INTEGRATION WITH THE SOFTWARE INTERFACE OF THE COM SERVER FOR AUTHORIZED USER

Denis Ratov

ratov@snu.edu.ua
Volodymyr Dahl East Ukrainian University, Faculty of Information Technology and Electronics, Department of Programming and Mathematics, Severodonetsk (Ukraine)

Abstract

The article is devoted to the development of a software controller for automation of access to tools and object model of the multifunctional graphic editor Adobe Photoshop. The work of the graphic editor is initiated in the form of a COM object, which contains methods available to the software controller through the COM interface, which allows the software to use the functionality of the editor. To restrict unauthorized access, a software authorization control protocol is proposed, which is based on the use of binding to the computer hardware and encryption by a 128-bit MD5 public key hashing algorithm.


Keywords:

automation controller, COM object, authorization

Artemov, M. (2007). Basics of COM technologies. Voronezh. p. 84.
  Google Scholar

Authorization. (n.d.). Wikipedia. Retrieved May 12, 2021 from https://ru.wikipedia.org/wiki/Authorization
  Google Scholar

Elmanova, N., Trepalin, S., & Tentser, A. (2003). Delphi and COM technology. Petersburg. p. 698.
  Google Scholar

Identification. (n.d.). Wikipedia. Retrieved May 12, 2021 from https://ru.wikipedia.org/wiki/Identification
  Google Scholar

MD5. (n.d.). Wikipedia. Retrieved May 12, 2021 from https://ru.wikipedia.org/wiki/MD5
  Google Scholar

Moldovyan, N., & Moldovyan, A. (2005). Introduced at the cryptosystem with an open key. Petersburg. p. 288.
  Google Scholar

Ratov, D. (2020a). Architectural paradigm of the interactive interface module in the cloud technology model. Applied Computer Science, 16(4), 48–55. http://doi.org/10.23743/acs-2020-28
  Google Scholar

Ratov, D. (2020b). Model of the module for the interface of the information web-system. Mathematical machines and systems. Kiev, 4, 74–81.
DOI: https://doi.org/10.34121/1028-9763-2020-4-74-81   Google Scholar

RSA class. (n.d.). Code.google.com. Retrieved May 12, 2021 from http://code.google.com/p/phpjsrsa/source/browse/trunk/rsa.class.php?r=6
  Google Scholar

Service Software Activation Service. (n.d.). Softactivation.com. Retrieved May 12, 2021 from http://www.softactivation.com/asp/getstarted.asp
  Google Scholar

Sklyarov, D. (2004). Mystery for the capture of evil information. Petersburg. p. 288.
  Google Scholar

Software as a service. (n.d.). Wikipedia. Retrieved May 12, 2021 from http://ru.wikipedia.org/wiki/Software_as_a_service
  Google Scholar

System for software retrieval of additional information from unauthorized copies of Asprotect. (n.d.). Jak.koshachek.com. Retrieved May 12, 2021 from https://jak.koshachek.com/articles/asprotect-32-sistema-programnogo-zahistu-32-bitnih.html
  Google Scholar

User authorization. (n.d.). Academic.ru. Retrieved May 12, 2021 from https://dic.academic.ru/dic.nsf/business/17457
  Google Scholar

Varlataya, S., & Shakhanova, M. (2007). Software and hardware protection of information. Vladivostok. p. 318.
  Google Scholar

Download


Published
2021-06-30

Cited by

Ratov, D. (2021). INTEGRATION WITH THE SOFTWARE INTERFACE OF THE COM SERVER FOR AUTHORIZED USER. Applied Computer Science, 17(2), 5–13. https://doi.org/10.35784/acs-2021-09

Authors

Denis Ratov 
ratov@snu.edu.ua
Volodymyr Dahl East Ukrainian University, Faculty of Information Technology and Electronics, Department of Programming and Mathematics, Severodonetsk Ukraine

Statistics

Abstract views: 225
PDF downloads: 25


License

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

All articles published in Applied Computer Science are open-access and distributed under the terms of the Creative Commons Attribution 4.0 International License.


Similar Articles

<< < 1 2 3 4 > >> 

You may also start an advanced similarity search for this article.