INTEGRATION WITH THE SOFTWARE INTERFACE OF THE COM SERVER FOR AUTHORIZED USER
Denis Ratov
ratov@snu.edu.uaVolodymyr Dahl East Ukrainian University, Faculty of Information Technology and Electronics, Department of Programming and Mathematics, Severodonetsk (Ukraine)
Abstract
The article is devoted to the development of a software controller for automation of access to tools and object model of the multifunctional graphic editor Adobe Photoshop. The work of the graphic editor is initiated in the form of a COM object, which contains methods available to the software controller through the COM interface, which allows the software to use the functionality of the editor. To restrict unauthorized access, a software authorization control protocol is proposed, which is based on the use of binding to the computer hardware and encryption by a 128-bit MD5 public key hashing algorithm.
Keywords:
automation controller, COM object, authorizationReferences
Artemov, M. (2007). Basics of COM technologies. Voronezh. p. 84.
Google Scholar
Authorization. (n.d.). Wikipedia. Retrieved May 12, 2021 from https://ru.wikipedia.org/wiki/Authorization
Google Scholar
Elmanova, N., Trepalin, S., & Tentser, A. (2003). Delphi and COM technology. Petersburg. p. 698.
Google Scholar
Identification. (n.d.). Wikipedia. Retrieved May 12, 2021 from https://ru.wikipedia.org/wiki/Identification
Google Scholar
MD5. (n.d.). Wikipedia. Retrieved May 12, 2021 from https://ru.wikipedia.org/wiki/MD5
Google Scholar
Moldovyan, N., & Moldovyan, A. (2005). Introduced at the cryptosystem with an open key. Petersburg. p. 288.
Google Scholar
Ratov, D. (2020a). Architectural paradigm of the interactive interface module in the cloud technology model. Applied Computer Science, 16(4), 48–55. http://doi.org/10.23743/acs-2020-28
Google Scholar
Ratov, D. (2020b). Model of the module for the interface of the information web-system. Mathematical machines and systems. Kiev, 4, 74–81.
DOI: https://doi.org/10.34121/1028-9763-2020-4-74-81
Google Scholar
RSA class. (n.d.). Code.google.com. Retrieved May 12, 2021 from http://code.google.com/p/phpjsrsa/source/browse/trunk/rsa.class.php?r=6
Google Scholar
Service Software Activation Service. (n.d.). Softactivation.com. Retrieved May 12, 2021 from http://www.softactivation.com/asp/getstarted.asp
Google Scholar
Sklyarov, D. (2004). Mystery for the capture of evil information. Petersburg. p. 288.
Google Scholar
Software as a service. (n.d.). Wikipedia. Retrieved May 12, 2021 from http://ru.wikipedia.org/wiki/Software_as_a_service
Google Scholar
System for software retrieval of additional information from unauthorized copies of Asprotect. (n.d.). Jak.koshachek.com. Retrieved May 12, 2021 from https://jak.koshachek.com/articles/asprotect-32-sistema-programnogo-zahistu-32-bitnih.html
Google Scholar
User authorization. (n.d.). Academic.ru. Retrieved May 12, 2021 from https://dic.academic.ru/dic.nsf/business/17457
Google Scholar
Varlataya, S., & Shakhanova, M. (2007). Software and hardware protection of information. Vladivostok. p. 318.
Google Scholar
Authors
Denis Ratovratov@snu.edu.ua
Volodymyr Dahl East Ukrainian University, Faculty of Information Technology and Electronics, Department of Programming and Mathematics, Severodonetsk Ukraine
Statistics
Abstract views: 187PDF downloads: 24
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in Applied Computer Science are open-access and distributed under the terms of the Creative Commons Attribution 4.0 International License.
Most read articles by the same author(s)
- Denis RATOV, ARCHITECTURAL PARADIGM OF THE INTERACTIVE INTERFACE MODULE IN THE CLOUD TECHNOLOGY MODEL , Applied Computer Science: Vol. 16 No. 4 (2020)
- Denis RATOV, Vladimir LYFAR, MODELING TRANSMISSION MECHANISMS WITH DETERMINATION OF EFFICIENCY , Applied Computer Science: Vol. 16 No. 1 (2020)
Similar Articles
- ABDERRAHIM BAHANI, El Houssine Ech-Chhibat, Hassan SAMRI, Laila AIT MAALEM , Hicham AIT EL ATTAR , INTELLIGENT CONTROLLING THE GRIPPING FORCE OF AN OBJECT BY TWO COMPUTER-CONTROLLED COOPERATIVE ROBOTS , Applied Computer Science: Vol. 19 No. 1 (2023)
- Noor SABAH, Ekhlas HAMEED, Muayed S AL-HUSEINY, OPTIMAL SLIDING MODE CONTROLLER DESIGN BASED ON WHALE OPTIMIZATION ALGORITHM FOR LOWER LIMB REHABILITATION ROBOT , Applied Computer Science: Vol. 17 No. 3 (2021)
- Andrzej Jardzioch, Wioletta Marczak, APPLICATION OF A FUZZY CONTROLLER IN THE PROCESS OF AUTOMATED POLYETHYLENE FILM THICKNESS CONTROL , Applied Computer Science: Vol. 17 No. 3 (2021)
- Kuppan Chetty RAMANATHAN, Manju MOHAN, Joshuva AROCKIA DHANRAJ, BACKWARD MOTION PLANNING AND CONTROL OF MULTIPLE MOBILE ROBOTS MOVING IN TIGHTLY COUPLED FORMATIONS , Applied Computer Science: Vol. 17 No. 3 (2021)
- Rawaa HAAMED, Ekhlas HAMEED, CONTROLLING THE MEAN ARTERIAL PRESSURE BY MODIFIED MODEL REFERENCE ADAPTIVE CONTROLLER BASED ON TWO OPTIMIZATION ALGORITHMS , Applied Computer Science: Vol. 16 No. 2 (2020)
- Nasir ALAWAD, Afaf ALSEADY, FUZZY CONTROLLER OF MODEL REDUCTION DISTILLATION COLUMN WITH MINIMAL RULES , Applied Computer Science: Vol. 16 No. 2 (2020)
- Ekhlas H. KARAM, Eman H. JADOO, DESIGN OF MODIFIED SECOND ORDER SLIDING MODE CONTROLLER BASED ON ST ALGORITHM FOR BLOOD GLUCOSE REGULATION SYSTEMS , Applied Computer Science: Vol. 16 No. 2 (2020)
- Roman GALAGAN, Serhiy ANDREIEV, Nataliia STELMAKH, Yaroslava RAFALSKA, Andrii MOMOT, AUTOMATION OF POLYCYSTIC OVARY SYNDROME DIAGNOSTICS THROUGH MACHINE LEARNING ALGORITHMS IN ULTRASOUND IMAGING , Applied Computer Science: Vol. 20 No. 2 (2024)
- Daniel HALIKOWSKI, Justyna PATALAS-MALISZEWSKA, Małgorzata SKRZESZEWSKA, A MODEL FOR ASSESSING THE LEVEL OF AUTOMATION OF A MAINTENANCE DEPARTMENT USING ARTIFICIAL NEURAL NETWORK , Applied Computer Science: Vol. 14 No. 4 (2018)
- Ghania Zidani, Djalal DJARAH, Abdslam BENMAKHLOUF, Laid KHETTACHE, OPTIMIZING PEDESTRIAN TRACKING FOR ROBUST PERCEPTION WITH YOLOv8 AND DEEPSORT , Applied Computer Science: Vol. 20 No. 1 (2024)
You may also start an advanced similarity search for this article.