Product Features


The H-PDF is a hardened PDF file management and viewing application. It allows working with PDF files and forms, which can be securely filled and digitally signed. Differently from other applications (e.g. Adobe Reader) which provide general purpose interactivity and extensibility by exposing APIs to Java Script, H-PDF keeps all internal resources protected from the operating system and from external applications, thereby shielding against malware attacks and privacy breaches.

H-PDF can support practically any business logic, including encryption and digital signing/verification with any PKCS11 compliant device. Further, H-PDF is complaint with Adobe LiveCycle ES2 allowing the automated back-end processing of PDF files submitted by end users in both electronic and paper formats.

  • Zero-footprint (no prior installation, special drivers or admin privileges required to run on the host PC)
  • Available as a software-only downloadable application or integrated with secure USB tokens, including devices equipped with Smart Card (e.g. Safenet, Crealogix) and biometric sensor (e.g. Imation)
  • Fully integrated with the H-Login module, providing active protections against all major attack vectors exploited by financial malware, including keystroke/mouse logging, screen capture and code injection.
  • Application files and resources are kept inside of encrypted containers, never exposed to attackers and loaded in memory only at run time after full integrity checks.
  • PDF Digital Signing with any PKCS11 compliant device using standard PDF, 2D barcode, detached PKCS#7, PAdES-BASIC and PAdES-BES.
  • PDF Encryption with 40-bit RC4, 128-bit RC4 and 128-bit AES.
  • Supports Acrobat Forms and XFA Forms with JavaScript, as well as paper based forms (barcodes) as QR Code, DataMatrix and PDF417.
  • Complaint with Adobe LiveCycle ES2.
  • User interface localized in English, French, German, Italian. Additional languages available upon request.
  • (Optional) Allows accessing only the PDF files and forms available from the internal Template list.
  • (Optional) User Interface customized based on corporate branding guidelines.
  • (Optional) Integrated with the centralized cloud-based management, allowing to receive Proactive Security Updates from the H-Server and to block access to the H-Browser resources and data.

Browse our list of product briefings,
white papers and research reports.

Register by filling out the information in the form below.
The download link will be sent to your email.

Learn about the latest malware attacks
and view educational videos on how the
H-Apps can help secure your business.

Sing up for a FREE DEMO of the H-Apps
of your choice.

System Requirements

Processor IBM PC or compatible with Intel base processors
Intel Pentium 4 800-MHz or higher
(Intel Core 2 Duo or higher recommended)
Memory 512 megabytes (MB) of RAM (2GB recommended)
Operating System Microsoft® Windows® XP SP3 or higher
Microsoft® Windows® VISTA all versions
Microsoft® Windows® 7 all versions
Mac OSX 10.6.x and higher
Display 1024 x 768 resolution, 65 536 colors minimum
(32-bit color recommended)
mTan & OOB Methods

mTan & OOB Methods more

Social Engineering & Interface Manipulation

Social Engineering & Interface Manipulation more

Static Code Dumping & Patching

Static Code Dumping & Patching more

Screen Capturing

Screen Capturing more

PDF Form Spoofing

PDF Form Spoofing more

Dynamic Code Dumping And Patching

Attack whereby malware uses DLL-injection more

Window Overlay and Event Emulation

Window Overlay and Event Emulation more

Keystroke and Event Emulation

Common attack scenario which uses the keystroke and mouse event more

Session Hijacking

How a Hacker can hijack an active browsing session more

Keystroke and Mouse Logging

How to retrieve personal and transaction information more