Machine locking Restrictions
Previous Top Next



clip0206


The Machine ID restriction allows you to lock a license key to a particular computer. The advantages of using Machine ID restrictions:

· If a user leaks their key to the Internet, other users will not be able to use it
· Prevent companies from purchasing 1 license and installing on 20 computers

Disadvantages of using Machine ID restrictions:
· Users cannot migrate their software licenses to new computers as older ones are replaced. (Note: it is possible for a user to remove their Ethernet card from the older computer and place it in a new computer - allowing the license to be moved).
· Complicates the ordering process because you must obtain the user's Machine ID before the order a key can be generated.

Thinstall uses the Machine's Ethernet MAC address to create a computer's unique Machine ID. If the machine does not have an ethernet card, the Drive C volume serial number is used. If the machine has multiple Ethernet cards, Thinstall uses the card with the lowest adaptor number.


To apply this restriction, you must first obtain the user's Machine ID to supply to the key generator. The Machine ID is displayed to the user on the key entry dialog box:
clip0207

Note: Machine IDs are dependant on the password you have supplied on the License Setting's Dialog. If you change your password and build a new EXE, the user will be presented with a completely different machine ID. If the user provides you with a Machine ID for a software package created with another password, or they enter the Machine ID string incorrectly - Thinstall will display an error message to you during key generation.

Setting a Machine ID restriction

Using the Thinstall GUI, you can set a Machine ID restriction for the default license key as well as for generated license keys.

GUI Version:
Menu -> Link -> License System / Trial Demo -> License System Version 2 (Default Key / Generate Key)

clip0208

Command-line Key Generator

th_keygen2 my_password -mac_id fnyfcy7a27heatx5


Security Concerns with Machine IDs

Clock Set-backs: Because this restriction does not use the clock, changing the system clock is not a concern.

Disk Re-imaging: A machine ID will continue to be the same after a disk has been re-imaged, so this technique can be used to by pass this restriction.