Each technology (not necessarily computer technology) during its existence goes through three stages: the stage of development and implementation, the stage of mass practical use, and the stage of being forced out of the market by competing developments. Sometimes technology is “lucky”: the first stage passes very quickly, but the second lasts for many, many years, and the third proceeds so reluctantly and smoothly that it is sometimes even difficult to notice. The simplest developments feel especially good in this regard, moreover, they are supported by one powerful company that has a great influence on the market (however, in the computer market now the second is much more important than the first, especially considering that for primitive things "an ecological niche ' is very limited). But it is difficult for complex and seemingly interesting and useful technologies that are promoted together. Technology becomes especially bad if, without having time to take a serious place in the market, it gets a competitor of the first category. A striking example of such a case is Bluetooth. Back in 1998, as many as five large companies were engaged in the creation new technology wireless communication. And the names seem to be loud Intel, IBM, Toshiba, Ericsson and Nokia, and the need for new solutions is ripe ... At the same time, a whole consortium was created, and even developed something. Literally three years later, the development stage ended it was time to implement and use it. Great amount firms announced their wireless devices with the support of new technology. However, competitors then already loomed on the horizon (and the strongest of them is the IEEE 802.11 standard), but they were all much more complex, and, therefore, not necessary for many applications and significantly more expensive or vice versa weaker technically. So it seemed that Bluetooth had a great future ahead of it. You don’t need to talk about the mood of those years just read two articles (this one or this one) published on our website on one fine April day in 2001 (by the way, the technology itself is well described in them, so I’ll focus on this issue too I won't). In general, all the people have fun and rejoice :)

The reality turned out to be much more unpleasant. In seven nannies, as expected, the child turned out to be, if not without an eye, then deaf for sure devices released by different companies suffered from a strong lack of communication in relation to each other. Some developments were never “finished”, as a result, many interesting devices, which were even shown in prototypes at CeBIT 2001, did not appear on the wide market. Added problems to promote the new standard and Microsoft in Windows XP, official support for Bluetooth did not appear, device drivers are still not certified, and since communication was one of the goals of developing the technology mobile devices With personal computers(and not just with each other), the manufacturers had to think even harder. Under appropriate conditions, the manufacturers of chipsets for motherboards: Bluetooth has remained optional equipment for the PC. So neither shaky nor rolls passed another year. The launch began to drag on instead of using the new technology with might and main, we continued to observe the attempts of manufacturers to finally finish everything. However, since 2002, it has already been possible to use Bluetooth ... but is it necessary? The choice of devices was rather narrow, the prices high, so fixing compatibility problems was only part of the job (you can get some impression of how the situation was in general from this article).

Meanwhile, 802.11 grew and became cheaper. Moreover the corresponding adapters have become standard equipment of some computers (from Apple in particular). And other companies began to think that opportunities are not superfluous if they do not have to pay too much for them. The strongest blow in the back of her offspring inflicted Intel this year: One of the three pillars of the new Centrino platform is wireless radio… 802.11. And the company can be understood: this protocol is better suited for building networks of computers into which a portable PC needs to be integrated than Bluetooth, and it copes with other duties no worse. Which wireless protocol a company implements in desktop chipsets is now a rhetorical question. Other manufacturers are unlikely to lag behind Intel they are already running a race: who realizes more opportunities. It is also easy to predict which option users will choose: to purchase, for example, a Bluetooth-enabled cell phone and solve the issues of ensuring its operation with a computer on their own, or to pay even a little more for a handset with Wi-Fi, but no longer solve any problems (except perhaps with power consumption, but they will do something about it) and not buy anything for the computer (especially if they have already managed to admire the dances with tambourines performed by Bluetooth enthusiasts). And it began ... We went announcements of portable WiFi adapters for already released models of portable equipment and the equipment itself with built-in protocol support. Well, why not? At least, here Microsoft is not against it, and one of the chipset manufacturers has made a bet on the technology, so who will it “connect” with. So Bluetootth suddenly migrated from the first stage to the third.

But what about the use? Really, no one has had time to join the new wireless technology, except for enthusiasts? Well, not really. In the end, while not every computer has an adapter with Wi-Fi, and you can’t buy a phone with it at all. At the same time, there are already a lot of models with Bluetooth support on the market, and at very attractive prices (for example, you can buy a phone for less than $100). Thus, if you already need a more convenient way to connect various devices today than infrared port or, moreover, various cables, then it makes sense to turn your attention to Bluetooth. And what needs to be done for this? At a minimum, purchase an appropriate adapter for your computer. The most optimal, in my opinion, is an adapter with USB interface 1.1 (so-called USB Dongle): since the Bluetooth speed does not exceed 1 Mbps, the interface will not become a bottleneck when exchanging data, but such an adapter can be used with both desktop and mobile computer, and with anyone (USB ports have long been present in any computer) and for this you don’t even have to climb inside the case. Such adapters have been produced for a long time and by many companies. However, the variety is only apparent: the basis of any such device is only one microcircuit, and only two manufacturers produce them. Today we will look at Cambridge Silicon Radio (CSR) chip adapters manufactured by a Taiwanese company.

Bluetooth USB Dongle Class 1

According to Bluetooth standard, devices are divided into two classes, depending on the sensitivity and, accordingly, the radius of work. First-class devices have a sensitivity of -88 dBm and in open areas allow you to keep in touch at a distance of up to 100 m. I note that such products are not available in the lines of quite a few companies and no wonder: not all users need such distances. On the other hand, I came up with an area for using first-class long-range dongles :)

Despite the high operating range, the device is quite compact and does not have any external antennas(although some manufacturers attach them to Class 2 adapters as well). Dimensions and appearance it strongly resembles a regular flash drive, only a little more angular. The case is made of translucent plastic, through which the filling of the device is perfectly visible. The transparency of the case allows the stylish blue activity indicator to illuminate the room in a very interesting way when the external lighting is off :) There is no protective cap that covers the connector (like in flash drives), but, in general, it is not needed.

The delivery set is as simple as three pennies: the dongle itself, a short printed manual (Getting Started) in English and German, as well as a CD with software and full documentation in the same two languages. I would still not refuse to have a USB extension cable, even if it is of a small length. The fact is that, despite the compactness of the device, with a width of almost two centimeters, it is not very convenient to connect it to USB ports on an external bracket or an expansion card - it will often interfere with neighbors. It is quite easy to connect to the “standard” port, but only to the upper of the two. At the same time, only a cable can be inserted into the lower connector, but nothing larger (the flash drive will not stick in any way), and even then it will enter with some difficulty and at a not quite standard angle. Fortunately, it does not interfere with the mouse and keyboard, the printer connector is possible (I could not check it, because I already started to forget in what year I last used a printer connected via LPT).

All this is packaged in a nice and compact cardboard box that carries a lot of useful information on its walls.

Bluetooth USB Dongle Class 2

If you don't need the ultra-high sensitivity that you have to pay for, a second-class dongle is your best bet. Also, it's worth noting that most transceivers in handheld devices still fall into this class, so even if you want to work with your PDA at a distance of 100 meters from an Internet access point (PC-based or specialized), you not necessarily succeed. But there is some confusion with the range of second-class devices: as far as I remember, the standard says about 10 meters, and X-Micro stubbornly indicates 20 (however, it is quite possible that the sensitivity of second-class devices from this manufacturer, which is -70 dBm, is somewhat better than required by the standard, so that they can really work with each other over long distances). However, it is very difficult to check all this, if at all possible it is said about the distance in open areas, but where to look for it in the city (and the level of interference, again, is somewhat higher than zero)? :)

The drive itself has become smaller since now the requirements for the antenna, which the main board works with, are less stringent, the board can be slightly compressed, however, this primarily concerns the length and thickness of the device the width has remained almost the same, so there may be problems when connecting the device to port on a bar or card, but sticking it into the “standard” port is somewhat more convenient (due to its smaller thickness) than the older model. Transparent plastic was abandoned, but the "color music" in the room did not disappear: the LED is visible through a special slot. In general, when smaller sizes the device looks a little nicer than its "brother".

The delivery set has not changed in any way, and the packaging is the same only one icon on the front side has changed, and the dongle recess has changed size and shape.

Software

The element base of both dongles is the same, so there is nothing surprising in the fact that both devices are equipped with the same software released by the chip manufacturer. Installation generally goes smoothly, but some users may be intimidated by the message about uncertified device drivers it is quite logical: since Microsoft does not want to support this technology, and it does not conduct software certification. In fact, we’ve been talking about the main functions of CSR software for almost a year and a half, so now we’ll go over it just to refresh our memory (over the past time, everything has become somewhat more reliable and convenient, but the new versions of the software are based on the same principles as before).

So, what changes after installation software? The “My Bluetooth Places” icon appears on the desktop, serving as a kind of analogue to “ network environment". In this folder you can find "attached" to this computer BT devices, browse the entire BT network to search for new devices (in this case, a device does not mean a PDA or a phone in general, but the services they provide), go to setting up BT points, etc. And a new icon appears in the system tray of the taskbar, clicking on which with the left mouse button sends us to the folder described above, and with the right , as expected, calls up a menu with which you can go to setting up the entire household, quickly “connect” to the computer which - either a device (for example, remote access by means of a mobile phone) or temporarily disable the functioning of the adapter. You can also call the adapter properties dialog using the control panel applet. Actually, almost all of this was before, with the exception of some small details.

Let's take a closer look at the settings dialog. It is intended for advanced users (which we are :)) in case of self-doubt, it is better to use the appropriate “wizard”.

The first page is more informational than setup. Here you can, for example, see the software version. You can change the type of computer, although this only affects what icon it will be displayed on the Bluetooth network. If you wish, you can also change the name of the computer (by default it is the same as in the usual local network), although there is no need for this either.

But the next page is already more interesting: here we can actually choose the security level of the computer, allowing or denying various devices connect to a computer. You can deny or allow access to all devices without exception, allow access only to devices "paired" (paired) with the computer, or simply allow the computer to respond to calls only from devices from the list, ignoring all others.

The next tab allows the computer to automatically search for other Bluetooth devices in the area of ​​visibility at certain intervals, and also selects which devices will be displayed in the "My Bluetooth Places" folder all possible or only belonging to certain classes.

The next two tabs are very important. The first one allows you to configure the services provided by this computer to other Bluetooth devices. The main thing is whether this service will start automatically or at the user's choice (for a long time I got the standard XP icon, reporting that network cable is not connected to one of the network interfaces, until I remembered the possibility of simply turning off this service :)), and also whether it is necessary to establish a secure connection to access this service. Also here you can create virtual serial ports (needed for compatibility with older software) or remove them when the need is gone.

The penultimate tab is very similar to the previous one, but they perform diametrically opposite functions: here you will configure access to remote services(that is, not belonging to this computer, but provided to it by other devices). Of course, the settings for both devices must match. For example, if you want to link two computers for file transfer, then both need to be configured File Transfer in the same way on both tabs: if one of them tries to “pair” with the other, and the other is configured to use an insecure connection, no connection will come out. With other devices, the situation is somewhat simpler: since it is rarely possible to configure them, you just need to read the documentation what type of connection you need to choose and work accordingly on the “Client Applications” tab.

Why did it take two bookmarks, although it would be possible, theoretically, to get by with one? The fact is that Bluetooth is an asymmetric protocol, like USB with its master-slave protocol. However, there is an important difference: any device can be both a client and a server at the same time (in general, there is no honest point-to-point mode in Bluetooth, but, in principle, you can emulate it), but the “server” part of the device is naturally configured separate from the client.

The last tab is purely informational - it tells about the Bluetooth controllers installed in the computer (and there may be several at the same time).

Usage practice

What can Bluetooth be used for? For most users, the main incentive is the purchase of a mobile phone, or, less commonly, a PDA. Well, let's see what we can do.

According to the information on the packaging, any mobile phone can be used as a fax or remote access to the Internet (via GPRS or GSM), as well as an Object Exchange service. I don't know if any PC program supports the latter, other than Microsoft Outlook, but the latter allows you to at least exchange contacts in the format of business cards with your phone (in general, cards can be sent simply using standard software), as well as synchronize events in the organizer built into the phone and in Outlook. Not all phones support file transfer, and only some of them provide full data synchronization (you can also transfer the phone book using business cards one entry at a time, but you don’t want to do this at all). According to the manufacturer, the devices have been tested with Nokia phones 7650 and 3650, as well as Ericsson T68 and T39, and full support for all the possibilities of Bluetooth connection was found only in the latter. Actually, this is one of the main reasons for the low popularity of Bluetooth low compatibility. Manufacturers are trying to solve this problem, but the final solution, except for slightly tweaking the standard (which is being done now), is not yet visible, and changing the standard will only help new devices, but not already released and sold (does Bluetooth have time for this? In my opinion, it has already expired).

My phone (Philips Fisio 820) was not on the list of those tested, all the more it was interesting to check it “for lice”. A long dance with a tambourine did not give any results - the native software from the phone, when connected via Bluetooth, could not find it. Thus, I was left with only those opportunities that were provided by the program attached to the dongles, i.e. without synchronization and without the ability to change the melody or logo on the screen. I have no complaints about the operation of the phone in the GPRS modem or fax mode, but, by and large, I didn’t need them: to use both of them on a stationary computer, it’s easier to buy a regular fax modem (I have Internet access generally through the regional local network, so GPRS is needed as a stoplight hare :)). On the other hand, in the absence of a landline telephone, this may be quite in demand. Well, the user of a portable or pocket computer needs these features all the more.

By the way, about computers. The software is primarily aimed at connecting two PCs or a PC to a PDA. In this case, everything works and works well. However, this was already known a year and a half ago :) There is only one subtlety everything is fine as long as there are only two computers. The fact is that initially Bluetooth was not aimed at creating a network, then it was necessary to hastily introduce these features and this was not done in the best way (as described in the mentioned article). So if you want to fully connect several computers using Bluetooth, you will have to fork out for a special “access point” (Access Point). If just sharing files is enough, then it will work on any number of computers without additional investment.

What else can be used? Appeared and peripherals with Bluetooth interface. The printer has already been considered earlier, the CFC has not yet been obtained with this interface, but along with the dongles, a modem manufactured by the same company also came. You will be able to read a report on its testing in the near future. Here I will only say that there were no peculiarities in connection with the connection interface even additional drivers were not required, since remote access support is available in the software for the Bluetooth adapter. And so the modem is like a modem.

Total

The prospects for the technology are not very bright, but if a wireless interface is needed now, then Bluetooth would be a good option. The low speed will not interfere with the use of a printer or a modem, but it's a pleasure to synchronize the PDA with a desktop computer via Bluetooth. I think that the most justified purchase of a Class 2 adapter is unlikely to be your portable devices will be from desktop computer or laptop at a distance of more than 10 meters. The Class 1 dongle will be good if necessary, for example, to contact a housemate. Naturally, it is easier to stretch a cable into a neighboring apartment, but if there are 20 meters between apartments, and even obliquely, it is inconvenient to pull a network cable (again, there are thunderstorms in our area). If you also chip in at the Access Point, then without any wires it will be possible to connect several computers. For transferring video to each other, such a connection, of course, is not suitable (the speed of work in symmetrical mode just over 400 Kbps, i.e. slightly faster than a floppy disk, but it is quite possible to play games or share Internet access via an ADSL modem or a dedicated channel. Unfortunately, the introduction of Bluetooth is largely hampered by poor compatibility with those devices that were the main hopes for when it was created cell phones. However, if all that is needed from the phone is its use as a GPRS modem or fax (which is extremely important for laptop users, however, in the case of desktop computers is not best solution), Bluetooth will cope with the task 100%. If you are looking for a way to conveniently synchronize notebook and a phone organizer (for backup anything can happen), then in this case you may well expect disappointment. Here the cable is still out of competition with its help everything works and always. However, users of some phone models will be able to take full advantage of Bluetooth.

In general, it is not known how long the standard will last tomorrow. But today, albeit with some limitations, it works, and for some applications it simply does not have comparable competitors (a simple example: a laptop lying in a bag or diplomat can wake up from time to time and use a mobile phone in your pocket to check mail no cable, nor infrared will allow you to do this in a convenient way). Well, tomorrow ... tomorrow will be a new day :)

If you take a bigger tambourine ...

About two weeks have passed since the writing of the article, and I still managed to get the synchronization with the phone to work. True, for this I had to rearrange everything that was possible several times. The path leading to success was not so difficult:

  1. Install the software for the dongle and connect it to the computer.
  2. We search for Bluetooth devices. We find the phone (if we don’t find it, then this is a separate problem).
  3. Select a phone from the list of devices. Select its COM port and connect the latter to the computer.
  4. In this position, we launch the Philips software installer. In the list of modems we see " unknown device". We choose him

Subsequently, there are no more difficulties: we launch the software and it connects to the phone automatically. In general, everything (or almost everything) can be made to work in the end. Another question is that you don’t really want to spend precious time fighting developers’ imperfections.

(Software) and data from copying, illegal use and unauthorized distribution.

Modern electronic keys

The principle of operation of electronic keys. The key is attached to a specific computer interface. Further, the protected program sends information to it through a special driver, which is processed in accordance with the specified algorithm and returned back. If the answer of the key is correct, then the program continues its work. Otherwise, it can perform developer-defined actions, such as switching to demo mode, blocking access to certain functions.

There are special keys capable of licensing (limiting the number of copies of the program running on the network) a protected application over the network. In this case, one key is enough for the entire local network. The key is installed on any workstation or network server. Protected applications access the dongle over the local network. The advantage is that in order to work with the application within the local network, they do not need to carry a dongle with them.

Story

Protecting software from unlicensed use increases the developer's profit. To date, there are several approaches to solving this problem. The vast majority of software developers use various software modules, which control user access using activation keys, serial numbers etc. Such protection is a cheap solution and cannot claim to be reliable. The Internet is replete with programs that allow you to illegally generate an activation key (key generators) or block a request for a serial number / activation key (patches, cracks). In addition, do not neglect the fact that the legal user himself can make public his serial number.

These obvious shortcomings led to the creation of hardware software protection in the form of an electronic key. It is known that the first electronic keys (that is, hardware devices for protecting software from illegal copying) appeared in the early 1980s, however, for obvious reasons, it is very difficult to establish primacy in the idea and direct creation of the device.

Software protection with an electronic key

Software Development Kit

Dongles are classified as hardware-based software protection methods, but modern dongles are often defined as multiplatform hardware-software tool systems for software protection. The fact is that in addition to the key itself, companies that issue electronic keys provide an SDK (Software Developer Kit - a software development kit). The SDK includes everything you need to start using the presented technology in your own software products- development tools, complete technical documentation, support for various operating systems, detailed examples, code snippets, automatic protection tools. The SDK may also include demo keys for building test projects.

Protection technology

Protection with automatic means

For most families of hardware dongles, automatic tools (included in the SDK) have been developed that allow you to protect the program "with a few mouse clicks". In this case, the application file is "wrapped" in the developer's own code. The functionality implemented by this code varies depending on the manufacturer, but most often the code checks for the presence of a key, controls the license policy (set by the software vendor), implements a mechanism to protect the executable file from debugging and decompilation (for example, compressing the executable file), etc.

The important thing is that you do not need access to the application's source code to use the automatic protection tool. For example, when localizing foreign products (when there is no possibility of interfering with the source code of the software), such a protection mechanism is indispensable, but it does not allow use the full potential of electronic keys and implement flexible and individual protection.

Implementing Security with API Functions

In addition to using automatic protection, the software developer is given the opportunity to independently develop protection by integrating the protection system into the application at the source code level. To do this, the SDK includes libraries for various programming languages ​​that contain a description of the API functionality for this key. The API is a set of functions designed to exchange data between the application, the system driver (and the server in the case of network dongles), and the dongle itself. API functions provide various operations with the key: searching, reading and writing memory, encrypting and decrypting data using hardware algorithms, licensing network software, etc.

skillful application this method provides a high level of application security. It is rather difficult to neutralize the protection built into the application due to its uniqueness and “fuzziness” in the body of the program. In itself, the need to study and modify the executable code of a protected application in order to bypass protection is a serious obstacle to breaking it. Therefore, the task of the security developer, first of all, is to protect against possible automated hacking methods by implementing their own protection using the API for working with keys.

Security bypass

There was no information about the full emulation of modern Guardant dongles. Existing table emulators are only implemented for specific applications. The possibility of their creation was due to non-use (or illiterate use) of the main functionality of electronic keys by protection developers.

There is also no information about full or at least partial emulation of LOCK keys, or about any other ways to bypass this protection.

Hacking a software module

An attacker examines the logic of the program itself in order to, after analyzing the entire application code, isolate the protection block and deactivate it. Breaking programs is done by debugging (or stepping), decompiling, and dumping main memory. These methods of analyzing the executable code of a program are most often used by attackers in combination.

Debugging is done using special program- a debugger that allows you to step by step execute any application, emulating the operating environment for it. An important function of the debugger is the ability to set stopping points (or conditions) code execution. Using them, it is easier for an attacker to track the places in the code where accesses to the key are implemented (for example, execution stops on a message like "Key is missing! Check for the presence of the key in the USB interface").

Disassembly- a way to convert the code of executable modules into a human-readable programming language - Assembler. In this case, the attacker gets a printout (listing) of what the application is doing.

Decompilation- converting the application's executable module into programming code in a high-level language and get a representation of the application close to source code. It can only be done for some programming languages ​​(in particular, for .NET applications created in C# and distributed in bytecode, a relatively high-level interpreted language).

The essence of the attack memory dump is to read the content random access memory at the moment when the application started to execute normally. As a result, the attacker receives the working code (or the part of interest to him) in "pure form" (if, for example, the application code was encrypted and is only partially decrypted during the execution of one or another section). The main thing for an attacker is to choose the right moment.

Note that there are many ways to counteract debugging, and security developers use them: non-linear code, (multithreading), non-deterministic execution sequence, code “cluttering”, ( useless features, performing complex operations in order to confuse the attacker), using the imperfections of the debuggers themselves, etc.

A workshop for servicing smartphones and tablets, like any other workshop, is hard to imagine without soldering or measuring equipment. But the main place here is always occupied by tools for software repair: unlocking, restoring and flashing. It is they who help the master to unlock, flash or revive a non-working device.

Let's get to know them better.

BOXING

What is boxing?

How to choose?

Dongles can also be divided into more versatile ones that support maximum amount models of popular manufacturers and the most popular operations, and dongles designed for specific devices and operations.

Universal Solutions:

Specialized Solutions:

Reset FRP

Samsung and LG

SMART CARD

What is a smart card?

The smart card is used to authenticate your purchase and identify your device on the developer's server. In fact, it looks like a regular SIM card for mobile phones. A smart card is designed to store information about the firmware version, the firmware itself, and other special information.


Smart card chip structure

Important! The smart card has limited quantity information recording cycles. Usually the software warns the user that an update is required. That's why do not update the smart card unless necessary. It may simply get blocked, and as a result you will no longer be able to use this smart card or even the box (it all depends on the box developer). If you are unable to update your smart card when required, your best bet is to contact Technical Support.

What to choose: box or dongle?

Boxing is for you if:

  • connection via COM port is required;
  • phone recovery is only possible using JTAG or eMMC interface.

Dongle is suitable if:

  • you are going to work with the phone in working condition;
  • you need to unlock, flash, repair IMEI, remove FRP;
  • The PC recognizes the phone;
  • you are not going to work with the hardware of the device.

As you continue this article, you will learn about possible mistakes and problems that arise when working with dongles and boxes, and how to find and eliminate their cause.

Of course, in Russia no one uses the word "dongle", we use the more familiar "adapter". But this absurd situation, when the word is there, but it is not used, must stop. Especially since we live in a world where dongles have become a pervasive aspect of our existence.

New iPhone users who can't forgo the headphone jack are ordinary users dongles. Many people use streaming devices that transmit images to a TV - Microsoft Wireless Display Adapter or its equivalent. Even Google is now making dongles so you can connect your headphones to the Pixel 2.

Yes, Google, which just recently announced a huge commitment to the development of devices that use sophisticated AI technologies, also applies to the dongle business. They also made a Chromecast.

Since we ourselves have unknowingly fallen into a society filled with dongles, this is the right moment to think about the origin of such a stupid word. In simple terms, a dongle adds functionality to another device.

However, the word "dongle" is not new. It first appears in print in the New Scientist, as early as 1981:

"A dongle is an extra piece of memory that is connected to the computer, and without which the program refuses to work." Such a device was connected to a Commodore Pet computer. Later, the word gained popularity and at some point it could well seem new - a fairly common occurrence.

"What you find new is very likely not really new," Stanford University linguist and lexicographer Sarah Ogilvie tells Mashable. "Many new words have much older origins than you might think."

But what happened about 40 years ago to give rise to such a curious word?

"As for its actual origin, I think it's just a playful variation of the word 'dangle'," says lexicographer Ben Zimmer. This explanation seems plausible, as dongles do dangle frequently. It is also possible that the word "dongle" comes from "dong" (bell tongue), which also dangles naturally.

Do you know the problem when in the store you say that you need “printer ink”, but you are told that “there is no ink, there is only ink”? To avoid such cases, there is a wonderful word dongle, which we should spread as much as possible for our own convenience. When we want a device that expands the functionality of something, the seller or friend will always understand us perfectly.

In this article, we will consider the problem of obtaining remote access to a USB dongle, in particular, to a 1C dongle using , and also consider the technology of electronic dongles.

What is a USB key?

An electronic key, or dongle, is a reliable means of protecting software. Its use prevents illegal copying, use and distribution. Software manufacturers thus protect their copyrights and guarantee the authenticity of the goods to buyers.

The technology is based on a special microcontroller with its own unique algorithm of operation. Electronic keys are equipped with a small amount of non-volatile memory, some may even have a built-in crypto processor.

The main mystery of the action of USB keys is the principle of their work. First of all, an interface is required for its operation. specific program. Only interaction with desired version allows you to use the dongle. Accordingly, the program itself is launched for full-fledged work only after receiving the correct response from the electronic key.


Types of electronic keys and their distribution

The most complex and expensive types of USB dongles come with a built-in licensing feature that allows them to be used on all computers on the local network. You do not need to buy a separate dongle for each machine. But this option is only suitable for those who plan to use the key within the same room.

But there are software keys that strictly prohibit sharing. You need to use them with one computer and do not transfer access. Otherwise, the response algorithm with the application does not work.

There is also a common scenario where local computer do not support operating system, which the application will need to work with. In this case, a virtual OS (VMware, Hyper-V, VirtualBox, etc.) is installed on the computer and the application is already launched in it. But the essence of the problem is not even so much in this, but in the fact that not a single virtual environment gives access rights to physical serial or USB ports your computer. What to do in this case?

For example, you work on Mac OS and you need to generate reports in the program 1c accounting, which only supports Windows and needs electronic key for start. You install any virtual Windows OS and run the 1C program after installing the dongle in the USB port of your Mac. As a result, the software does not start, the key is not recognized. How to provide remote access to 1C key?