Locklizard

Last updated

LockLizard Limited
Company type Private
IndustryTechnology services
Founded2004;20 years ago (2004)
FounderTrevor Mathews
Headquarters London, United Kingdom
Key people
Greg Mathews
(Chairman & CEO)
ProductsDocument security software
Website www.locklizard.com

LockLizard Limited is a British software company that specializes in digital rights management security for PDF documents, USB flash drives and eBooks. [1] It was founded in 2004 by Trevor Mathews to provide Document Digital Rights Management (DRM) software that uses encoding and encryption to protect against unauthorized copying, sharing, unlimited printing or printing on virtual devices, and screen grabbing on PCs or mobile devices. [2] [3] Locklizard's most notable customers include NASA, Microsoft, HP, SAP, Yamaha, BBC, Symantec, AMD, and McGraw-Hill Education. [4]

Contents

Technology

Locklizard implements a range of technologies accessible on PC or on the Cloud in order to achieve the features and functions necessary to protect a document. [5] [6] These technologies are DRM controls, document watermarking, US Government encryption, license control, and a proprietary secure PDF viewer. [7] [8] Additional DRM protection includes documents locking to specific devices or locations. Locklizard does not make use of password mechanisms, digital signatures, plug-ins, and temporary files. It delivers license codes and keys through secure online registration procedures with user-friendly PKI class technology. [9]

See also

Related Research Articles

<span class="mw-page-title-main">Communications security</span> Discipline of telecommunications

Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients.

Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning that is distinct from the field of confidential computing. With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by computer hardware and software. Enforcing this behavior is achieved by loading the hardware with a unique encryption key that is inaccessible to the rest of the system and the owner.

<span class="mw-page-title-main">Next-Generation Secure Computing Base</span> Software architecture by Microsoft

The Next-Generation Secure Computing Base is a software architecture designed by Microsoft which claimed to provide users of the Windows operating system with better privacy, security, and system integrity. NGSCB was the result of years of research and development within Microsoft to create a secure computing solution that equaled the security of closed platforms such as set-top boxes while simultaneously preserving the backward compatibility, flexibility, and openness of the Windows operating system. Microsoft's primary stated objective with NGSCB was to "protect software from software."

<span class="mw-page-title-main">Secure cryptoprocessor</span> Device used for encryption

A secure cryptoprocessor is a dedicated computer-on-a-chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. Unlike cryptographic processors that output decrypted data onto a bus in a secure environment, a secure cryptoprocessor does not output decrypted data or decrypted program instructions in an environment where security cannot always be maintained.

FairPlay is a family of digital rights management (DRM) technologies developed by Apple Inc. for protecting videos, books and apps and historically for music.

<span class="mw-page-title-main">Software protection dongle</span> Electronic software copy protection device

A software protection dongle is an electronic copy protection and content protection device. When connected to a computer or other electronics, they unlock software functionality or decode content. The hardware key is programmed with a product key or other cryptographic protection mechanism and functions via an electrical connector to an external bus of the computer or appliance.

Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.

Windows Media DRM or WMDRM, is a Digital Rights Management service for the Windows Media platform. It is designed to provide delivery of audio or video content over an IP network to a PC or other playback device in such a way that the distributor can control how that content is used.

Active Directory Rights Management Services is a server software for information rights management shipped with Windows Server. It uses encryption and a form of selective functionality denial for limiting access to documents such as corporate e-mails, Microsoft Word documents, and web pages, and the operations authorized users can perform on them. Companies can use this technology to encrypt information stored in such document formats, and through policies embedded in the documents, prevent the protected content from being decrypted except by specified people or groups, in certain environments, under certain conditions, and for certain periods of time. Specific operations like printing, copying, editing, forwarding, and deleting can be allowed or disallowed by content authors for individual pieces of content, and RMS administrators can deploy RMS templates that group these rights together into predefined rights that can be applied en masse.

<span class="mw-page-title-main">Downloadable Conditional Access System</span>

Downloadable Conditional Access System or DCAS was a proposal advanced by CableLabs for secure software download of a specific Conditional Access client which controls digital rights management (DRM) into an OCAP-compliant host consumer media device. The National Cable & Telecommunications Association (NCTA) proposed that DCAS be used as a substitute for physical CableCARDs, a standard also created by CableLabs for which products began appearing in August 2004 as part of industry compliance to the FCC mandate, which in turn is pursuant to the Telecommunications Act of 1996. DCAS is growing in popularity as a less expensive alternative for CableCARD, with major North American operator deployments from Cablevision and Charter. DCAS deployments can be expected to grow in the coming years, thanks to favorable regulatory view from the STELA Reauthorization Act of 2014 and FCC appointing a Downloadable Security Technical Advisory Committee, and wider support for key ladder (K-LAD) functionality from system-on-chip (SoC) vendors and set-top box manufacturers.

The Protected Media Path is a set of technologies creating a "Protected Environment," first included in Microsoft's Windows Vista operating system, that is used to enforce digital rights management protections on content. Its subsets are Protected Video Path (PVP) and Protected User Mode Audio (PUMA). Any application that uses Protected Media Path in Windows uses Media Foundation.

<span class="mw-page-title-main">Adobe Digital Editions</span>

Adobe Digital Editions is an e-book reader software program from Adobe. It is used for acquiring, managing, and reading e-books, digital newspapers, and other digital publications. The software supports EPUB and PDF. It implements a proprietary scheme of digital rights management (DRM) which, since the version 1.5 release in May 2008, allows document sharing among multiple devices and user authentication via an Adobe ID. Digital Editions is a successor to the Acrobat eBook Reader application.

Information rights management (IRM) is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as E-DRM or Enterprise Digital Rights Management. This can cause confusion, because digital rights management (DRM) technologies are typically associated with business-to-consumer systems designed to protect rich media such as music and video. IRM is a technology which allows for information to be ‘remote controlled’.

PlayReady is a media file copy prevention technology from Microsoft that includes encryption, output prevention and digital rights management (DRM). It was announced in February 2007.

The analog hole is a perceived fundamental and inevitable vulnerability in copy protection schemes for noninteractive works in digital formats which can be exploited to duplicate copy-protected works using analog means. Once digital information is converted to a human-perceptible (analog) form, it is a relatively simple matter to digitally recapture that analog reproduction in an unrestricted form, thereby fundamentally circumventing any and all restrictions placed on copyrighted digitally distributed work. Media publishers who use digital rights management (DRM), to restrict how a work can be used, perceive the necessity to make it visible or audible as a "hole" in the control that DRM otherwise affords them.

<span class="mw-page-title-main">Digital rights management</span> Technology to control access to copyrighted works and prevent unauthorized copying

Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures (TPM), such as access control technologies, can restrict the use of proprietary hardware and copyrighted works. DRM technologies govern the use, modification and distribution of copyrighted works and of systems that enforce these policies within devices. DRM technologies include licensing agreements and encryption.

Anti-tamper software is software which makes it harder for an attacker to modify it. The measures involved can be passive such as obfuscation to make reverse engineering difficult or active tamper-detection techniques which aim to make a program malfunction or not operate at all if modified. It is essentially tamper resistance implemented in the software domain. It shares certain aspects but also differs from related technologies like copy protection and trusted hardware, though it is often used in combination with them. Anti-tampering technology typically makes the software somewhat larger and also has a performance impact. There are no provably secure software anti-tampering methods; thus, the field is an arms race between attackers and software anti-tampering technologies.

<span class="mw-page-title-main">Arxan Technologies</span> US technology security company

Digital Ai is an American technology company specializing in anti-tamper and digital rights management (DRM) for Internet of Things (IoT), mobile, and other applications. Arxan's security products are used to prevent tampering or reverse engineering of software, thus preventing access or modifications to said software that are deemed undesirable by its developer. The company reports that applications secured by it are running on over 500 million devices. Its products are used across a range of industries, including mobile payments & banking, automotive, healthcare and gaming.

Lektz is an eBook business platform developed by AEL Data, operating in the UK and India. The platform has DRM, ebook reader applications, virtual book store, ebook conversion, elending, consumer analytics, and digital marketing solutions for small, medium-sized publishers and independent authors. M.S. Mohammed Sadiq, Sr. Vice President of AEL Data, is the chief architect of the Lektz platform. It draws support from AEL Data's ePublishing, digitization, accessibility solutions, and application development services.

Widevine is a proprietary digital rights management (DRM) system developed by Google. It provides content protection for media. Widevine is divided into three security levels with differing levels of protection depending on the hardware present on the device. Widevine is included in most major web browsers and in Android and iOS.

References

  1. Elisabeth Horwitt (26 April 2010). "Enterprise Rights Management and Keeping Data in-House". CIO.
  2. "LockLizard extends PDF rights management security to the iOS platform". Infosecurity magazine. 2 April 2013.
  3. Yogita Rao (16 May 2014). "Only one computer in a college to get licence to download question papers". The Times of India .
  4. "DRM customers". Locklizard.
  5. Mei Xue (31 October 2012). "Document Selective Protection Based on Third Service Framework". In Jingsheng Lei; Fu Lee Wang; Mo Li; Yuan Luo (eds.). Network Computing and Information Security. Second International Conference, NCIS 2012. Vol. 345 (2012 ed.). Springer-Verlag Berlin Heidelberg. pp. 79–88. ISBN   978-3-642-35210-2.
  6. "Lizard Safeguard Secure PDF Viewer - Product Manual for Windows" (PDF). Locklizard.
  7. "Our DRM Technology". Locklizard.
  8. "LockLizard Safeguard PDF Security - PDC secure viewer specs". PC World.
  9. "LockLizard solves zero footprint PDF security problem". Infosecurity magazine. 13 December 2012.