Systems and methods for binding a secret to a computer system are
disclosed. Systems and methods for generating a strong hardware
identification (SHWID) for a given computer system are also disclosed.
The strong hardware identification (SHWID) is coupled to a bound secret.
The strong hardware identification (SHWID) may be used to control the use
of software on the given computer system depending on the degree of
hardware changes to the computer system.