PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Integration with the software Interface of the com server for authorized user

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The article is devoted to the development of a software controller for automation of access to tools and object model of the multifunctional graphic editor Adobe Photoshop. The work of the graphic editor is initiated in the form of a COM object, which contains methods available to the software controller through the COM interface, which allows the software to use the functionality of the editor. To restrict unauthorized access, a software authorization control protocol is proposed, which is based on the use of binding to the computer hardware and encryption by a 128-bit MD5 public key hashing algorithm.
Słowa kluczowe
Rocznik
Strony
5--13
Opis fizyczny
Bibliogr. 15 poz., fig.
Twórcy
autor
  • Volodymyr Dahl East Ukrainian University, Faculty of Information Technology and Electronics, Department of Programming and Mathematics, Severodonetsk, Ukraine
Bibliografia
  • [1] Artemov, M. (2007). Basics of COM technologies. Voronezh. p. 84.
  • [2] Authorization. (n.d.). Wikipedia. Retrieved May 12, 2021 from https://ru.wikipedia.org/wiki/Authorization
  • [3] Elmanova, N., Trepalin, S., & Tentser, A. (2003). Delphi and COM technology. Petersburg. p. 698.
  • [4] Identification. (n.d.). Wikipedia. Retrieved May 12, 2021 from https://ru.wikipedia.org/wiki/Identification
  • [5] MD5. (n.d.). Wikipedia. Retrieved May 12, 2021 from https://ru.wikipedia.org/wiki/MD5
  • [6] Moldovyan, N., & Moldovyan, A. (2005). Introduced at the cryptosystem with an open key. Petersburg. p. 288.
  • [7] Ratov, D. (2020a). Architectural paradigm of the interactive interface module in the cloud technology model. Applied Computer Science, 16(4), 48–55. http://doi.org/10.23743/acs-2020-28
  • [8] Ratov, D. (2020b). Model of the module for the interface of the information web-system. Mathematical machines and systems. Kiev, 4, 74–81.
  • [9] RSA class. (n.d.). Code.google.com. Retrieved May 12, 2021 from http://code.google.com/p/phpjsrsa/source/ browse/trunk/rsa.class.php?r=6
  • [10] Service Software Activation Service. (n.d.). Softactivation.com. Retrieved May 12, 2021 from http://www.softactivation.com/asp/getstarted.asp
  • [11] Sklyarov, D. (2004). Mystery for the capture of evil information. Petersburg. p. 288.
  • [12] Software as a service. (n.d.). Wikipedia. Retrieved May 12, 2021 from http://ru.wikipedia.org/wiki/ Software_as_a_service
  • [13] System for software retrieval of additional information from unauthorized copies of Asprotect. (n.d.). Jak.koshachek.com. Retrieved May 12, 2021 from https://jak.koshachek.com/articles/asprotect-32-sistema-programnogo-zahistu-32-bitnih.html
  • [14] User authorization. (n.d.). Academic.ru. Retrieved May 12, 2021 from https://dic.academic.ru/dic.nsf/business/17457
  • [15] Varlataya, S., & Shakhanova, M. (2007). Software and hardware protection of information. Vladivostok. p. 318.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2021).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-a736716b-1f11-4cb1-afe3-fc8d90e2dc81
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.