Real-Time Continuous Mutual Authentication
RPM™ is an advanced, secret key-based continuous mutual authentication security method. RPM was built to secure Web traffic, email, instant messaging, file transfer, voice, VoIP, mobile data, mobile commerce, mobile communications, enterprise search, and enterprise data. It is both stronger and faster than traditional security methods currently in use today.
How can my company benefit from RPM security?
RPM is faster, smaller, more efficient, and more flexible than other security techniques. RPM has been tested by an independent lab to be up to 100 times faster than other algorithms. This performance allows RPM to be used where other techniques fail, such as time constrained applications like embedded systems, mobile, and RF protocols that require fast connection speeds.
The speed of RPM is what provides the ability for continuous authentication. RPM is able to authenticate both parties (mutual authentication) for every transaction of any application due to the speed at which the authentication is performed. RPM is fast enough to mutually authenticate and encrypt every packet in protocols like TCP, UDP, SIP, IP, etc.
The RPM authentication process is done in 5 microseconds in software. VHDL simulations show that RPM operates at line speed when used in FPGA (Field Programmable Logic Arrays), ASIC (Application Specific Integrated Circuits) or IC (Integrated Circuit) implementation.
RPM is also much smaller than other security methods. Since the RPM libraries are only 10KB in size they can easily be integrated with applications requiring security, without taking up too much space. This size also allows RPM to be placed in embedded systems like RFID, IC, SoC (Systems on Chip), ASIC and FPGA.
Performing the RPM method has very little overhead too. Measurements have shown that RPM performs at 2 – 5% overhead with TCP/IP, which is within the typical “noise level” of IP network transmissions. So using RPM does not add additional overhead for the continuous authentication and security that RPM provides.
RPM is also more flexible in its trust model. Applications have different trust models based on the business logic and information processing that the application is representing. RPM offers the flexibility to add authentication and security to any network and communications topology. Most other security methods require third parities to resolve trust using a “root” trust authority, which requires the trust model to be a “tree”.
RPM gives your business flexibility in implementing trust according to your own business model, without requiring third parties.
Get RPM for your application