GNU / Linux 5ª Edición (Gold Edition)"Índice del libro "Hardening de servidores GNU / Linux 5ª Edición (Gold Edition)"
Índice del libro "Hardening de servidores GNU / Linux 5ª Edición (Gold Edition)"Telefónica
 
WhatsApp INT: OSINT en WhatsApp
WhatsApp INT: OSINT en WhatsAppWhatsApp INT: OSINT en WhatsApp
WhatsApp INT: OSINT en WhatsAppTelefónica
 
Índice del libro "De la Caverna al Metaverso" de 0xWord.com
Índice del libro "De la Caverna al Metaverso" de 0xWord.comÍndice del libro "De la Caverna al Metaverso" de 0xWord.com
Índice del libro "De la Caverna al Metaverso" de 0xWord.comTelefónica
 
20º Máster Universitario de Ciberseguridad UNIR
20º Máster Universitario de Ciberseguridad UNIR20º Máster Universitario de Ciberseguridad UNIR
20º Máster Universitario de Ciberseguridad UNIRTelefónica
 
BootCamp Online en DevOps (and SecDevOps) de GeeksHubs Academy
BootCamp Online en DevOps (and SecDevOps) de GeeksHubs AcademyBootCamp Online en DevOps (and SecDevOps) de GeeksHubs Academy
BootCamp Online en DevOps (and SecDevOps) de GeeksHubs AcademyTelefónica
 
Índice del libro "Ciberseguridad de tú a tú" de 0xWord
Índice del libro "Ciberseguridad de tú a tú"  de 0xWordÍndice del libro "Ciberseguridad de tú a tú"  de 0xWord
Índice del libro "Ciberseguridad de tú a tú" de 0xWordTelefónica
 
Índice del libro "Open Source INTelligence (OSINT): Investigar personas e Ide...
Índice del libro "Open Source INTelligence (OSINT): Investigar personas e Ide...Índice del libro "Open Source INTelligence (OSINT): Investigar personas e Ide...
Índice del libro "Open Source INTelligence (OSINT): Investigar personas e Ide...Telefónica
 
Índice del libro "Social Hunters" de 0xWord
Índice del libro "Social Hunters" de 0xWordÍndice del libro "Social Hunters" de 0xWord
Índice del libro "Social Hunters" de 0xWordTelefónica
 
Índice del libro "Kubernetes para profesionales: Desde cero al despliegue de ...
Índice del libro "Kubernetes para profesionales: Desde cero al despliegue de ...Índice del libro "Kubernetes para profesionales: Desde cero al despliegue de ...
Índice del libro "Kubernetes para profesionales: Desde cero al despliegue de ...Telefónica
 
Los retos sociales y éticos del Metaverso
Los retos sociales y éticos del MetaversoLos retos sociales y éticos del Metaverso
Los retos sociales y éticos del MetaversoTelefónica
 
Índice del Libro "Ciberestafas: La historia de nunca acabar" de 0xWord
Índice del Libro "Ciberestafas: La historia de nunca acabar" de 0xWordÍndice del Libro "Ciberestafas: La historia de nunca acabar" de 0xWord
Índice del Libro "Ciberestafas: La historia de nunca acabar" de 0xWordTelefónica
 
Índice del libro "Docker: SecDevOps" 2ª Edición de 0xWord
Índice del libro "Docker: SecDevOps" 2ª Edición de 0xWordÍndice del libro "Docker: SecDevOps" 2ª Edición de 0xWord
Índice del libro "Docker: SecDevOps" 2ª Edición de 0xWordTelefónica
 
Índice del libro "Malware moderno: Técnicas avanzadas y su influencia en la i...
Índice del libro "Malware moderno: Técnicas avanzadas y su influencia en la i...Índice del libro "Malware moderno: Técnicas avanzadas y su influencia en la i...
Índice del libro "Malware moderno: Técnicas avanzadas y su influencia en la i...Telefónica
 

More from Telefónica (20)

Índice de libro "Historias Cortas sobre Fondo Azul" de Willy en 0xWord
Índice de libro "Historias Cortas sobre Fondo Azul" de Willy en 0xWordÍndice de libro "Historias Cortas sobre Fondo Azul" de Willy en 0xWord
Índice de libro "Historias Cortas sobre Fondo Azul" de Willy en 0xWord
 
Índice del libro: Máxima Seguridad en Windows: Secretos Técnicos. 6ª Edición ...
Índice del libro: Máxima Seguridad en Windows: Secretos Técnicos. 6ª Edición ...Índice del libro: Máxima Seguridad en Windows: Secretos Técnicos. 6ª Edición ...
Índice del libro: Máxima Seguridad en Windows: Secretos Técnicos. 6ª Edición ...
 
Índice del libro "Hacking Web3: Challenge Acepted!" de 0xWord
Índice del libro "Hacking Web3: Challenge Acepted!" de 0xWordÍndice del libro "Hacking Web3: Challenge Acepted!" de 0xWord
Índice del libro "Hacking Web3: Challenge Acepted!" de 0xWord
 
Índice del libro "Amazon Web Services: Hardening de Infraestructuras Cloud Co...
Índice del libro "Amazon Web Services: Hardening de Infraestructuras Cloud Co...Índice del libro "Amazon Web Services: Hardening de Infraestructuras Cloud Co...
Índice del libro "Amazon Web Services: Hardening de Infraestructuras Cloud Co...
 
Índice del Libro "Ciberestafas: La historia de nunca acabar" (2ª Edición) de ...
Índice del Libro "Ciberestafas: La historia de nunca acabar" (2ª Edición) de ...Índice del Libro "Ciberestafas: La historia de nunca acabar" (2ª Edición) de ...
Índice del Libro "Ciberestafas: La historia de nunca acabar" (2ª Edición) de ...
 
Índice del Libro "Storytelling para Emprendedores"
Índice del Libro "Storytelling para Emprendedores"Índice del Libro "Storytelling para Emprendedores"
Índice del Libro "Storytelling para Emprendedores"
 
Digital Latches for Hacker & Developer
Digital Latches for Hacker & DeveloperDigital Latches for Hacker & Developer
Digital Latches for Hacker & Developer
 
Índice del libro "Hardening de servidores GNU / Linux 5ª Edición (Gold Edition)"
Índice del libro "Hardening de servidores GNU / Linux 5ª Edición (Gold Edition)"Índice del libro "Hardening de servidores GNU / Linux 5ª Edición (Gold Edition)"
Índice del libro "Hardening de servidores GNU / Linux 5ª Edición (Gold Edition)"
 
WhatsApp INT: OSINT en WhatsApp
WhatsApp INT: OSINT en WhatsAppWhatsApp INT: OSINT en WhatsApp
WhatsApp INT: OSINT en WhatsApp
 
Índice del libro "De la Caverna al Metaverso" de 0xWord.com
Índice del libro "De la Caverna al Metaverso" de 0xWord.comÍndice del libro "De la Caverna al Metaverso" de 0xWord.com
Índice del libro "De la Caverna al Metaverso" de 0xWord.com
 
20º Máster Universitario de Ciberseguridad UNIR
20º Máster Universitario de Ciberseguridad UNIR20º Máster Universitario de Ciberseguridad UNIR
20º Máster Universitario de Ciberseguridad UNIR
 
BootCamp Online en DevOps (and SecDevOps) de GeeksHubs Academy
BootCamp Online en DevOps (and SecDevOps) de GeeksHubs AcademyBootCamp Online en DevOps (and SecDevOps) de GeeksHubs Academy
BootCamp Online en DevOps (and SecDevOps) de GeeksHubs Academy
 
Índice del libro "Ciberseguridad de tú a tú" de 0xWord
Índice del libro "Ciberseguridad de tú a tú"  de 0xWordÍndice del libro "Ciberseguridad de tú a tú"  de 0xWord
Índice del libro "Ciberseguridad de tú a tú" de 0xWord
 
Índice del libro "Open Source INTelligence (OSINT): Investigar personas e Ide...
Índice del libro "Open Source INTelligence (OSINT): Investigar personas e Ide...Índice del libro "Open Source INTelligence (OSINT): Investigar personas e Ide...
Índice del libro "Open Source INTelligence (OSINT): Investigar personas e Ide...
 
Índice del libro "Social Hunters" de 0xWord
Índice del libro "Social Hunters" de 0xWordÍndice del libro "Social Hunters" de 0xWord
Índice del libro "Social Hunters" de 0xWord
 
Índice del libro "Kubernetes para profesionales: Desde cero al despliegue de ...
Índice del libro "Kubernetes para profesionales: Desde cero al despliegue de ...Índice del libro "Kubernetes para profesionales: Desde cero al despliegue de ...
Índice del libro "Kubernetes para profesionales: Desde cero al despliegue de ...
 
Los retos sociales y éticos del Metaverso
Los retos sociales y éticos del MetaversoLos retos sociales y éticos del Metaverso
Los retos sociales y éticos del Metaverso
 
Índice del Libro "Ciberestafas: La historia de nunca acabar" de 0xWord
Índice del Libro "Ciberestafas: La historia de nunca acabar" de 0xWordÍndice del Libro "Ciberestafas: La historia de nunca acabar" de 0xWord
Índice del Libro "Ciberestafas: La historia de nunca acabar" de 0xWord
 
Índice del libro "Docker: SecDevOps" 2ª Edición de 0xWord
Índice del libro "Docker: SecDevOps" 2ª Edición de 0xWordÍndice del libro "Docker: SecDevOps" 2ª Edición de 0xWord
Índice del libro "Docker: SecDevOps" 2ª Edición de 0xWord
 
Índice del libro "Malware moderno: Técnicas avanzadas y su influencia en la i...
Índice del libro "Malware moderno: Técnicas avanzadas y su influencia en la i...Índice del libro "Malware moderno: Técnicas avanzadas y su influencia en la i...
Índice del libro "Malware moderno: Técnicas avanzadas y su influencia en la i...
 

Recently uploaded

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Latch Mycar Installation and User Manual

  • 1. Latch Mycar Installation and User Manual Diego Alejandro Gamboa Peña Bogota-Colombia. Installation Summary This hack is intended to control the start of a vehicle from latch. It is divided into two parts; The first is a web application that is responsible for storing in a database the serial of the vehicle (It is understood by serial of the vehicle to the code associated with the raspberry pi) associated with the accountid of the user latch, The second consists of a script designed in Python that controls the boot circuit from the constraints determined by latch for the vehicle serial corresponding to the larch user's accountid. Web Application To facilitate the use of the plugin was implemented an application that will provide the pairing service between the device and latch. The application is built in PHP (from template) and allows the registration of users and through a serial associated with the raspberry pi, it performs the synchronization between the device and latch storing the user's accountId. The built application is in the GitHub CarSec repository, it consists of a registration form, an entry form, and a restAPI used by the client application to obtain the data needed to connect with latch. Description. - CarSec: Is a web application in php that allows the pairing of the raspberry with latch and provides the services and information necessary for the status queries of latch services. At this time the application of tests can be seen at http://107.170.113.246/carsec/ - Mycar: Plugin in python for consumption of latch services and state checking. - Latch: Service of elevenpaths described with amplitude in latch.elevenpaths.com
  • 2. In the following flow diagram we see the basic sequence to perform the pairing of our mycar System with latch. Illustration 1 Pairing Sequence Diagram 1. User registration in the application: in this step the user account is created in CarSec, application that will be in charge of orchestrating the services between latch and the vehicle. In screen 1 we can see the data needed to register.
  • 3. Image 1 1. Login: using a simple login screen the user will be able to access the application. Image 2
  • 4. 2. Initial screen: after login in the application we will see image 3. This screen shows the list of vehicles we have with MyCar devices Image 3 3. In the Subscribe Vehicle option is where we will do the pairing of devices, three fields must be completed: Vehicle: Name you want to give the vehicle in the application. Device Serial Number: Serial number enrolled in raspberry PI. Latch Pair Code: Pairing code generated in the latch application. If the process is successful we will see our vehicle registered in the home page.
  • 5. Image 4 In case you want to install the CarSec application on our own server the installation process will be very simple: Prerequisite software: 1. Linux distribution (Tested on Ubuntu 16.04). 2. Apache web server 3. MySQL 4. php Installation: 1. Download the source code from GITHUB: https://github.com/skyg4mb/LatchMyCar/tree/master/carsec 2. Placing it in the path that was determined as Apache web server, is regularly /var/www/html 3. Modify the following files with the connection data of your database. a. dbconnect.php b. include/config.php c. server_response.php 4. Create database: a. The database must contain for the minimum operation. i. Usuarios table: ii. Vehicles table: Client
  • 6. For the installation of the plugin is necessary both hardware and software, the hardware listing is as follows: - RaspBerry Pi 3 model B - 1 Resistence 1.1 kohms - 1 Resistence 330 ohms - 1 Rele array for Raspberry Prerequisite software: - Raspbian https://www.raspberrypi.org/downloads/raspbian/ - Latch mycar https://github.com/skyg4mb/LatchMyCar/tree/master/mycar Software installation: The software does not need additional installation to be downloaded inside the raspberry pi, it is advised to store in the path / opt / LatchMyCar The following files must be modified: - Detect.py o In the method called latchService ()  AppId: App ID given by latch  SecretId: Secret code of application, granted by latch  url: Serial number of the raspberry-pi, for now it can be any numeric code but must match the one registered in the web page. Hardware Installation.
  • 7. In this case the installation test was carried out on a Ford EcoSport 2106, the ignition method of this vehicle is explained in illustration 2. Illustration 2 Ignition Ford EcoSport Original To implement the Latch Mycar system the circuit will be modified by the one shown in figure 3, the description of each compose is next: Emergency: This switch serves to disable latch mycar in case of emergency. R1: 1K R2: 330 RLY1: A specific ras arrangement is recommended for raspberry pi. RBPI: Raspberry pi 3 model B R3: 330 R4: 1k P4-P22: GPIO ports.
  • 8. Illustration 3 Ignition circuit modified with LatchMyCar
  • 9. Here is the sequence diagram used by the client application, in case the service is not blocked: Figure 4 Sequence diagram in case of service available Use case diagram in case of service blocked: Figure 5 Sequence diagram in case of service blocked