Knowledge

Software protection dongle

Source 📝

177: 185: 228: 25: 157: 298:, and others. The dongle used by Steinberg's products is also known as a Steinberg Key. The Steinberg Key can be purchased separately from its counterpart applications and generally comes bundled with the "Syncrosoft License Control Center" application, which is cross-platform compatible with both Mac OS X and Windows. 333:
that execute program instructions that may be input to the cryptoprocessor only in encrypted form. The original secure cryptoprocessor was designed for copy protection of personal computer software (see US Patent 4,168,396, Sept 18, 1979) to provide more security than dongles could then provide. See
410:
use a dongle. Typically it attaches to the memory card slot of the system, with the disc based software refusing to work if the dongle is not detected. The dongle is also used for holding settings and storage of new codes, added either by the user or through official updates, because the disc, being
269:
In cases such as prepress and printing software, the dongle is encoded with a specific, per-user license key, which enables particular features in the target application. This is a form of tightly controlled licensing, which allows the vendor to engage in vendor lock-in and charge more than it would
305:
Although such medium security may deter a casual hacker, the lack of a processor core in the dongle to authenticate data, perform encryption/decryption, and execute inaccessible binary code makes such a passive dongle inappropriate for all but the lowest-priced software. A simpler and even less
301:
Some software developers use traditional USB flash drives as software license dongles that contain hardware serial numbers in conjunction with the stored device ID strings, which are generally not easily changed by an end-user. A developer can also use the dongle to store user settings or even a
152:
In software protection, dongles are two-interface security tokens with transient data flow with a pull communication that reads security data from the dongle. In the absence of these dongles, certain software may run only in a restricted mode, or not at all. In addition to software protection,
306:
secure option is to use unpartitioned or unallocated storage in the dongle to store license data. Common USB flash drives are relatively inexpensive compared to dedicated security dongle devices, but reading and storing data in a flash drive are easy to intercept, alter, and bypass.
282:
output device is sold to a customer, Prinergy's own license cost is provided separately to the customer, and the base price contains little more than the required licenses to output work to the device.
238:
Efforts to introduce dongle copy-protection in the mainstream software market have met stiff resistance from users. Such copy-protection is more typically used with very expensive packages and
352:
process which transfers encrypted parts of the software vendor's program code or license enforcement into a secure hardware environment (such as in a smart card OS, mentioned above). An
318:
to check for the dongle's presence, returning "true" or "false" accordingly, but the dongle requirement can be easily circumvented by modifying the software to always answer "true".
314:
There are potential weaknesses in the implementation of the protocol between the dongle and the copy-controlled software. For example, a simple implementation might define a
302:
complete "portable" version of the application. Not all flash drives are suitable for this use, as not all manufacturers install unique serial numbers into their devices.
342: 341:
Hardware cloning, where the dongle is emulated by a device driver, is also a threat to traditional dongles. To thwart this, some dongle vendors adopted
647: 349: 1054: 193: 89: 42: 61: 345:, which is widely used in extremely rigid security requirement environments such as military and banking, in their dongle products. 68: 153:
dongles can enable functions in electronic devices, such as receiving and processing encoded video streams on television sets.
137:
and content protection device. When connected to a computer or other electronics, they unlock software functionality or decode
180:
A Rainbow Tech parallel port dongle PCB, front side. Note the numbers rubbed off the chips to make reverse engineering harder
367:, they are easily lost and prone to damage, potentially increasing operational costs such as device cost and delivery cost. 75: 231: 640: 1064: 57: 537: 329:— essential parts of the software may actually be stored and executed on the dongle. Thus dongles have become 108: 699: 633: 491: 46: 1069: 682: 247: 1074: 930: 353: 82: 878: 215:
claimed the word dongle was derived from the name "Don Gall". Though untrue, this has given rise to an
993: 719: 483: 420: 259: 321:
Modern dongles include built-in strong encryption and use fabrication techniques designed to thwart
1059: 903: 1023: 523: 35: 842: 714: 381: 330: 862: 704: 656: 450: 243: 472: 145:
or other cryptographic protection mechanism and functions via an electrical connector to an
953: 837: 827: 709: 692: 326: 212: 201: 8: 958: 943: 740: 322: 1018: 1008: 963: 677: 435: 263: 1033: 973: 948: 772: 620: 543: 533: 497: 487: 364: 279: 589: 568: 411:
read only, cannot store them. Some dongles will also double as normal memory cards.
847: 664: 357: 291: 1028: 1003: 985: 852: 789: 745: 425: 387: 239: 192:
Dongles rapidly evolved into active devices that contained a serial transceiver (
138: 134: 1079: 529: 445: 440: 335: 255: 197: 605: 1048: 908: 687: 547: 501: 430: 407: 392: 176: 184: 832: 794: 782: 757: 479: 376: 146: 395:, in order to circumvent the authentication chip embedded in the console. 173:" was in 1981 and that the etymology was "perhaps alteration of dangle." 1013: 938: 888: 752: 205: 142: 625: 920: 893: 857: 399: 315: 227: 216: 968: 915: 811: 799: 403: 287: 24: 777: 767: 762: 672: 275: 169:
The Merriam-Webster dictionary states that the "First known use of
156: 898: 883: 804: 200:
to handle transactions with the host. Later versions adopted the
735: 295: 170: 160:
HASP (Hardware Against Software Piracy) key dongle for LPT port
363:
In addition, dongles have been criticized because as they are
271: 251: 204:
interface, which became the preferred choice over the
348:A more innovative modern dongle is designed with a 49:. Unsourced material may be challenged and removed. 471: 188:A Rainbow Tech parallel port dongle PCB, back side 391:) used dongles to connect to officially licensed 290:'s audio production and editing systems, such as 270:otherwise for the product. An example is the way 1046: 641: 648: 634: 16:Electronic software copy protection device 655: 356:can port thousands of lines of important 258:hospitality and special retail software, 109:Learn how and when to remove this message 469: 252:cellphone flasher/JTAG debugger software 226: 183: 175: 155: 141:. The hardware key is programmed with a 1047: 521: 234:parallel port copy protection dongles. 629: 470:Amos, S. W.; Amos, Roger S. (2002). 47:adding citations to reliable sources 18: 325:. Typical dongles also now contain 286:USB dongles are also a big part of 13: 1055:Copyright infringement of software 14: 1091: 614: 474:Newnes Dictionary of Electronics 370: 23: 34:needs additional citations for 599: 583: 561: 515: 463: 149:of the computer or appliance. 1: 456: 164: 58:"Software protection dongle" 7: 931:Software release life cycle 522:Stobbs, Gregory A. (2012). 414: 375:Some unlicensed titles for 10: 1096: 999:Software protection dongle 879:Unwanted software bundling 123:software protection dongle 1065:Digital rights management 994:Digital rights management 984: 929: 871: 820: 728: 663: 421:Digital rights management 309: 260:digital audio workstation 211:A 1992 advertisement for 872:Deceptive and/or illicit 222: 1024:Software license server 331:secure cryptoprocessors 294:, WaveLab, Hypersonic, 262:applications, and some 208:or parallel interface. 700:Freely redistributable 360:code into the dongle. 235: 189: 181: 161: 863:Software as a service 657:Software distribution 451:Software monetization 402:devices, such as the 278:to customers: When a 230: 187: 179: 159: 125:(commonly known as a 1070:Proprietary hardware 954:Software maintenance 828:Digital distribution 683:Free and open-source 213:Rainbow Technologies 43:improve this article 959:Software maintainer 741:Commercial software 729:Compensation models 621:Jargon File: dongle 606:US Patent 4,168,396 382:Super 3D Noah's Ark 327:non-volatile memory 323:reverse engineering 133:) is an electronic 1075:Software licensing 1019:Software copyright 1009:Product activation 964:Software publisher 678:Floating licensing 528:(Third ed.). 436:Product activation 343:smart card product 264:translation memory 236: 190: 182: 162: 1042: 1041: 1034:Torrent poisoning 949:Long-term support 773:Pay what you want 571:. Merriam-Webster 532:. pp. 2–90. 280:computer-to-plate 242:software such as 119: 118: 111: 93: 1087: 848:Product bundling 821:Delivery methods 720:Source-available 650: 643: 636: 627: 626: 608: 603: 597: 596:Magazine, p. 148 587: 581: 580: 578: 576: 565: 559: 558: 556: 554: 525:Software Patents 519: 513: 512: 510: 508: 478:(4th ed.). 477: 467: 358:computer program 114: 107: 103: 100: 94: 92: 51: 27: 19: 1095: 1094: 1090: 1089: 1088: 1086: 1085: 1084: 1060:Copy protection 1045: 1044: 1043: 1038: 1029:Software patent 1004:License manager 986:Copy protection 980: 925: 867: 853:Retail software 816: 790:Open-core model 746:Retail software 724: 659: 654: 617: 612: 611: 604: 600: 590:Sentinel advert 588: 584: 574: 572: 567: 566: 562: 552: 550: 540: 520: 516: 506: 504: 494: 468: 464: 459: 426:License manager 417: 388:Little Red Hood 373: 312: 240:vertical market 225: 167: 135:copy protection 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 1093: 1083: 1082: 1077: 1072: 1067: 1062: 1057: 1040: 1039: 1037: 1036: 1031: 1026: 1021: 1016: 1011: 1006: 1001: 996: 990: 988: 982: 981: 979: 978: 977: 976: 966: 961: 956: 951: 946: 941: 935: 933: 927: 926: 924: 923: 918: 913: 912: 911: 906: 901: 896: 891: 881: 875: 873: 869: 868: 866: 865: 860: 855: 850: 845: 840: 835: 830: 824: 822: 818: 817: 815: 814: 809: 808: 807: 797: 792: 787: 786: 785: 780: 770: 765: 760: 755: 750: 749: 748: 738: 732: 730: 726: 725: 723: 722: 717: 712: 707: 702: 697: 696: 695: 690: 680: 675: 669: 667: 661: 660: 653: 652: 645: 638: 630: 624: 623: 616: 615:External links 613: 610: 609: 598: 582: 560: 538: 530:Wolters Kluwer 514: 492: 461: 460: 458: 455: 454: 453: 448: 446:Trusted client 443: 441:Security token 438: 433: 428: 423: 416: 413: 393:ROM cartridges 372: 369: 336:bus encryption 311: 308: 256:MICROS Systems 224: 221: 198:microprocessor 166: 163: 117: 116: 31: 29: 22: 15: 9: 6: 4: 3: 2: 1092: 1081: 1078: 1076: 1073: 1071: 1068: 1066: 1063: 1061: 1058: 1056: 1053: 1052: 1050: 1035: 1032: 1030: 1027: 1025: 1022: 1020: 1017: 1015: 1012: 1010: 1007: 1005: 1002: 1000: 997: 995: 992: 991: 989: 987: 983: 975: 972: 971: 970: 967: 965: 962: 960: 957: 955: 952: 950: 947: 945: 942: 940: 937: 936: 934: 932: 928: 922: 919: 917: 914: 910: 907: 905: 902: 900: 897: 895: 892: 890: 887: 886: 885: 882: 880: 877: 876: 874: 870: 864: 861: 859: 856: 854: 851: 849: 846: 844: 843:Pre-installed 841: 839: 836: 834: 831: 829: 826: 825: 823: 819: 813: 810: 806: 803: 802: 801: 798: 796: 793: 791: 788: 784: 781: 779: 776: 775: 774: 771: 769: 766: 764: 761: 759: 756: 754: 751: 747: 744: 743: 742: 739: 737: 734: 733: 731: 727: 721: 718: 716: 715:Public domain 713: 711: 708: 706: 703: 701: 698: 694: 691: 689: 686: 685: 684: 681: 679: 676: 674: 671: 670: 668: 666: 662: 658: 651: 646: 644: 639: 637: 632: 631: 628: 622: 619: 618: 607: 602: 595: 591: 586: 570: 564: 549: 545: 541: 539:9781454811978 535: 531: 527: 526: 518: 503: 499: 495: 489: 485: 481: 476: 475: 466: 462: 452: 449: 447: 444: 442: 439: 437: 434: 432: 431:Lock-out chip 429: 427: 424: 422: 419: 418: 412: 409: 408:Action Replay 405: 401: 396: 394: 390: 389: 384: 383: 378: 377:game consoles 371:Game consoles 368: 366: 361: 359: 355: 351: 346: 344: 339: 337: 332: 328: 324: 319: 317: 307: 303: 299: 297: 293: 289: 284: 281: 277: 273: 267: 265: 261: 257: 253: 249: 245: 241: 233: 232:Daisy chained 229: 220: 218: 214: 209: 207: 203: 199: 196:) and even a 195: 186: 178: 174: 172: 158: 154: 150: 148: 144: 140: 136: 132: 128: 124: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 998: 904:Trojan horse 833:File sharing 795:Postcardware 783:Donationware 758:Crowdfunding 705:License-free 601: 593: 585: 573:. Retrieved 563: 551:. Retrieved 524: 517: 505:. Retrieved 480:Newnes Press 473: 465: 397: 386: 380: 374: 362: 350:code porting 347: 340: 320: 313: 304: 300: 285: 268: 237: 210: 191: 168: 151: 147:external bus 130: 126: 122: 120: 105: 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 1014:Product key 944:End-of-life 939:Abandonware 889:Infostealer 838:On-premises 753:Crippleware 710:Proprietary 693:Open source 143:product key 1049:Categories 921:Shovelware 894:Ransomware 858:Sneakernet 493:0750643315 482:. p.  457:References 400:cheat code 266:packages. 250:software, 217:urban myth 99:March 2008 69:newspapers 969:Vaporware 916:Scareware 812:Trialware 800:Shareware 548:802867781 502:144646016 404:GameShark 379:(such as 288:Steinberg 274:licenses 165:Etymology 778:Careware 768:Freeware 763:Freemium 673:Beerware 665:Licenses 569:"Dongle" 415:See also 365:hardware 316:function 276:Prinergy 899:Spyware 884:Malware 805:Nagware 575:11 June 139:content 83:scholar 736:Adware 553:4 July 546:  536:  507:4 July 500:  490:  310:Issues 296:HALion 292:Cubase 206:serial 171:dongle 127:dongle 85:  78:  71:  64:  56:  1080:Warez 398:Some 334:also 272:Kodak 223:Usage 90:JSTOR 76:books 974:list 909:Worm 688:Free 594:Byte 577:2019 555:2013 544:OCLC 534:ISBN 509:2013 498:OCLC 488:ISBN 406:and 194:UART 62:news 484:152 385:or 354:ISV 248:CAM 244:CAD 202:USB 131:key 129:or 45:by 1051:: 592:, 542:. 496:. 486:. 338:. 254:, 219:. 121:A 649:e 642:t 635:v 579:. 557:. 511:. 246:/ 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Software protection dongle"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
copy protection
content
product key
external bus

dongle


UART
microprocessor
USB
serial
Rainbow Technologies
urban myth

Daisy chained
vertical market
CAD
CAM

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.