Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

How Document DRM systems work

in Blog, Document Security, DRM, PDF Security

Overview of document DRM & PDF security systems

There are many document DRM solutions available in the marketplace, and they all use different technologies to control document access and use.  Here we cover the main types of systems and how they work.

Firstly, why use Document DRM?

Using document DRM can bring many benefits such as:

  • Revenue protection
  • IPR theft prevention and protection of confidential information
  • Enforcement of compliance with regulation
  • Secure sharing
  • Cost and time savings

See how you can benefit: Document DRM Benefits

What should I be looking for in a Document DRM solution?

Not all document DRM systems are equal.  Many use technologies that are just not secure.

  • 10 Features to look out for in PDF DRM software

Below we cover each type of system in more depth.

Web based Document DRM systems

Many document DRM systems have gone down the route of users logging into a web page to view ‘protected’ documents in a browser.  This is how ‘secure’ data room solutions work so users do not have to install an application or a plug-in to Adobe Acrobat to view protected documents.

There are many issues with this approach:

  1. You have to upload your unprotected documents to a third-party server in the cloud. You are told they are then encrypted (it would be hard to prove this unless you had access to the server) and one assumes your unprotected documents are then deleted.  So there is a chance that unprotected documents can be compromised if anything goes wrong during that process.  Many of these companies make a big thing about how secure their data (server) systems are (protected by firewalls etc.) but that is just diverting people from the real issue of how good their document protection is (or not).
  2. To view a ‘protected’ document a user has to login with an ID and password. There is nothing preventing them from giving this information to others.  This can defeat the whole purpose of preventing document sharing.
  3. Often documents are decrypted on the server (assuming they were encrypted to begin with) and delivered to the client in plain text.  Browser systems create temporary files so it may not be difficult in this situation to extract the plain text file without any controls on it.
  4. To apply document usage controls (DRM) you have to use JavaScript since there is no software application installed on the client under your control (i.e. a dedicated Viewer).  This provides a rather limited set of controls (for instance you cannot stop third party screen grabbing tools, stop printing to file drivers such as PDF printers etc.) and it is clearly not bullet-proof protection since the JavaScript is executed in the browser and can therefore be manipulated.  For an example of how insecure JavaScript-based browser controls are, see how easy it is to bypass Google Docs protection controls. Alternatively, read how to send secure email in Gmail to see how poorly email-based JavaScript controls work.
Locklizard Secure Web Viewer

Locklizard provide a Web Viewer if publishers want to go down this route (our main document Viewers are installed on a device).  However, our Web Viewer differs in that:

  • Only protected documents (ones that you have encrypted and have DRM controls applied to them) are uploaded to the cloud server.  You cannot upload unprotected document formats.
  • Protected documents are decrypted on the client device in memory – no temporary files are created.
  • You can lock use to specific locations on a per user basis – this can happen automatically when a user logs in for the first time – they can only login from that same location in future.
  • You can stop users using credentials from multiple devices at the same time.  This helps prevent users sharing login credentials since only one person can login (with the same credentials) to the system at a time.

If you are looking for a more secure approach to document sharing then we recommend our installed Secure PDF Viewers.

Adobe and Password protection

This is the most commonly used PDF protection method available.  It is free but pretty useless.

Basically, in the Adobe PDF standard there are two passwords you can apply to encrypt a PDF file:

  • The Document Open password – required to open the PDF
  • The Permissions password – required to set, change, or remove PDF restrictions

The stronger the document open password the longer it will take to crack or remove with PDF password remover tools.  The permissions password however can be broken trivially no matter how strong it is due to inherent weaknesses (or flaws) in the design of the Acrobat Standard Security handler.  See How Secure is PDF? by Bryan Guignard (Adobe Certified Expert).

In fact, when it comes to removing PDF permissions you don’t even need to use a PDF password remover program – there are other simpler methods – Google Drive, using a Mac, or a third party PDF reader that does not ‘honor’ the controls – to trivially remove the permissions password and do what you like with the document.

You therefore must add a Document Open password to the PDF or the permissions password can be simply removed.  However, the dilemma here is that people you are sending protected PDF documents to need to have the Document Open password in order to read them and so can give these to others.  So, the only protection provided is if someone (i.e. an unauthorized user) gets hold of a protected PDF, not knowing what the password is.  But even here PDF password remover companies provide PDF cracking tools that will remove the Document Open Password unless it is very strong.

More information on Adobe Security and other poor security mechanisms can be found here – PDF Security weaknesses.

Plugins to Adobe Acrobat

Rather than have users install a separate PDF Reader application, some PDF DRM companies plug in to Adobe Acrobat.  These, however, rely on Acrobat Security since that is what they plug in to for their protection to work.  So that is not a great start.

In addition:

  • Some plugin manufacturers make users turn off security in Adobe (like certified mode and/or protected mode) in order for their plugins to work.
  • When Adobe Acrobat does an update, the plugin may stop working since it relies on various components that may have been updated and now no longer work in the same way.
  • Anyone can produce a plugin for Acrobat and so one can be produced that either deliberately or by chance bypasses the DRM security plugin.
  • Plugins can clash with one another so users may have to uninstall other plugins in order for the PDF DRM plugin to work, or vice versa.
  • Plugin manufacturers often make a big thing about how they are easier to install than EXE applications.  Yet plugins are EXE files that have to been installed with Admin rights.

Enterprise Rights Management Systems (Microsoft RMS, Adobe LiveCycle ES, etc.)

These systems rely on implementing full-blown PKI systems to operate so are complex and time consuming to set up.

They require system administrators to create complex policies to govern document use and are really focused on internal company use (i.e. not for protecting revenue generating content).

For an analysis on Microsoft RMS security see How secure is Microsoft RMS?

How Locklizard’s Document DRM works

Locklizard has taken a different approach to document security by avoiding known security weaknesses and complex implementation.

How our system works:

  • Overview: How-it-Works
  • Our DRM Technology
  1. We use our own installed secure PDF Viewers (so we have full control over the environment)
  2. We don’t use passwords, plugins, or temporary files (decryption done in memory only)
  3. Key management is handled transparently by the licensing server and Viewer software, so there are no complex keys to generate, distribute, manage, or for users to pass on to others
  4. No uploading of unprotected documents to servers where they could be compromized
Features Summary
  • Stop unauthorized sharing of documents
  • Stop users copying and pasting document content into other applications
  • Stop users editing/modifying document content
  • Stop screen grabber applications taking screenshots
  • Control printing – stop prints, limit prints, or allow unrestricted printing
  • If you enable printing then we prevent printing to file drivers (e.g. PDF printers)
  • Dynamically watermark content with user details – name, email, company, date/time
  • Expire documents after a no. of views, days, prints, or fixed date, on a user or global basis
  • Expire user access to all documents on a fixed date
  • Revoke documents and/or user access anytime
  • Allow offline use, allow flexible use, or always enforce users to be online
  • Lock use to specific authorized devices or USB sticks
  • Prevent use on BYOD or control BYOD use by location
  • Lock user access to documents by country and IP locations (i.e. stop use outside the office)
  • Log document prints and views
Pricing

Most document DRM systems lock you into subscription pricing with the system hosted on their servers in the cloud.

Locklizard lets you choose whether to purchase a subscription or perpetual license (one- time payment) to suit your own requirements.  You can host the system on your own server (under your own control) or on our servers (for a small yearly hosting fee).

See Pricing & Purchase information.

Tags: document drm, document protection, document rights management, document security, drm, drm security, enterprise drm, enterprise rights management, pdf drm, pdf security, protect documents, protecting documents, rights management
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Brexit, GDPR & data protection Link to: Brexit, GDPR & data protection Brexit, GDPR & data protectionLink to: Help – Safeguard Writer – Environment Controls Tab – v3 Link to: Help – Safeguard Writer – Environment Controls Tab – v3 Help – Safeguard Writer – Environment Controls Tab – v3
Scroll to top Scroll to top Scroll to top