Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Document Security Methods

in Blog, Document Security, DRM

Types of document security methods for protecting digital documents.

There are many different types of document security methods to choose from – password protection, public key technology, and tokens to name a few.  So what is best for digital document protection?

Although there are many document security methods to choose from, they all rely on how confident you are that they identify the user adequately enough for your purposes, and that you can then enforce the restrictions you want.  Locklizard PDF DRM provides a range of unobtrusive user authentication systems that do not commit you to design and enforce complex cryptographic architectures or require your users to subscribe to domain management or ‘foreign’ email services such as the Microsoft approach.  Locklizard provide a balanced compromise between security and usability that is highly suited to dealing with users both outside and inside the corporate structure.

Document Security & Cryptography

Although cryptography underpins document security, it is not a ‘magic bullet’.   To achieve your desired document security you need to implement a range of overlapping methods, including:

  • Identification of the user wishing to use a secured document
  • Identification of the location of the user
  • Ability to enforce the controls and restrictions defined for that user
  • Control of the environment that the user is working in

The control requirements have to be balanced against:

  • Making protected documents too difficult to create and use
  • Using personal data (as defined by regulation)
  • Avoiding collecting more personal data than are absolutely necessary

Protecting documents

How do you go about protecting documents, and what sorts of controls are you going to need to provide adequate document protection?

The first choice you have to make is to decide what mechanism(s) you are going use to authenticate users so you identify correctly who has been authorised to use which protected documents.

Password protection

Password access control has been with us since the beginning of computer controls (back in the 1970’s with RACF – see Wikipedia).  It is well established, and its weaknesses are legion.  But it is needed in situations where there is no infrastructure for stronger controls.

Password protection can be used to allow users to access protected documents or to allow them to remove controls.  Locklizard does not allow a recipient to change any content or remove or alter controls in protected documents.

To be effective passwords have to be long and complicated.  That means there are problems managing and distributing them, and they have to be protected when they are being used (strangely, most people’s passwords appear to be a number of asterisks!).

Locklizard use password access control authentication for web based viewing systems because the infrastructure is not favourable for implementing token based controls in a global context.  The Locklizard approach allows publishers to define the strength of passwords being selected and when passwords are reset, and to combine this with location locking to ensure password entry is only valid from authorized locations.

Can you make passwords stronger?

You can strengthen password protection by using additional techniques commonly called 2 or 3 factor authentication.  This comes from

  • A secret you know (the password)
  • A ‘token’ you hold (a credit or bank card or mobile phone)
  • Something personal to you that cannot be readily copied – this turns out to be rather difficult to achieve because many of your features (fingerprint, face, iris) can be copied.

The password is the secret.  And making it ‘strong’ so as to be unguessable, means making it long enough that is not easily subject to a ‘brute force attack’ (an app that will try every possible password value looking for the real password).  These requirements make passwords a pain to use because they cannot be remembered by a human being so they have to be somewhere on a computer so they can be copied and pasted or remembered automatically by a wallet system.

Tokens – what is on offer

PKI

The token was, back in the noughties, the Public Key Infrastructure (PKI) card identity – protected by a password, of course.  As the word Infrastructure implies, it was set up in a most complicated way, requiring recipients to be interviewed by their banks before they could use their PKI cards.  And any organization of any scale either had to purchase cards or manufacture and distribute their own, all in accordance with strict rules and liabilities.

Strangely enough, this was a project that did not fly.  If it had worked it would have allowed protected documents to be unique to each individual recipient regardless of the device(s) they used to process them because the PJI card ‘guaranteed’ their identity.  However, it was too complex and far too expensive to set up and there were arguments about how to administer it.  Something cheaper and easier had to be found.

ATM cards

Bank cards are a potential source of identification.  There are standards for how the cryptographic controls on the cards work, which is why your credit card works in ATM machines anywhere in the world.

But the banks do not disclose the identity of the user.  What they do is validate that the identity is genuine without disclosing the identity itself.  This is good from a data protection approach, but unless you are a financial institution you do not have access to this system, so it can’t be used by other organizations.

Mobile phones

According to studies, “From 1990 to 2011, the number of mobile subscribers on a global scale increased from 12.4 million to more than 3 billion subscribers.”  That number has grown significantly since then with estimates for 2018 of 4.6 billion users and still growing.

And strangely enough, people are unwilling to let their mobile phones out of their control, rather like their credit cards, which makes them reliable devices.

So the current popular ‘token’ is communication with a mobile phone.  Validation of the mobile phone number is done by the service provider (as it is with the landline).  Because the mobile phone is more personal, sending text message random verification codes that can be replayed by the authorized user is good enough for banks and governments, and almost as cheap as passwords.  The other thing about it is that there is no proprietary lock-in possible by the mobile providers so there is no barrier to entry for any organisation.

The Locklizard approach to document protection and authentication

Locklizard uses unique machine identities to identify users and their devices rather than passwords.  Machine identities are locked to user’s identities.  This is effective because machine identities cannot be readily changed and because manufacturers make them unique.  Users do not have the opportunity to change the identity when they register a Locklizard license.  This is essentially the token that does not need a password because it can verify the license to the machine identity.  This is neater than the PKI solution because you do not have to do all the user registration, they do it themselves in their own self-interest.  No passwords are needed and there is no complexity of having to have a mobile phone message as part of the interaction.

Once a user and their device are licensed, keys that are required to decrypt documents are transparently and securely relayed to a keystore (the container that holds the keys to open documents) so users can instantly open any documents they are authorized to view.  The keystore is stored encrypted and only works on a device that it is licensed to.

That is why the Locklizard approach is easy, effective and efficient in delivering document security with Digital Rights Management (DRM) controls.  There are no passwords for the document publisher or the user to enter or manage, and further controls can be applied to stop users taking protected documents home with them by locking document use to authorized locations (say the office only).  Locklizard therefore ensures protected documents can be simply managed but remain tightly under an organization’s control.

Tags: cryptography, digital documents, document drm, document protection, document security, document security methods, password protection, password security, PKI, protecting documents, user authentication
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: PDF Passwords are obsolete Link to: PDF Passwords are obsolete PDF Passwords are obsoleteLink to: Invisible or visible watermarks for copyright protection? Link to: Invisible or visible watermarks for copyright protection? Invisible or visible watermarks for copyright protection?
Scroll to top Scroll to top Scroll to top