Skip to content
PricingDocs

Device Intelligence Glossary

Key terms and concepts behind browser fingerprinting, bot detection, and device identification — explained clearly.

Showing 21 of 21 terms

Browser Fingerprinting

The discipline of harvesting and combining browser attributes — installed fonts, canvas render output, WebGL parameters, navigator properties, and more — into a unique device identifier that works without cookies or local storage.

Learn more →

Bot Detection

Identifying automated scripts, headless browsers, and non-human traffic by analyzing behavioral patterns, browser API inconsistencies, and environment signals that distinguish bots from legitimate users.

Learn more →

Canvas Fingerprinting

A method that renders text and geometric shapes onto an HTML5 canvas, then reads back the pixel buffer. GPU pipeline, driver, font rasterizer, and anti-aliasing differences produce device-specific output.

Learn more →

Confidence Score

A numerical value (0 to 1) representing how certain the identification system is that a current visitor matches a previously seen identity. Higher scores indicate stronger signal correlation across sessions.

Learn more →

Cookie Persistence

The ability of cookies to survive across browser sessions. Device fingerprinting provides identification even when cookies are cleared, blocked, or used in incognito mode.

Learn more →

Device Intelligence

The practice of collecting, analyzing, and enriching device signals to identify visitors, detect fraud, assess risk, and personalize experiences — without relying solely on PII or cookies.

Learn more →

Signal Uniqueness

A measure of the distinctiveness or information content of a signal. Highly unique signals (like canvas or WebGL hashes) contribute more to fingerprint accuracy, while common signals (like platform or language) contribute less.

Learn more →

advanced matching

An identification technique that tolerates small, expected changes in signal values (such as browser version updates) while still recognizing the same device. Unlike exact matching, advanced matching reduces false negatives caused by routine drift.

Learn more →

Headless Browser

A browser that runs without a visible window, commonly deployed for web scraping, automated testing, and bot-driven attacks. tracio.ai's Bot Detection module catches headless instances through absent browser APIs, rendering anomalies, and automation framework artifacts.

Learn more →

IP Intelligence

Server-side enrichment of visitor IP addresses to detect VPNs, proxies, Tor exit nodes, data center hosting, and residential proxy services. Provides geographic context and network risk assessment.

Learn more →

JA4 Fingerprint

A TLS client fingerprint derived from the TLS ClientHello message, including cipher suites, extensions, and supported versions. JA4 identifies the TLS library and client type independently of IP address or user agent.

Learn more →

Signal Hashing

A fast, one-way hash function that tracio.ai uses to convert raw signal values into fixed-length hashes for efficient comparison and storage. Selected for its speed, low collision rate, and uniform distribution.

Learn more →

Proxy Detection

Identifying visitors who route their traffic through proxy servers, VPNs, or anonymizing networks to hide their true IP address and location. Detection uses IP reputation databases, timing analysis, and header inspection.

Learn more →

Smart Signals

Server-computed enrichment signals derived from raw device data, IP context, and behavioral patterns. tracio.ai's Smart Signals module provides bot confidence, VPN detection, incognito-mode detection, and suspect scoring across 24 signal types.

Learn more →

Suspect Score

A composite risk score (0 to 100) aggregating bot signals, IP reputation, environment anomalies, and behavioral indicators. Higher scores indicate greater likelihood of fraudulent or automated activity.

Learn more →

identification algorithm

tracio.ai's approach to visitor ID generation that separates signals into tiers by stability: hardware signals (GPU, screen), software signals (fonts, plugins), and session signals (user agent, timezone). Each tier is hashed independently and combined with weighted confidence.

Learn more →

Tor Detection

Identifying visitors connecting through the Tor anonymity network by checking IP addresses against known Tor exit node lists, analyzing network characteristics, and detecting browser configuration patterns typical of the Tor Browser.

Learn more →

Visitor ID

A stable, unique token derived from a device's fingerprint signals. The visitor ID persists across sessions, incognito windows, and cookie clearing — enabling recognition without traditional cookie-based tracking.

Learn more →

VPN Detection

Detecting visitors who use Virtual Private Networks to mask their real IP address. VPN detection combines IP reputation databases, timezone mismatches, WebRTC leak analysis, and DNS resolution patterns.

Learn more →

WebGL Fingerprinting

Pulling GPU and driver metadata through the WebGL API — renderer string, vendor, supported extensions, and shader precision. WebGL parameters are exceptionally stable and offer strong cross-browser device discrimination.

Learn more →

Transport Encryption

A multi-layer encryption system used in client-server transport to protect signal data in transit. Provides fast per-byte transformation before the data reaches the server, combined with TLS for full transport security.

Learn more →

Ready to get started?

Try tracio.ai free with 2,500 API calls per month. No credit card required.