A method and apparatus for enabling hardware platform identification while ensuring
privacy protection. The apparatus comprises a computer-readable medium that stores
computer-executable instructions. Those instructions, when executed by a microprocessor,
cause an expected hash value, which is derived from a key and a first identifier
for a computer system; to be compared with a hash value, which is derived from
the key and a second identifier for a computer system. A microprocessor for executing
those instructions may comprise an identifier that identifies the microprocessor,
and embedded instructions for comparing a hash value, derived from the identifier
and a key, to an expected hash value.