INTEGRATION WITH THE SOFTWARE INTERFACE OF THE COM SERVER FOR AUTHORIZED USER
Denis Ratov
ratov@snu.edu.uaVolodymyr Dahl East Ukrainian University, Faculty of Information Technology and Electronics, Department of Programming and Mathematics, Severodonetsk (Ukraine)
Abstract
The article is devoted to the development of a software controller for automation of access to tools and object model of the multifunctional graphic editor Adobe Photoshop. The work of the graphic editor is initiated in the form of a COM object, which contains methods available to the software controller through the COM interface, which allows the software to use the functionality of the editor. To restrict unauthorized access, a software authorization control protocol is proposed, which is based on the use of binding to the computer hardware and encryption by a 128-bit MD5 public key hashing algorithm.
Keywords:
automation controller, COM object, authorizationReferences
Artemov, M. (2007). Basics of COM technologies. Voronezh. p. 84.
Google Scholar
Authorization. (n.d.). Wikipedia. Retrieved May 12, 2021 from https://ru.wikipedia.org/wiki/Authorization
Google Scholar
Elmanova, N., Trepalin, S., & Tentser, A. (2003). Delphi and COM technology. Petersburg. p. 698.
Google Scholar
Identification. (n.d.). Wikipedia. Retrieved May 12, 2021 from https://ru.wikipedia.org/wiki/Identification
Google Scholar
MD5. (n.d.). Wikipedia. Retrieved May 12, 2021 from https://ru.wikipedia.org/wiki/MD5
Google Scholar
Moldovyan, N., & Moldovyan, A. (2005). Introduced at the cryptosystem with an open key. Petersburg. p. 288.
Google Scholar
Ratov, D. (2020a). Architectural paradigm of the interactive interface module in the cloud technology model. Applied Computer Science, 16(4), 48–55. http://doi.org/10.23743/acs-2020-28
Google Scholar
Ratov, D. (2020b). Model of the module for the interface of the information web-system. Mathematical machines and systems. Kiev, 4, 74–81.
DOI: https://doi.org/10.34121/1028-9763-2020-4-74-81
Google Scholar
RSA class. (n.d.). Code.google.com. Retrieved May 12, 2021 from http://code.google.com/p/phpjsrsa/source/browse/trunk/rsa.class.php?r=6
Google Scholar
Service Software Activation Service. (n.d.). Softactivation.com. Retrieved May 12, 2021 from http://www.softactivation.com/asp/getstarted.asp
Google Scholar
Sklyarov, D. (2004). Mystery for the capture of evil information. Petersburg. p. 288.
Google Scholar
Software as a service. (n.d.). Wikipedia. Retrieved May 12, 2021 from http://ru.wikipedia.org/wiki/Software_as_a_service
Google Scholar
System for software retrieval of additional information from unauthorized copies of Asprotect. (n.d.). Jak.koshachek.com. Retrieved May 12, 2021 from https://jak.koshachek.com/articles/asprotect-32-sistema-programnogo-zahistu-32-bitnih.html
Google Scholar
User authorization. (n.d.). Academic.ru. Retrieved May 12, 2021 from https://dic.academic.ru/dic.nsf/business/17457
Google Scholar
Varlataya, S., & Shakhanova, M. (2007). Software and hardware protection of information. Vladivostok. p. 318.
Google Scholar
Authors
Denis Ratovratov@snu.edu.ua
Volodymyr Dahl East Ukrainian University, Faculty of Information Technology and Electronics, Department of Programming and Mathematics, Severodonetsk Ukraine
Statistics
Abstract views: 225PDF downloads: 25
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in Applied Computer Science are open-access and distributed under the terms of the Creative Commons Attribution 4.0 International License.
Most read articles by the same author(s)
- Denis RATOV, ARCHITECTURAL PARADIGM OF THE INTERACTIVE INTERFACE MODULE IN THE CLOUD TECHNOLOGY MODEL , Applied Computer Science: Vol. 16 No. 4 (2020)
- Denis RATOV, Vladimir LYFAR, MODELING TRANSMISSION MECHANISMS WITH DETERMINATION OF EFFICIENCY , Applied Computer Science: Vol. 16 No. 1 (2020)
Similar Articles
- Ghania Zidani, Djalal DJARAH, Abdslam BENMAKHLOUF, Laid KHETTACHE, OPTIMIZING PEDESTRIAN TRACKING FOR ROBUST PERCEPTION WITH YOLOv8 AND DEEPSORT , Applied Computer Science: Vol. 20 No. 1 (2024)
- Esraa Alaa MAHAREEK, Doaa Rizk FATHY, Eman Karm ELSAYED, Nahed ELDESOUKY, Kamal Abdelraouf ELDAHSHAN, VIOLENCE PREDICTION IN SURVEILLANCE VIDEOS , Applied Computer Science: Vol. 20 No. 3 (2024)
- Grzegorz KŁOSOWSKI, Tomasz KLEPKA, Agnieszka NOWACKA, NEURAL CONTROLLER FOR THE SELECTION OF RECYCLED COMPONENTS IN POLYMER-GYPSY MORTARS , Applied Computer Science: Vol. 14 No. 2 (2018)
- Ahmed A.H. HAQQANI, Seenu N, Mukund JANARDHANAN, Kuppan Chetty RM, EVALUATION OF ROBOTIC CLEANING TECHNOLOGIES: PRESERVING A BRITISH ICONIC BUILDING , Applied Computer Science: Vol. 16 No. 2 (2020)
- Nasir A. Al-Awad, Izz K. Abboud, Muaayed F. Al-Rawi, GENETIC ALGORITHM-PID CONTROLLER FOR MODEL ORDER REDUCTION PANTOGRAPHCATENARY SYSTEM , Applied Computer Science: Vol. 17 No. 2 (2021)
- Jakub ANCZARSKI, Adrian BOCHEN, MArcin GŁĄB, Mikolaj JACHOWICZ, Jacek CABAN, Radosław CECHOWICZ, A METHOD OF VERIFYING THE ROBOT'S TRAJECTORY FOR GOALS WITH A SHARED WORKSPACE , Applied Computer Science: Vol. 18 No. 1 (2022)
- Elvis COUTIÑO-MORENO, Quirino ESTRADA, Daniel MALDONADO-ONOFRE, Alejandro RODRIGUEZ-MENDEZ, Julio GOMEZ-GIRON, RESOLUTION IN THE 3D MODELING OF OBJECTS FOR ADDITIVE MANUFACTURING AND REVERSE ENGINEERING – SHUTTER EFFECT , Applied Computer Science: Vol. 17 No. 1 (2021)
- Wojciech DANILCZUK, THE USE OF SIMULATION ENVIRONMENT FOR SOLVING THE ASSEMBLY LINE BALANCING PROBLEM , Applied Computer Science: Vol. 14 No. 1 (2018)
- Anna CZARNECKA, Łukasz SOBASZEK, Antoni ŚWIĆ, 2D IMAGE-BASED INDUSTRIAL ROBOT END EFFECTOR TRAJECTORY CONTROL ALGORITHM , Applied Computer Science: Vol. 14 No. 1 (2018)
- Maciej NABOŻNY, ASYNCHRONOUS INFORMATION DISTRIBUTION AND CLUSTER STATE SYNCHRONIZATION , Applied Computer Science: Vol. 14 No. 1 (2018)
You may also start an advanced similarity search for this article.