INTEGRATION WITH THE SOFTWARE INTERFACE OF THE COM SERVER FOR AUTHORIZED USER
Article Sidebar
Open full text
Issue Vol. 17 No. 2 (2021)
-
INTEGRATION WITH THE SOFTWARE INTERFACE OF THE COM SERVER FOR AUTHORIZED USER
Denis Ratov5-13
-
APPLICATION FOR FUNCTIONALITY AND REGISTRATION IN THE CLOUD OF A MICROCONTROLLER DEVELOPMENT BOARD FOR IOT IN AWS
Elizabeth Perez, Juan A. Araiza, Dreysy Pozos, Edmundo Bonilla, Jose C. Hernandez, Jesus A. Cortes14-27
-
GENETIC ALGORITHM-PID CONTROLLER FOR MODEL ORDER REDUCTION PANTOGRAPHCATENARY SYSTEM
Nasir A. Al-Awad, Izz K. Abboud, Muaayed F. Al-Rawi28-39
-
A SURVEY OF AI IMAGING TECHNIQUES FOR COVID-19 DIAGNOSIS AND PROGNOSIS
KK Praneeth Tellakula, Saravana Kumar R, Sanjoy Deb40-55
-
CANCER GROWTH TREATMENT USING IMMUNE LINEAR QUADRATIC REGULATOR BASED ON CROW SEARCH OPTIMIZATION ALGORITHM
Mohammed A. Hussein, Ekhlas H. Karam, Rokaia S. Habeeb56-69
-
COMPUTER AIDED ASSEMBLY PLANNING USING MS EXCEL SOFTWARE – A CASE STUDY
Jolanta Brzozowska, Arkadiusz Gola70-89
-
RECOGNITION OF FONT AND TAMIL LETTER IN IMAGES USING DEEP LEARNING
Manikandan SRIDHARAN, Delphin Carolina RANI ARULANANDAM, Rajeswari K CHINNASAMY, Suma THIMMANNA, Sivabalaselvamani DHANDAPANI90-99
-
MITIGATING LOAN ASSOCIATED FINANCIAL RISK USING BLOCKCHAIN BASED LENDING SYSTEM
Saha RENO, Sheikh Surfuddin Reza Ali CHOWDHURY, Iqramuzzaman SADI100-126
Archives
-
Vol. 19 No. 4
2023-12-31 10
-
Vol. 19 No. 3
2023-09-30 10
-
Vol. 19 No. 2
2023-06-30 10
-
Vol. 19 No. 1
2023-03-31 10
-
Vol. 18 No. 4
2022-12-30 8
-
Vol. 18 No. 3
2022-09-30 8
-
Vol. 18 No. 2
2022-06-30 8
-
Vol. 18 No. 1
2022-03-30 7
-
Vol. 17 No. 4
2021-12-30 8
-
Vol. 17 No. 3
2021-09-30 8
-
Vol. 17 No. 2
2021-06-30 8
-
Vol. 17 No. 1
2021-03-30 8
-
Vol. 16 No. 4
2020-12-30 8
-
Vol. 16 No. 3
2020-09-30 8
-
Vol. 16 No. 2
2020-06-30 8
-
Vol. 16 No. 1
2020-03-30 8
-
Vol. 15 No. 4
2019-12-30 8
-
Vol. 15 No. 3
2019-09-30 8
-
Vol. 15 No. 2
2019-06-30 8
-
Vol. 15 No. 1
2019-03-30 8
Main Article Content
DOI
Authors
Abstract
The article is devoted to the development of a software controller for automation of access to tools and object model of the multifunctional graphic editor Adobe Photoshop. The work of the graphic editor is initiated in the form of a COM object, which contains methods available to the software controller through the COM interface, which allows the software to use the functionality of the editor. To restrict unauthorized access, a software authorization control protocol is proposed, which is based on the use of binding to the computer hardware and encryption by a 128-bit MD5 public key hashing algorithm.
Keywords:
References
Artemov, M. (2007). Basics of COM technologies. Voronezh. p. 84.
Authorization. (n.d.). Wikipedia. Retrieved May 12, 2021 from https://ru.wikipedia.org/wiki/Authorization
Elmanova, N., Trepalin, S., & Tentser, A. (2003). Delphi and COM technology. Petersburg. p. 698.
Identification. (n.d.). Wikipedia. Retrieved May 12, 2021 from https://ru.wikipedia.org/wiki/Identification
MD5. (n.d.). Wikipedia. Retrieved May 12, 2021 from https://ru.wikipedia.org/wiki/MD5
Moldovyan, N., & Moldovyan, A. (2005). Introduced at the cryptosystem with an open key. Petersburg. p. 288.
Ratov, D. (2020a). Architectural paradigm of the interactive interface module in the cloud technology model. Applied Computer Science, 16(4), 48–55. http://doi.org/10.23743/acs-2020-28
Ratov, D. (2020b). Model of the module for the interface of the information web-system. Mathematical machines and systems. Kiev, 4, 74–81. DOI: https://doi.org/10.34121/1028-9763-2020-4-74-81
RSA class. (n.d.). Code.google.com. Retrieved May 12, 2021 from http://code.google.com/p/phpjsrsa/source/browse/trunk/rsa.class.php?r=6
Service Software Activation Service. (n.d.). Softactivation.com. Retrieved May 12, 2021 from http://www.softactivation.com/asp/getstarted.asp
Sklyarov, D. (2004). Mystery for the capture of evil information. Petersburg. p. 288.
Software as a service. (n.d.). Wikipedia. Retrieved May 12, 2021 from http://ru.wikipedia.org/wiki/Software_as_a_service
System for software retrieval of additional information from unauthorized copies of Asprotect. (n.d.). Jak.koshachek.com. Retrieved May 12, 2021 from https://jak.koshachek.com/articles/asprotect-32-sistema-programnogo-zahistu-32-bitnih.html
User authorization. (n.d.). Academic.ru. Retrieved May 12, 2021 from https://dic.academic.ru/dic.nsf/business/17457
Varlataya, S., & Shakhanova, M. (2007). Software and hardware protection of information. Vladivostok. p. 318.
Article Details
Abstract views: 396
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in Applied Computer Science are open-access and distributed under the terms of the Creative Commons Attribution 4.0 International License.
