Real Privacy Management™
Introducing RPM™, lightweight cryptography for providing security and privacy for any device on any network.
Real-Time Continuous Mutual Authentication
RPM is an advanced, secret key-based continuous mutual authentication and security method. RPM was built to secure transactions and data from any variety of servers and devices, including sensors, IC, ASIC, SoC, embedded systems and the Internet of Things (or Everything). RPM is lightweight, stronger and faster than traditional security methods.
Benefit from RPM security.
RPM is faster, smaller, more efficient, and more flexible than other security techniques. RPM has been tested by an independent lab to be hundreds of times faster than other algorithms. This performance allows RPM to be used where other techniques fail, such as time constrained applications like embedded systems, mobile, and RF protocols that require fast connection speeds.
The speed of RPM is what provides the ability for continuous authentication and encryption. RPM is able to authenticate both parties (mutual authentication) for every transaction of any application due to the speed at which the authentication is performed. RPM is fast enough to mutually authenticate and encrypt every packet in protocols like TCP, UDP, SIP, IP, etc.
The RPM authentication process is done in 5 microseconds in software. VHDL and Verilog simulations show that RPM operates at line speed when used in FPGA (Field Programmable Logic Arrays), ASIC (Application Specific Integrated Circuits), IC (Integrated Circuit) or SoC (Sytem on Chip) implementations.
RPM is also much smaller than other security methods. Since the RPM libraries are 10KB or less in size they can easily be integrated with applications requiring security, while coserving space. This small size allows RPM to be placed in embedded systems like RFID, IC, SoC (Systems on Chip), ASIC and FPGA.
RPM performance has very little overhead. Measurements have shown that RPM performs at 2 – 5% network overhead with TCP/IP, which is within the typical “noise level” of IP network transmissions. So using RPM does not add additional overhead for the continuous authentication and security that RPM provides.
RPM is also more flexible in its trust model. Applications have different trust models based on the network topology, business logic and information processing that the application is representing. RPM offers the flexibility to add authentication and security to any network and communications topology, whether peer-to-peer or a trusted communications network.
RPM gives your business flexibility in implementing trust according to your own business model, without requiring third parties.
Get RPM for your application.