Licensing & security

Know exactly which machine you are talking to.

FingerPrintThis turns low-level hardware signals into a stable, privacy-aware device identity you can rely on across Windows, Linux and Android. Perfect for licensing, fleet management and high-value software.

Hardware-anchored: TPM, Secure Enclave / KeyStore, OEM identifiers.
Privacy-aware: raw serials never leave the device in clear text.
License-ready: designed for online and offline token models.

Use it to bind your licenses to real machines, reduce abuse, and keep a smooth experience for honest customers.

Supported platforms

One service, three native collectors. Each platform uses the right hardware anchors, but exposes a shared canonical identity over the wire.

Production

Windows

Ideal for desktops, workstations and enterprise fleets.

  • Motherboard / chassis / BIOS IDs (hashed + HMACed).
  • TPM 2.0 presence, vendor, and EK fingerprints.
  • Secure Boot, UEFI, virtualization & VBS posture.
Lab

Linux

Servers, workstations and managed endpoints.

  • DMI system / board / chassis identifiers (hashed + HMACed).
  • TPM 2.0, Secure Boot, UEFI detection.
  • Kernel & distro posture fields for extra context.
Mobile

Android

Phones and tablets with hardware-backed attestation.

  • Android Keystore with StrongBox / TEE attestation.
  • Verified Boot state, lock status, device identifiers.
  • OEM tuple (brand, model, hardware) as secondary anchor.

Where FingerPrintThis fits

We do one thing, but we do it well: a stable, hardware-anchored device identity. You decide how it plugs into licensing, compliance or analytics.

License binding

Tie each license to a physical machine instead of a bare user ID.

  • Allow controlled hardware changes without punishing honest customers.
  • Flag suspicious cloning and abnormal reinstallations.
  • Support for online & offline tokens (time-bound).

Fleet & workstation management

See which exact devices are active, across all platforms.

  • Correlate endpoints with TPM-anchored identities.
  • Distinguish “new device” from “fresh install”.
  • Check device posture before granting access.

Security & fraud reduction

Add a hardware signal into your existing risk model.

  • Spot risky environments (no TPM, no Secure Boot).
  • Detect abnormal reinstall patterns across accounts.
  • Combine with auth and billing signals for more nuanced decisions.