Dongle

Dongle

A dongle is a small piece of hardware that connects to a computer. [Late 20th century. Origin uncertain: probably an arbitrary formation. Microsoft Encarta Premium Suite 2004.] The usual function of a dongle is to authenticate a piece of software. Without the dongle, the software will run only in a restricted mode, or not at all. Dongles are used by some proprietary vendors as a form of copy prevention or digital rights management, because it is much harder to copy a dongle than to copy the software it authenticates. Despite being hardware, however, dongles are not a complete solution to the trusted client problem.

History

"Dongle" has been used as a placeholder name since the 1970s. Its origin is unknown. The American Heritage Dictionary, 4th edition, says it is "probably [an] arbitrary coinage." A 1992 advertisement for Rainbow Technologies (now SafeNet—a dongle vendor in the U.S) claimed the word was derived from the name "Don Gall"—though untrue, this has given rise to an urban myth.

"Dongle" as the name of a device was used well before 1980 in the telecom industry to refer to BNC cable joiners of either gender.

WORDCRAFT was the first program to use a software protection dongle, in 1980. Its dongle was a simple passive device that supplied data to the pins of a Commodore PET's external cassette port in a pre-determined manner. This was possible because the PET cassette port supplied both power and data connections through a proprietary edge connector. It did, however, make the cassette port unusable for its intended purpose.

The two-cubic-inch (33 cm³) resin-potted first generation device was called a "dongle" by the inventor as there was no other suitable term to hand on the day. The distributor, Dataview Ltd., then based in Colchester, UK, then went on to produce a derivative dongle, which became their core business.

Dongles rapidly evolved into active devices that contained a serial transceiver (UART) and even a microprocessor to handle transactions with the host. Later versions adopted the USB interface in preference to the serial or parallel interface. Currently, the USB interface is gradually becoming dominant.

Interestingly, modern smart cards present the same feature set as modern dongles. Given this, the dongle market may be overtaken by smart cards, as smart cards are more secure and powerful by design than traditional MCU based dongles. Some dongle vendors are producing one-chip dongles, which combine the smart card and the smart card reader in the same chip. This structure makes a smart card dongle easy and stable.

Copy protection


Matrix USB dongles in two case sizes

Vendors of software-protection dongles (and dongle-controlled software) often use terms such as hardware key, hardware token, or security device instead of dongle, but the term "dongle" is much more common in day-to-day use. One particular vendor's term is HASP, standing for Hardware Against Software Piracy.

Usage

Efforts to introduce dongle copy-prevention in the mainstream software market have met stiff resistance from users. Such copy-prevention is more typically used with very expensive packages and vertical market software, such as CAD/CAM software, MICROS Systems hospitality and special retail software, Digital Audio Workstation applications, and some translation memory packages. The vast majority of printing and prepress software, such as CtP workflows, requires dongles.

In cases such as prepress and printing software, the dongle is encoded with a specific, per-user license key, which enables particular features in the target application. This is a form of tightly controlled licensing, which allows the vendor to engage in vendor lock-in and charge more than it would otherwise for the product. An example is the way Creo licenses Prinergy to customers: When a computer-to-plate output device is sold to a customer, Prinergy's own license cost is provided separately to the customer, and the base price contains little more than the required licenses to output work to the device. In order to access the advertised features in the application, the customer must pay a significant price for a special dongle.

Well-known software-protection dongle manufacturers include Matrix (Matrix Dongle) Matrix Software License Protection System, SafeNet ("Rainbow" before an acquisition), Feitian Technologies, Aladdin, Microcosm Ltd (Dinkey Dongles), WIBU-SYSTEMS, SG-Lock, UniKey (or SecuTech), Senselock (or "Sense"), SPYRUS, Inc. (Rosetta USB, Hydra PC), and MARX (CRYPTO-BOX). In the digital audio world, some versions of Pro Tools and many plugins use the Pace iLok Smart Key USB dongles.

USB dongles are also a big part of Steinberg's audio production and editing systems, such as Cubase, Wavelab, Hypersonic, HALion, and others. The dongle used by Steinberg's products is also known as a Steinberg Key. The Steinberg Key can be purchased separately from its counterpart applications and generally comes bundled with the "Syncrosoft License Control Center" application, which is cross-platform compatible with both Mac OS X and Windows.

Issues

There are potential weaknesses in the implementation of the protocol between the dongle and the copy-controlled software. It requires considerable cunning to make this hard to crack. For example, a naive implementation might simply define a function to check for the dongle, returning "true" or "false" accordingly—thus reducing the prevention scheme to a single bit value at one point in the program.

Modern dongles include built-in strong encryption and use fabrication techniques designed to thwart reverse engineering. Typical dongles also now contain non-volatile memory — key parts of the software may actually be stored and executed on the dongle. Thus dongles have become secure cryptoprocessors that execute inaccessible program instructions that may be input to the cryptoprocessor only in encrypted form. The original secure cryptoprocessor was designed for copy protection of personal computer software (see US Patent 4,168,396, Sept 18, 1979) to provide more security than dongles could then provide. See also bus encryption.

However, security researchers warn that dongles still do not solve the trusted client problem: if you give a user the cryptographic ciphertext, the algorithm and the key, your cipher is likely to be breakable, even with the algorithm and key encoded in hardware. [http://www.grandideastudio.com/files/security/tokens/usb_hardware_token.pdf Attacks on and Countermeasures for USB Hardware Token Devices] (PDF) (Joe Grand, Grand Ideas Studio, "Proceedings of the Fifth Nordic Workshop on Secure IT Systems Encouraging Co-operation", Reykjavik, Iceland, October 12–13, 2000, pp 35–57, ISBN 9979-9483-0-2]

In counterfeit versions of a program, the code to check for a dongle is often deleted or circumvented. As a result, the counterfeit version may be easier to use and thus may seem preferable to the original.

Hardware cloning, where the dongle is emulated by a device driver, is also a lethal threat to traditional dongles. To thwart this, some dongle vendors adopted smart card product, which is widely used in extremely rigid security requirement environments such as military and banking, in their dongle products.

Dongle drivers bring problems for end-users. Most developers and software vendors want to get rid of the dongle driver headache. There are some driverless dongles on the market, which make the protection easy for both software vendors and end-users.

A more innovative modern dongle is designed with a code porting mechanism, meaning you can transfer part of your important program code or license enforcement into a secure hardware environment (such as in a smart card OS, mentioned above). An ISV can port thousands of lines of important computer program code into the dongle.

Game consoles

Some unlicensed titles for game consoles used dongles to connect to officially licensed cartridges, in order to circumvent the authentication chip embedded in the console.

Other hardware

The term "dongle" has been generalized, so it may also refer to a connector that translates one type of port to another — for example, an 8P8C modular jack that plugs into the edge connector on a PC card Ethernet adapter (shown at right). These are also sometimes called "pigtails", though this may mean a very short patch cable. Similarly, a device with one connector on one end and multiple connections on the other is a breakout cable.

It may even mean simply a small device such as a USB flash drive or a wireless networking adapter. Douglas Adams, in a 1990s column for the US edition of "MacWorld" magazine, used the term "little dongly things" to describe converters for adapting US power cables to international plugs. [ [http://www.douglasadams.com/dna/980707-03-a.html DNA/Dongly Things ] ] However, these broader usages are not universally accepted.

The term "mobile broadband dongle" is also sometimes used to refer to the USB plug-and-play device that enables PCs and laptops to use mobile broadband. [See "what_is_a_mobile_dongle?" [http://www.top10-broadband.co.uk/guides/what_is_a_mobile_dongle/] ]

Manufacturers

*Aladdin Hardlock
*Eutron Electronic Technologies
*Feitian Technologies Co., Ltd.
*Matrix Software License Protection System
*Microcomputer Applications, Inc. (MAI) -- KEYLOK
*Microcosm Ltd.
*Pace -- iLok
*SafeNet
*SecuTech Solution Inc.
*SPYRUS, Inc.
*Syncrosoft/Steinberg
*WIBU-SYSTEMS AG
*MARX Software Security GmbH

References

See also

* The trusted client model

External links

* [http://www.catb.org/~esr/jargon/html/D/dongle.html Jargon File: dongle]


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Dongle — für die USB Schnittstelle Kopierschutzstecker, auch Dongle, Dongel, Hardlock oder Key genannt, dienen dazu, Software vor unautorisierter Vervielfältigung zu schützen. Mit der Software wird beispielsweise ein Kopierschutzstecker ausgeliefert, der… …   Deutsch Wikipedia

  • dongle — UK US /ˈdɒŋɡl/ noun [C] ► IT a device that is attached to a computer that enables the computer to run a particular piece of software, or that can be used in other ways, for example as a wireless adapter …   Financial and business terms

  • Dongle — Kopierschutzstecker; Hardlock * * * Dongle   [dt. Kopierschutzstecker] der, ein Schutz, der verhindert, dass eine Software auf mehreren Computern gleichzeitig benutzt wird. Bei einem herkömmlichen Dongle handelt es sich um einen speziellen… …   Universal-Lexikon

  • Dongle — Sur les autres projets Wikimedia : « Dongle », sur le Wiktionnaire (dictionnaire universel) Un dongle sur port parallèle …   Wikipédia en Français

  • dongle — ● ►en /d(on) g*l/ n. m. ►COP Clef matérielle de protection, qui se branche en général sur un port d E/S. Il stocke un certain code qui, s il n est pas trouvé par le logiciel associé au dongle, provoque l arrêt du logiciel en question. Le Dongle… …   Dictionnaire d'informatique francophone

  • Dongle — Original name in latin Dongle Name in other language Dongle, Dongle Xiang, Tung le, dong le, dong le xiang State code CN Continent/City Asia/Chongqing longitude 38.82722 latitude 100.79806 altitude 1606 Population 0 Date 2013 07 05 …   Cities with a population over 1000 database

  • dongle — UK [ˈdɒŋɡ(ə)l] / US [ˈdɑŋɡ(ə)l] noun [countable] Word forms dongle : singular dongle plural dongles computing a piece of equipment that must be connected to a computer before a particular program can work …   English dictionary

  • Dongle — Don|gle [ dɔŋgl̩] der; s, s <aus gleichbed. engl. dongle> Kopierschutz[stecker], Einrichtung zur Sicherung eines Computers gegen unbefugte Benutzung (EDV) …   Das große Fremdwörterbuch

  • dongle — TV A device that prevents the unauthorized use of hardware or software. A dongle usually consists of a small cord attached to a device or key that secures the hardware. The term is also used to signify a generic adapter for peripherals …   Audio and video glossary

  • dongle — aparatinis saugumo raktas statusas T sritis informatika apibrėžtis Nedidelis įtaisas, jungiamas prie kompiuterio per vieną iš jo išorinių ↑prievadų. Naudojamas informacijai apsaugoti nuo nesankcionuoto kopijavimo. Pavyzdžiui, paleidžiama programa …   Enciklopedinis kompiuterijos žodynas


Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.