This article needs additional citations for verification. (March 2008) (Learn how and when to remove this template message)
A dongle is a small piece of hardware that connects to a laptop or desktop computer. It is a portable device and is often close to the appearance of a USB flash drive. Although earlier use of dongles was to authenticate a piece of software, the word dongle is now widely used to refer to a broadband wireless adaptor  or in general to connectors that translate one type of port to another. The term dongle can also refer to audio recording connectors.
Electrically, the authentication dongles mostly appear as two-interface security tokens with transient data flow that does not interfere with other dongle functions and a pull communication that reads security data from the dongle. These are used by some proprietary vendors as a form of copy protection or digital rights management, because it is generally harder to replicate a dongle than to copy the software it authenticates. Without the dongle, the software may run only in a restricted mode, or not at all. Despite being a hardware device, dongles are not a complete solution to the trusted client problem.
In 1980, WORDCRAFT became one of the earliest programs to use a software protection dongle. Its dongle was a simple passive device that supplied data to the pins of a Commodore PET's external cassette port in a pre-determined manner. This was possible because the PET cassette port supplied both power and data connections through a proprietary edge connector. It did, however, make the cassette port unusable for its intended purpose.
The two-cubic-inch (32 cm³) resin-potted first generation device was called a "dongle" by the inventor, in the absence of a suitable term. The distributor, Dataview Ltd., then based in Colchester, UK, then went on to produce a derivative dongle, which became their core business.
Dongles rapidly evolved into active devices that contained a serial transceiver (UART) and even a microprocessor to handle transactions with the host. Later versions adopted the USB interface in preference to the serial or parallel interface. The USB interface is gradually becoming dominant.
Interestingly, modern smart cards present the same feature set as modern dongles. Given this, the dongle market may be overtaken by smart cards, as smart cards are more secure and powerful by design than traditional MCU based dongles. Some dongle vendors are producing one-chip dongles, which combine the smart card and the smart card reader in the same chip. This structure makes a smart card dongle easy and stable.
A 1992 advertisement for Rainbow Technologies (now SafeNet—a dongle vendor in the U.S) claimed the word was derived from the name "Don Gall". Though untrue, this has given rise to an urban myth.
During 2008 to 2009, due to the financial crisis, some big actions were taken in dongle area. Aladdin first bought Eutron, a European dongle vendor before 2008. Six months later, Aladdin was acquired by SafeNet. After this transaction, Rainbow (SafeNet), Aladdin (HASP) and Eutron merged to a single entity.
Vendors of software-protection dongles (and dongle-controlled software) often use terms such as hardware key, hardware token, or security device instead of dongle, but the term "dongle" is much more common in day-to-day use.
Efforts to introduce dongle copy-prevention in the mainstream software market have met stiff resistance from users. Such copy-prevention is more typically used with very expensive packages and vertical market software, such as CAD/CAM software, MICROS Systems hospitality and special retail software, Digital Audio Workstation applications, and some translation memory packages. The vast majority of printing and prepress software, such as CtP workflows, requires dongles.
In cases such as prepress and printing software, the dongle is encoded with a specific, per-user license key, which enables particular features in the target application. This is a form of tightly controlled licensing, which allows the vendor to engage in vendor lock-in and charge more than it would otherwise for the product. An example is the way Creo licenses Prinergy to customers: When a computer-to-plate output device is sold to a customer, Prinergy's own license cost is provided separately to the customer, and the base price contains little more than the required licenses to output work to the device.
Well-known software-protection dongle manufacturers include SafeNet (Rainbow before an acquisition), Aladdin (acquired by SafeNet), WIBU-SYSTEMS, Matrix (Matrix Dongle), SG-Lock, Feitian Technologies, UniKey (or SecuTech), Senselock (or Sense), SPYRUS, Inc. (Rosetta USB, Hydra PC), and MARX (CRYPTO-BOX). In the digital audio world, some versions of Pro Tools and many plugins use the Pace iLok Smart Key USB dongles.
USB dongles are also a big part of Steinberg's audio production and editing systems, such as Cubase, Wavelab, Hypersonic, HALion, and others. The dongle used by Steinberg's products is also known as a Steinberg Key. The Steinberg Key can be purchased separately from its counterpart applications and generally comes bundled with the "Syncrosoft License Control Center" application, which is cross-platform compatible with both Mac OS X and Windows.
There are potential weaknesses in the implementation of the protocol between the dongle and the copy-controlled software. It requires considerable cunning to make this hard to crack. For example, a naïve implementation might simply define a function to check for the dongle, returning "true" or "false" accordingly, but the dongle requirement can be easily circumvented by modifying the software to always answer "true".
Modern dongles include built-in strong encryption and use fabrication techniques designed to thwart reverse engineering. Typical dongles also now contain non-volatile memory — key parts of the software may actually be stored and executed on the dongle. Thus dongles have become secure cryptoprocessors that execute inaccessible program instructions that may be input to the cryptoprocessor only in encrypted form. The original secure cryptoprocessor was designed for copy protection of personal computer software (see US Patent 4,168,396, Sept 18, 1979) to provide more security than dongles could then provide. See also bus encryption.
However, security researchers warn that dongles still do not solve the trusted client problem: if you give a user the cryptographic ciphertext, the algorithm and the key, your cipher is likely to be breakable, even with the algorithm and key encoded in hardware.
In counterfeit versions of a program, the code to check for a dongle is often deleted or circumvented. As a result, the counterfeit version may be easier to use and thus may seem preferable to the original.
Hardware cloning, where the dongle is emulated by a device driver, is also a lethal threat to traditional dongles. To thwart this, some dongle vendors adopted smart card product, which is widely used in extremely rigid security requirement environments such as military and banking, in their dongle products.
Dongle drivers bring problems for end-users. Most developers and software vendors want to get rid of the dongle driver headache. There are some driverless dongles on the market, which make the protection easy for both software vendors and end-users.
A more innovative modern dongle is designed with a code porting mechanism, meaning you can transfer part of your important program code or license enforcement into a secure hardware environment (such as in a smart card OS, mentioned above). An ISV can port thousands of lines of important computer program code into the dongle.
The Real time dongle contains an internal real time clock, independent from the Operating system clock, and designed for software vendors who need to control and manage rental and sale usage and/or maintenance. This allows pay per use by charging the end users timely and periodically for actual periods of use. This function is based on a real time clock in the dongle which records the specific time (hour, minute, second) and date (day, month, year). If there isn't a battery inside the dongle, it is not a real time dongle. There are only 2 real time dongles, the one is HASP Time, and the other is UniKey Time.
With the Nintendo DS and the Nintendo DS Lite having a slot that can accommodate Game Boy Advance games, a few DS games have used this GBA slot to allow interaction between DS games and GBA games while both are plugged in. Since in this case the DS game is running and the GBA game is simply serving in a read-only capacity (the player may sometimes use data from the GBA game, but cannot actively play it in this mode), many people refer to the GBA game plugged in as the "dongle" game. This is notably used in the popular Pokémon Diamond and Pearl games. The Nintendo DSi does not have a GBA game slot, which means it cannot be used in the same way as the original DS or the DS Lite, a decision that was highly controversial.
The term "dongle" has been generalized to refer to things that are structurally different than connectors that translate one type of port to another — for example, an 8P8C modular jack that plugs into the edge connector on a PC Card or ExpressCard Ethernet adapter (shown at right). These are sometimes called "pigtails" — a term that traditionally refers to a short cable with a connector at one end and bare leads at the other, but has also been generalized to refer to a very short patch cable. Similarly, a dongle with one connector on one end and multiple connections on the other is also called a breakout cable.
Dongle may also mean a small active device such as a USB flash drive or a wireless networking adapter. Douglas Adams, in a 1990s column for the US edition of MacWorld magazine, used the term "little dongly things" to describe converters for adapting US power cables to international plugs. However, these broader usages are not universally accepted.
|This user page may require cleanup to meet Wikipedia's quality standards. No cleanup reason has been specified. Please help improve this user page if you can; the talk page may contain suggestions.|
- SafeNet Inc.-Aladdin -- Hardlock, HASP
- Feitian Technologies -- ROCKEY
- SecuTech Solution Inc. -- UniKey
- Data Encryption Systems Ltd DESkey
- MARX Software Security GmbH
- Matrix Software License Protection System
- Microcomputer Applications, Inc. (MAI) -- KEYLOK
- MicroWorks, Inc. SmartDongle (TM)
- Okyanus Bilisim Teknolojileri - O-Key Dongle
- Senselock Data Security Center
- WIBU-SYSTEMS AG
- The term dongle is used in the first season of the popular web series "Red vs. Blue" produced by Roosterteeth, although in their reference, they are referring more specifically to a switch, and not the exact definition
- The term dongle is also used in season three of the web series "Red Vs. Blue" when the main character Church asks a computer if it knows any jokes, to which the computer replies "Pull my dongle"
- A "dongle bomb" was a recurring device in the Adventures of Jetman, a cartoon strip in the 1980s computer magazine, Crash.
- According to the Oxford English Dictionary, the first printed reference is from a Jan 1982 MicroComputer Printout Vol 2:19, "The word ‘dongle’ has been appearing in many articles with reference to security systems for computer software." (refers to alleged coinage in 1980)
- BBC NEWS | Technology | 'Dongle' links to web
- Huawei unwraps 21Mb/s HSDPA dongle
- US Patent 4,168,396
- Attacks on and Countermeasures for USB Hardware Token Devices[dead link] (PDF), Joe Grand, Grand Ideas Studio, Proceedings of the Fifth Nordic Workshop on Secure IT Systems Encouraging Co-operation, Reykjavik, Iceland, October 12–13, 2000, pp 35–57, ISBN 9979-9483-0-2
- "DNA/Dongly Things". Douglasadams.com. Retrieved 2009-10-29.
- "The New Adventures of Mr Stephen Fry - The Dongle of Donald Trefusis - Episode 3 now available". Stephenfry.com. Retrieved 2009-10-29.
- Adventures of Jetman - Crash - Issue 20
- Jargon File: dongle
- DEFINED at techterms.com
- DEFINED at searchcio-midmarket.techtarget.com
- DEFINED at google.com/search
- DEFINED at online-dictionary.biz
- Word does not appear at dictionary.cambridge.org as of 05:30, 11 October 2009 (UTC)
- DEFINED at websters-online-dictionary.org
- DEFINED at webopedia.com
[[Category:Copyright infringement]] [[Category:Digital rights management]] [[Category:Software licenses]] [[Category:Copyright infringement of software]] [[Category:Warez]] [[bg:Dongle]] [[da:Dongle]] [[de:Dongle]] [[es:Mochila (dispositivo)]] [[fr:Dongle]] [[ko:동글]] [[ms:Dongle]] [[nl:Dongle (hardware)]] [[ja:ドングル]] [[pl:Klucz sprzętowy]] [[pt:Dongle]] [[ru:Электронный ключ]] [[sv:Dongel]]