(Redirected from Hasp key)
A software protection dongle (commonly known as a dongle or key) is an electronic copy protection and content protection device. When connected to a computer or other electronics, they unlock software functionality or decode content.[1] The hardware key is programmed with a product key or other cryptographic protection mechanism and functions via an electrical connector to an external bus of the computer or appliance.[2]
In software protection, dongles are two-interface security tokens with transient data flow with a pull communication that reads security data from the dongle. In the absence of these dongles, certain software may run only in a restricted mode, or not at all. Apart from software protection, dongles can enable functions in electronic devices, such as receiving and processing encoded video streams on television sets.
HASP key dongle for LPT port
USB Dongle Backup and Recovery 2012. USB Dongle Backup and Recovery 2012 is new generation of dongle safety utility. This product emulates physical presence of hardware key by means of virtual. What is HASP and dongle Dongle is a device to plug in to the LPT (or other) port. It is used to store some information and to communicate with protected software. I need recommendation of the correct driver for my SafeNet usb key for a program from 2007. I used it on Windows 7 64-bit with success and now I would SafeNet USB Driver for Windows 10 64-bit - Gemalto Sentinel Customer Discussions.
History[edit]
The Merriam-Webster dictionary states that the 'First known use of dongle' was in 1981 and that the etymology was 'perhaps alteration of dangle.'[3]
Hasp Key Dongle Free
A Rainbow Tech parallel port dongle PCB, front side. Note the numbers rubbed off the chips to make reverse engineering harder
A Rainbow Tech parallel port dongle PCB, back side
Dongles rapidly evolved into active devices that contained a serial transceiver (UART) and even a microprocessor to handle transactions with the host. Later versions adopted the USB interface, which became the preferred choice over the serial or parallel interface.
A 1992 advertisement for Rainbow Technologies claimed the word dongle was derived from the name 'Don Gall'. Though untrue, this has given rise to an urban myth.[4]
Usage[edit]
Daisy chained parallel port copy protection dongles.
Efforts to introduce dongle copy-protection in the mainstream software market have met stiff resistance from users. Such copy-protection is more typically used with very expensive packages and vertical market software such as CAD/CAM software, cellphone flasher/JTAG debugger software, MICROS Systems hospitality and special retail software, Digital Audio Workstation applications, and some translation memory packages.
In cases such as prepress and printing software, the dongle is encoded with a specific, per-user license key, which enables particular features in the target application. This is a form of tightly controlled licensing, which allows the vendor to engage in vendor lock-in and charge more than it would otherwise for the product. An example is the way Kodak licenses Prinergy to customers: When a computer-to-plate output device is sold to a customer, Prinergy's own license cost is provided separately to the customer, and the base price contains little more than the required licenses to output work to the device.
USB dongles are also a big part of Steinberg's audio production and editing systems, such as Cubase, WaveLab, Hypersonic, HALion, and others. The dongle used by Steinberg's products is also known as a Steinberg Key. The Steinberg Key can be purchased separately from its counterpart applications and generally comes bundled with the 'Syncrosoft License Control Center' application, which is cross-platform compatible with both Mac OS X and Windows.
Some software developers use traditional USB flash drives as software license dongles that contain hardware serial numbers in conjunction with the stored device ID strings, which are generally not easily changed by an end-user. A developer can also use the dongle to store user settings or even a complete 'portable' version of the application. Not all flash drives are suitable for this use, as not all manufacturers install unique serial numbers into their devices.
Although such medium security may deter a casual hacker, the lack of a processor core in the dongle to authenticate data, perform encryption/decryption, and execute inaccessible binary code makes such a passive dongle inappropriate for all but the lowest-priced software. A simpler and even less secure option is to use unpartitioned or unallocated storage in the dongle to store license data. Common USB flash drives are relatively inexpensive compared to dedicated security dongle devices, but reading and storing data in a flash drive are easy to intercept, alter, and bypass.
Issues[edit]
There are potential weaknesses in the implementation of the protocol between the dongle and the copy-controlled software. It requires considerable cunning to make this hard to crack. For example, a simple implementation might define a function to check for the dongle's presence, returning 'true' or 'false' accordingly, but the dongle requirement can be easily circumvented by modifying the software to always answer 'true'.
Modern dongles include built-in strong encryption and use fabrication techniques designed to thwart reverse engineering. Typical dongles also now contain non-volatile memory — essential parts of the software may actually be stored and executed on the dongle. Thus dongles have become secure cryptoprocessors that execute program instructions that may be input to the cryptoprocessor only in encrypted form. The original secure cryptoprocessor was designed for copy protection of personal computer software (see US Patent 4,168,396, Sept 18, 1979)[5] to provide more security than dongles could then provide. See also bus encryption.
Hardware cloning, where the dongle is emulated by a device driver, is also a threat to traditional dongles. To thwart this, some dongle vendors adopted smart card product, which is widely used in extremely rigid security requirement environments such as military and banking, in their dongle products.
A more innovative modern dongle is designed with a code porting process which transfers encrypted parts of the software vendor's program code or license enforcement into a secure hardware environment (such as in a smart card OS, mentioned above). An ISV can port thousands of lines of important computer program code into the dongle.[citation needed]
In addition, dongles have been criticized because as they are hardware, they are easily lost and prone to damage, potentially increasing operational costs such as device cost and delivery cost.
Game consoles[edit]
Some unlicensed titles for game consoles (such as Super 3D Noah's Ark or Little Red Hood) used dongles to connect to officially licensed ROM cartridges, in order to circumvent the authentication chip embedded in the console.[citation needed]
Some cheat code devices, such as the GameShark and Action Replay use a dongle. Typically it attaches to the memory card slot of the system, with the disc based software refusing to work if the dongle is not detected. The dongle is also used for holding settings and storage of new codes, added either by the user or through official updates, because the disc, being read only, cannot store them. Some dongles will also double as normal memory cards.
See also[edit]
References[edit]
- ^Amos, S. W.; Amos, Roger S. (2002). Newnes Dictionary of Electronics (4th ed.). Newnes Press. p. 152. ISBN0750643315. OCLC144646016. Retrieved 4 July 2013.
- ^Stobbs, Gregory A. (2012). Software Patents (Third ed.). Wolters Kluwer. pp. 2–90. ISBN9781454811978. OCLC802867781. Retrieved 4 July 2013.
- ^'Dongle'. Merriam-Webster. Retrieved 11 June 2019.
- ^Sentinel advert, Byte Magazine, p. 33
- ^US Patent 4,168,396
External links[edit]
Retrieved from 'https://en.wikipedia.org/w/index.php?title=Software_protection_dongle&oldid=982561385'
WelcomeToMM Group'sweb page | |
Need HASP or HASP HLor other DONGLE DUPLICATE ? (hardware copy) |
IF YOU do not know what kind of USB dongleyou have or something unclear click here to identify it if you know what you want READ LPT (PRINTER PORT) TYPE HASP click here read USB TYPE HASP click here | |||
(c) 2018 MM Group. HASP - Duplicators Page was modified on12.11.2018 | Dongleis a device to plug in to the LPT (or other) port. It is used to storesome information and to communicate with protected software. Ifsoftware can't find required dongle, it will not run properly. It'smain purpose copy protection. HASP (R) is a trademark name of donglesmanufactured by Alladin. | ||
A:HASP wiring scheme is common for all HASP dongles. The unique is onlyfunctional and memory content inside the HASP chips. In case of Memo-x,NetHASP, TimeHASP, HASP36,HASP4 the PC talks to dongle via D0-D7 wires(pin 2 ..9 on D25 parallel port connector, in the case of LPT). Thedongle answers to PC via 'PaperEnd' (pin 12 ) wire. All other wires areused just to supply a power or switch it on/off. | |||
Toanalyze HASP protocol yourself you will need logic state analyzer withat least 9 (better 12) channels. The sampling rate must be minimum 2times higher than your parallel port speed. Also it must have multipletriggering capability and enough memory. Exampleof HASP logic state analysis here. and we will do it for you. | |||
Thereare 3 ways to avoid you dongle: 1.Modify protected software - usually complicated and can causelost of some functionality of software. It is also illegal in many states. 2.Use HASP driver emulator is good way, but it does not always workperfectly, especially sensitive for upgrades and OS changes. Sometimesexpensive. 3.Make hardware duplicate of your original HASP. This is also good wayand there is no need to modify/create any software. If you do not wantto touch HASP protected soft due legal issues or worry tocause its proper operation - read below. . | |||
How wedo HASP hardware You will only need to read data of you HASP. But you don't have tosend a HASP to Us! (thisis usual question). Simply we will send you small program which in fewseconds will read all data from your HASP and write it to separatefile. This file you should send back to us and from supplied data wewill develop your HASP dongle replacement. And we can do a lot of them!!! |
INSTRUCTIONS HOW TO IDENTIFY YOUR DONGLE | ||||||
Thereare vast number of various dongles floating around, and 'Hasp' is justone kind of them. How to know which one is in your hands? It could beSafeNet Sentinel, Rockey, ILok, Gemplus,Hardlock, Marx, Wibu oranything else. All they made by different vendors, has differentfunctions and appearance. The first thing you need to know whatexactly you have. Luckily Microsoft developed nice application'UVCView.exe' which can show all devices plugged in to USB ports ofcomputer and pull all basic identification information out of it. Belowis step-by step instruction how to get identification data out of yourdongle: | ||||||
1. | Download archivedUVCView.zip here Is it safe? UVCView is not our product. It is Open source sample applicationdeveloped by Microsoft (R) and included with Windows(R) driverdevelopment kit. If you don't trust this site, just search for'UVCview' on internet and download from wherever you want. | |||||
2. | Unpack and run (doubleclick)UVCView.x86.exe | |||||
3. | On the left side you can seeall USB ports and devices of your PC | |||||
4. | Plug your USB dongle andpress 'Refresh' in File menu to see the latest list. (Sometimes Refresh is done automatically) | |||||
5. | Click on the device and all its information showup on the right side | |||||
6. | Save thatinformation in to Key.txt file by going to menu File, Save As..., enterfile name and Save | |||||
. | ||||||
7. | Email Key.txt file to [email protected] Sowe can verify what sort of dongle is it, how it can be duplicated, andwhat are future instructions and procedures for creating its duplicate. We reply usually within 24 hours. | |||||
Note: | ||||||
Theidentification technique is Vendor independent and works with any USBdevice, even with USB Flash drive. You can play with it as much as youlike. There is no need to have any drivers or any softwareinstalled. If you would see 'Found New Hardware' you cansafelycancel installation. | ||||||
(this is only forprallel port dongles!) | ||||||
1. | Download Haspdata reader hasp4rdr.exe | |||||
2. | Prepare empty floppy disk and run dowloaded Hasp4rdr.exe | app will ask you to insert floppy and writes DOS boot files and Hasp4 reader on it | ||||
3. | You will getMS-DOS boot disk with Hasp4 reader on it | |||||
4. | Read 'ReadMe.txt'file on the disk. | |||||
5. | Plug your Hasp into LPT port | |||||
6. | RebootPC from this floppy. Folowonscreen instructions & read your hasps data | Thenyou will get your HASP data file with all memory content an otherinternal settings saved in *.hsp file on the same floppy Ifsomething unclear - contact us: [email protected] | ||||
7. | E-maireceived hasp datafile *.hsp back to [email protected] | |||||
8. | Thenwe will verify if all data grabbed correctly and estimate a price ofyour HASP duplicate. From this data we will develop twin of your HASP !!!! | |||||
<= Readabut this here | ||||||
<= Read about this here | ||||||
Contact Info: | MM Group By Email : [email protected] |
INSTRUCTIONS FOR USB HASP REPLICAARE BELOW | |||
(if something not works -send us dongle identification data as instructed here ) | |||
Before we can read a Hasp - we need toknow our Hasp passwords. They are diferent for each softwarevendor. If you don't know them or don't know what they are -read how to get Hasp Passwords If you know them - continue to reading sep by stepprocedure below. |
Hasp Key Dongle Software
1. | Nowwe have our hasp passwords ready and your hasp plugged. Notethat from this point everything can be done on any PC. Itis not need to have your protected application installed. DownloadHasp reader archive: HaspHLrdr.zip(165kb) |
2. | Createseparate folder for it. For example C:HaspHLrdr |
3. | Unzipdownloaded archive in to this new folder. It is 3 file inside: HaspHLrdr.exe, Dongdupe.sys, Dongdupe.inf |
4. | Firstof all we need to install reader drivers. This is a standard OSprocedure as for any other hardware but for clarity it is illustratedbelow. Note that later driver can be removed in same way. |
5. | Goto 'Start' => 'Settings' => 'ControlPanel' => 'System' |
6. | Select 'Hardware' tab=> 'Device Manager' and then in USB Devices tree find our USBdevice. In most cases it will be 'Aladdin USB Key'. Now RIGHTCLICK mouse on it and select 'Update Driver...' P.s Device Manager can also be reached in other ways. |
7. | Hardware UpdateWizard will start. When offered - select 'No, not this time'and go 'Next'. |
8. | Select 'Install from a listor specific location' and go 'Next' |
9. | On the search and installoptions select 'Don't search. I will choose the driver to install' andgo 'Next' |
10. | Then offered to selectdriver to install. It could be seen a number of items on the list -just ignore them and press 'Have Disk...' |
11. | Opens Install from Diskdialog - press 'Browse...' and locate dongledupe.inf file which is inthe same folder where we unzipped whole reader - see step_3above. In our example it is C:HaspHLrdr. Select it, then 'Open' and 'OK'. |
12. | Later you can see a warningthat Dongle-Duplicate driver is not passed Windows Logo. Select'Continue Anyway' |
13. | Atthe end is final screen saying that installation done. Select 'Finish'. Herewe MUST Restart PC. In mostcases it will be the ask to do so from Windows, but if not - we sillneed to reboot now. |
14. | After restart we can go toDevice Manager again and verify if our driver is loaded ok - see steps5. and 6. above. On the list we should see 'Dongle-Duplicate readingdriver'. Note that hasp has to be plugged all this time. |
15. | Now we a fully ready toread. Go to the folder where reader is - in our example it isC:HaspHLrdr Run HaspHLrdr.exe enter your hasp passwords(in our example they was 3C39:25A0) and press 'Read'. Wait few minutes until it tells that readingdone and data in to file saved. This data file with DMP extension savedin same to same folder where reader is. Find it and email to [email protected] |
Contact Info: | Any questions or something not works - write: Email : [email protected] Respond within 24 hours. |