02-347-7730  |  Saeree ERP - Complete ERP Solution for Thai Organizations Contact Us

Digital Signature in PDF: 4 PAdES Levels

Digital Signature in PDF — 4 Standard PAdES Levels
  • 29
  • April

Pick up a contract your company signed 3 years ago, open it in Adobe Acrobat, and look at the Signature Panel — does it still show "Signature is valid" in green? If you're not sure, try opening a contract signed 5 years ago.

Many organizations will find yellow or red marks with messages like "Signature validity is unknown", "At least one signature has problems", or "Certificate has expired" — the document still exists, but the signature that proves its authenticity is no longer usable.

This is the problem every organization using Digital Signature must understand — because choosing the wrong signature level today becomes a problem on the day you need the document as evidence — a day when you can't go back and fix it.

This article explains the 4 levels of Digital Signature in PDF per the international standard ETSI EN 319 142-1 (PAdES), so you can choose the right level for each document type and long-term retention.

Quick summary: PDF signatures have 4 standard levels — B-B (basic), B-T (+ trusted timestamp), B-LT (+ embedded CRL/OCSP), B-LTA (+ archive timestamp that can be renewed) — plus Visual Signature which is "non-standard". Many Thai ERP systems use Visual Signature and call it "Digital Signature", which has no cryptographic protection at all. Documents stored 10+ years require B-LTA only.

Why Documents Must Be Kept for 10 Years

Before getting into signature levels, you need to understand how long Thai law requires each document type to be retained.

Document Type Retention Period Legal Reference
Accounting documents10 yearsRevenue Code §87
Tax invoices10 yearsRevenue Code §87/3
Government procurement documents10 yearsProcurement Act 2017
General contracts10 yearsCivil & Commercial Code §193/30
Lease contractsContract term + 10 yearsCivil & Commercial Code
Board meeting minutesPermanentPublic Organization Act
AML/KYC documents10 yearsAML Act
BOI documents5 + 5 yearsInvestment Promotion Act

Why 10 Years?

This number isn't random — it's the longest statute of limitations under Civil & Commercial Code §193/30. It means within 10 years anyone can sue you — and you must have evidence to prove yourself in court.

5 Real Scenarios Requiring Old Documents

  1. State Audit (สตง.) — Requests documents going back 5-10 years
  2. Revenue Department audit — Tax audits up to 5 years (10 years in some cases)
  3. Litigation — Statute of limitations: 10 years
  4. Internal board audit — Reviewing historical documents
  5. M&A Due Diligence — Buyer requests all documents

In each scenario — if opening the document shows "unknown" or "expired" signature, it will be hard to use as court evidence, even if the signing was perfectly legal at the time.

The Hidden Problem: Documents That Can No Longer Be Verified

Already-signed digital documents may fail verification due to 3 main causes.

Cause 1: Certificate Expiration

CA certificates typically have a validity of 1-3 years. When expired, signatures using that cert may fail verification.

Example timeline:
  2023: Company signs contract (cert valid 2023-2025)
  2025: cert expires
  2027: Sue counterparty, request document for court
        → Open PDF: "Signature validity is unknown"
        → Hard to use as evidence

Cause 2: CA Stops Providing OCSP/CRL Services

Some CAs go out of business or stop providing revocation status checks for old certs. When that happens, verifiers cannot confirm that the signing cert wasn't revoked.

Cause 3: Hash Algorithm Becomes Obsolete

Hash algorithm technology has a lifespan:

  • MD5 — broken (deprecated since 2008)
  • SHA-1 — deprecated (collision attack 2017)
  • SHA-256 — currently safe (may be challenged in the future)

Documents using old algorithms may have their trustworthiness questioned.

Self-Test for Your Organization

Try checking the paperless documents your company signed:

  1. Open a PDF signed 3 years ago in Adobe Acrobat
  2. Click the Signature Panel on the left
  3. Does it show "Signature is valid" in green?
  4. Try a PDF signed 5 years ago
  5. Are the results the same?

If the results differ — you are losing legal evidence every day without realizing it.

PDF Signatures Have 4 Standard Levels

Per ETSI EN 319 142-1 (PAdES — PDF Advanced Electronic Signatures), PDF signatures are divided into 4 main levels, plus 1 "non-standard" level that many systems use.

Pyramid of 4 Digital Signature levels in PDF — Visual, B-B, B-T, B-LT, B-LTA

Each level has different components and properties. Read on to understand why higher levels can be retained longer.

Level 0: Visual Signature (Non-Standard)

What it is: A signature image displayed in the PDF document — whether from scanning a real signature, drawing on mobile, or pasting from a file — without any cryptographic signature object inside the PDF.

Anatomy: Why It Differs from Cryptographic Signature

The image below shows that PDFs using Visual Signature and PDFs using Cryptographic Signature look similar on the document page but have completely different internal structures.

Comparing Visual Signature vs Cryptographic Signature anatomy

Key differences:

  • Visual Signature = just "pixels" in the document, like any other image in PDF
  • Cryptographic Signature = has a "PKCS#7 object" embedded in the PDF structure with certificate, hash, timestamp

4 Visual Signature Patterns Common in the Industry

In Thailand, many paperless and ERP systems use Visual Signature but call it "Digital Signature" — categorized into 4 main patterns.

4 Visual Signature patterns in Thai paperless systems

Pattern 1: Direct Image Paste
Use Word or Google Docs to insert a signature image, then save as PDF — the signature image is just an image embedded in the document. Anyone with a PDF editor can delete or edit it.

Pattern 2: Mobile App Signature Drawing
Executive draws signature on mobile screen — app saves as PNG and embeds in PDF as a regular image. No cryptographic binding to identity.

Pattern 3: Workflow App + Database Timestamp
Executive clicks "Approve" in app → system generates PDF with signature image and "Approved by..." text → records timestamp in vendor's database — Vendor often claims this is "Digital Signature" but there's no cryptographic content in the PDF itself.

Pattern 4: Encrypted PDF + Internal Hash
Use "PDF encryption" or "Password-protected PDF" + signature image, then store hash in vendor's own database — not standard, and if the vendor disappears, the document can no longer be verified.

How to Check in Adobe Acrobat (Free)

The easiest way to distinguish Visual vs Cryptographic Signature in your documents is to open in Adobe Acrobat Reader DC and look at the Signature Panel.

Decision Tree for verifying Digital Signature in Adobe Acrobat

The result tells you immediately:

  • "Signature is valid" = Real Cryptographic Signature — check level next (B-T / B-LT / B-LTA)
  • ⚠️ "Has problems" = Cryptographic but with issues (cert expired, untrusted CA, etc.)
  • "No signatures present" = Just Visual Signature — Urgent system upgrade needed

Properties of Visual Signature

  • ❌ No cryptographic protection
  • ❌ Cannot detect modifications (anyone can delete and paste a new one)
  • ❌ No technical binding to signer's identity
  • ❌ No trusted timestamp
  • ❌ Adobe Acrobat shows "No signatures present"

Thai legal effect: Only Level 1 (General Electronic Signature) per the Royal Decree on Secure Methods for Electronic Transactions B.E. 2553 — has binding effect but the weakest. In court, the counterparty can easily dispute "I didn't sign" or "the document was modified".

Retention period: Unlimited — but no long-term legal value.

Suitable for: Small internal records with no legal effect and short retention.

⚠️ Important note: Many "paperless" systems in the Thai ERP industry use Visual Signature and call it "Digital Signature" — this misleads organizations into thinking they have a secure system when in fact there is no cryptographic protection at all. Before deciding to buy a system — ask the vendor to demo verification in Adobe Acrobat to confirm it's a real Digital Signature.

Level 1: PAdES B-B — Basic Cryptographic

What it is: A signature using PKCS#7 (Public Key Cryptography Standards #7) embedded in the PDF along with the signer's certificate chain.

Structure: PDF Content + PKCS#7 Signature + Signing Certificate + Cert Chain (see comparison image of 4 levels below)

Properties:

  • ✅ Cryptographic signature that detects modifications
  • ✅ Certificate chain embedded (no need to download later)
  • ✅ Bound to signer's identity (via X.509 certificate)
  • ⚠️ Signing time is the signer's own claim, not a third party's
  • ⚠️ Requires online OCSP/CRL service to verify

Thai legal effect: Can be Level 3 (Qualified Electronic Signature) if the cert is from an ETDA-recognized CA — highest binding effect.

Retention period: Per cert validity (typically 1-3 years) — after which verification may fail.

Suitable for: General documents that don't need to be retained beyond the cert lifetime.

Example verification output:

$ pdfsig sample.pdf
Signature #1:
  Field Name: Signer1
  Signer Common Name: Sample Company Co., Ltd.
  Signing Time: Apr 27 2026 11:15:58
  Signing Hash Algorithm: SHA-256
  Signature Type: adbe.pkcs7.detached
  Signature Validation: Signature is Valid.

Level 2: PAdES B-T — Adds Trusted Timestamp

What it is: B-B + timestamp token from a Trusted Time Stamping Authority (TSA) embedded in the signature.

Structure: Everything in B-B + TSA Token (TSA Cert + Signed time + Hash)

Additional properties beyond B-B:

  • ✅ Proves signing time via third party
  • ✅ Prevents backdating claims in court
  • ✅ Prerequisite for B-LT and B-LTA

TSAs available in Thailand:

  • ETDA TSA: https://timestamp.etda.or.th/tsa (free for government agencies)
  • Commercial TSA from qualified providers

Thai legal effect: Same as B-B but with stronger proof of time.

Retention period: 2-5 years — TSA cert also has limited validity.

Suitable for: Documents requiring proof of time, e.g., contracts with expiry dates, tender deadlines.

Example output:

$ pdfsig sample.pdf
Signature #1:
  ...
  Timestamp: Yes
    TSA: Electronic Transactions Development Agency
    Time: Apr 27 2026 11:15:58 +0700 (verified)

Level 3: PAdES B-LT — Long-Term Validation

What it is: B-T + embedding CRL (Certificate Revocation List) and OCSP responses into the PDF's DSS (Document Security Store).

Structure: Everything in B-T + DSS (CRL responses + OCSP responses + Validation data)

Additional properties beyond B-T:

  • ✅ Verifies even after cert expires
  • ✅ Verifies offline (no need to connect to CA)
  • ✅ Resilient to CA shutting down in the future

Why it matters:

B-T problem:
  ↓
  cert expires in 2027
  ↓
  Adobe requests CRL/OCSP to verify
  ↓
  CA may not have responses for old cert anymore
  ↓
  ✗ Verification fails

B-LT solution:
  ↓
  Embed CRL/OCSP at signing time
  ↓
  In 2027, verify by reading from PDF
  ↓
  ✓ Verification passes (offline)

Thai legal effect: Strong Level 3 for long-term retention.

Retention period: 10-15 years — but if TSA cert loses trust, there may be issues.

Suitable for: Accounting documents, general contracts, AIP/PR/PO that must be kept 10 years.

Level 4: PAdES B-LTA — Long-Term Archive ★

What it is: B-LT + Archive Timestamp that can be renewed every 3-5 years to extend trustworthiness indefinitely.

Structure: Everything in B-LT + Archive Timestamp (covers signature + existing DSS + new TSA Token), which can be added again every 3-5 years.

Comparison of All 4 Level Structures

The image below shows that each level "adds" a layer over the previous one — not replacing it.

PDF structure at each PAdES level — B-B, B-T, B-LT, B-LTA

Additional properties beyond B-LT:

  • ✅ Renewable indefinitely — chain of archive timestamps
  • ✅ Protects against TSA cert expiration
  • ✅ Protects against hash algorithm obsolescence (re-archive with new algorithm)
  • ✅ Verifies forever as long as renewed before each round expires

Archive Timeline: Sign in 2026 → Renew Archive TS #1 in 2029 → #2 in 2033 → #3 in 2037 → continuing on...

Archive Timestamp Chain — renewable indefinitely

Thai legal effect: Highest Level 3 — usable in court and audits at every level.

Retention period: Unlimited.

Suitable for: 10+ year contracts, financial documents, board reports, permanent documents, AML records.

Comparison Table of 4 Levels + Visual

Feature Visual B-B B-T B-LT B-LTA
Cryptographic Signature
Certificate Chain
Trusted Timestamp
Embedded CRL/OCSP
Archive Timestamp
Verify offline
Verify after cert expires
Verify forever
Retention periodNo legal value1-3 years2-5 years10-15 yearsUnlimited

How to Choose the Right Level for Your Documents

Choose signature level by document type

Guide table for choosing signature level by document type:

Document Type Minimum Level Recommended Level
General internal recordsVisualB-B
Memos, general minutesB-BB-T
Accounting documentsB-TB-LT
Tax invoicesB-TB-LT
Government AIP/PR/POB-LTB-LT
Business contractsB-LTB-LTA
Long-term lease contractsB-LTAB-LTA
Government procurementB-LTB-LTA
Board reportsB-LTAB-LTA
AML documentsB-LTB-LTA
M&A documentsB-LTAB-LTA
Permanent documentsB-LTA

Simple rule of thumb:

  • Documents kept < 2 years → B-B is enough
  • Documents kept 2-5 years → B-T
  • Documents kept 5-10 years → B-LT
  • Documents kept 10+ years or permanent → B-LTA

How to Check Your ERP System

Use this 8-point checklist to inspect documents your system has signed.

Basic Level

  1. ☐ Open signed PDF in Adobe Acrobat
  2. ☐ Click Signature Panel
  3. ☐ Does it show "Signature is valid" in green?

B-T Level (Trusted Timestamp)

  1. ☐ Has clearly indicated "trusted timestamp"
  2. ☐ TSA name appears (e.g., ETDA or qualified TSA)

B-LT/B-LTA Level (Long-term)

  1. ☐ Shows "Signature is LTV enabled"
  2. ☐ Disconnect internet and verification still passes

Trust Chain Level

  1. ☐ Trust path leads to ETDA-recognized Root CA (e.g., NRCA — Thailand National Root CA)
💡 Tip: For command-line verification, use pdfsig sample.pdf on Linux/Mac to see all details.

If you answer ❌ to even one item — your system isn't fully meeting that level's standard, and previously-signed documents may fail verification in the future.

Important Note: Systems Using "Visual Signature" Are Not Digital Signature

In the Thai ERP and paperless industry, many systems advertise having "Digital Signature" but in reality use only Visual Signature (signature image pasted onto PDF), with no cryptographic protection at all.

Easy verification:

Open the PDF the system signed in Adobe Acrobat
  ↓
If you only see a signature image but no Signature Panel
  ↓
Or Signature Panel shows "No signatures"
  ↓
= Just Visual Signature
= Not technically Digital Signature

These systems:

  • ❌ Cannot detect document modifications
  • ❌ Not bound to signer's identity
  • ❌ Hard to use as court evidence
  • ❌ Don't comply with Electronic Transactions Act §9 at the Qualified level

Before deciding to buy a system — ask the vendor to demo verification in Adobe Acrobat to confirm it's a real Digital Signature, not just Visual.

Questions to Ask Vendors

If considering a new ERP/paperless system, use these questions:

Signature Level

  1. What signature does the system use — Visual / B-B / B-T / B-LT / B-LTA?
  2. Which CA issues the certificates? Is it ETDA-recognized?
  3. Does the trust chain reach the Thai Root CA (NRCA)?

Long-term

  1. If the cert has expired, can previously-signed documents still be verified?
  2. Does the system support 10-year document retention per the Office Records Regulation No. 4 B.E. 2564?
  3. Does it have automatic Archive Timestamp renewal?

Verification

  1. Demo opening a document in Adobe Acrobat — does it show "LTV enabled"?
  2. Is there a Public Verification Portal for external parties to verify?

Answers to Watch Out For

  • ❌ "Our signature is secure, uses AES-256" → AES is encryption, not signature
  • ❌ "Once signed, can verify forever" → If PAdES profile not specified = may not be true
  • ❌ "Our system is better than competitors" → Ask for verifiable technical proof

Upgrade Roadmap for Organizations

If your current system is at B-B level and you want to move up, you can do it phased:

Phase From → To Effort Impact
Phase 1B-B → B-T1-2 weeks+ Trusted timestamp
Phase 2B-T → B-LT3-5 weeks+ Verify offline
Phase 3B-LT → B-LTA1 week+ Verify forever
Phase 4Migration3-6 monthsUpgrade old documents

Each phase can be deployed separately without affecting already-signed documents — progressive enhancement.

Action Items for Today

For executives and IT directors:

  1. Audit already-paperless documents — open old PDFs in Adobe Acrobat and check whether the signature is still valid
  2. Identify document types and required retention — use the table in "Why 10 Years"
  3. Set organizational minimum standards — what document types need which signature level
  4. Audit current ERP system — use the 8-point checklist
  5. Plan upgrade roadmap — gradually upgrade by importance

Conclusion

Documents signed today are evidence for tomorrow. A good ERP system isn't just one that signs — it must store, verify, and meet the legal retention period.

— Saeree ERP Team

Whatever signature level you choose, choose with information — because the wrong choice today cannot be fixed on the day you need the document as evidence.

About Saeree ERP

Saeree ERP by Grand Linux Solution currently implements Digital Signature at PAdES B-B level with INET-CA Trust Chain at TGO for over 5 years, and is upgrading to PAdES B-LTA in 2026 — the highest level of the PAdES standard today, with continued evolution to meet upcoming standards in the future.

2026 Development Roadmap

  • Q2 2026: Upgrade to PAdES B-T (Trusted Timestamp via ETDA TSA)
  • Q3 2026: B-LT (Embedded CRL/OCSP for 10-year documents)
  • Q4 2026: B-LTA (Archive Timestamp for permanent documents)
  • 2027: ETDA Conformance Assessment

Related articles: Paperless Checklist: 10 Essentials for Thai Government Organizations and Where to Store PDF Files in Your ERP Safely: 3 Approaches and 3 Types of Electronic Signatures Under the Electronic Transactions Act

Appendix: Technical Terms to Know

Term Meaning
PAdESPDF Advanced Electronic Signatures (ETSI EN 319 142-1)
PKCS#7Public Key Cryptography Standards #7 — signature format used in PDF
CACertificate Authority — organization that issues digital certificates
NRCAThailand National Root Certification Authority — Thai Root CA operated by ETDA
TSATime Stamping Authority — issuer of trusted timestamp per RFC 3161
CRLCertificate Revocation List — list of revoked certs
OCSPOnline Certificate Status Protocol — checks cert status online
DSSDocument Security Store — PDF structure storing validation data
LTVLong-Term Validation — ability to verify after long time has passed
ETDAElectronic Transactions Development Agency (Thailand)

This article is based on experience implementing Digital Signature systems in ERP for Thai government organizations. For consultation on Digital Signature in your organization, contact sale@grandlinux.com or 02-347-7730

Looking for an ERP with PAdES B-LTA Digital Signature?

Consult Digital Signature experts at Grand Linux Solution — free of charge

Request Free Demo

Call 02-347-7730 | sale@grandlinux.com

Paitoon Butri

About the Author

Paitoon Butri

Network & Server Security Specialist, Grand Linux Solution Co., Ltd.