Dongles (known as licence dongles or USB keys) are electronic / hardware-based protection locks initially introduced by ISVs to protect and prevent unauthorised usage or unwanted distribution of their high-value desktop software applications. The connection was initially done through parallel ports but now it’s more commonly done through USB ports. The license dongle contains the license details for a particular version of an application.
The dongle’s firmware is integrated with the software of the application and contains information used to authorise access – what and how the end-user can use the software. Whether it’s time, location, or limiting the packages/features available, the end user’s access is controlled by the dongle. The user can get access to the software application only if the license dongle is physically present on the computer.
The dongle was once the solution of choice for software licensing, but no longer.
Traditionally used for desktop applications, license dongles can be used for web applications as well. For example, a user can plug the USB security key into their device, visit the application’s web page, log in with their username and password, then the software validates the license dongle before loading or unlocking features of the application.
It’s not unusual to still encounter ISVs in specialised domains like GIS, Image Processing or Medical that still use dongles but this is increasingly rare.
License dongles have had a long and potted history as ISVs started to struggle when their usage became widespread. A few of the factors contributing to their increasing unpopularity are:
If you are still using license dongles and some of the issues listed above are familiar to you, why not consider moving to a Licensing as a Service (LaaS) provider such as 10Duke? The 10Duke licensing solution, in particular, our pioneering identity-based licensing approach offers significant advantages over using dongles for licensing. Identity-based licensing is a method of controlling access to digital products based on the authenticated identity of an individual, while also retaining flexibility in terms of licensing a product to him/her based on a number of constraints such as company, device, location and application type.