Supporting Patents

McGough, Paul, “Method and system for establishing real-time trust in a public network”, U.S. Patent 8,649,520, (February 11, 2014).

McGough, Paul, “Method for obtaining key for use in secure communications over a network and apparatus for providing same,” U.S. Patent 8,144,874, (March 27, 2012).

McGough, Paul, “Method and system for establishing real-time authenticated and secured communications channels in a public network,” U.S. Patent 8,144,875, (March 27, 2012).

McGough, Paul, “Real Privacy Management Authentication System,” U.S. Patent 7,899,185, (March 1, 2011).

McGough, Paul, “Method and system for performing perfectly secure key exchange and authenticated messaging,” U.S. Patent Application 11/108,347, (February 16, 2006).

McGough, Paul, “Method and system for performing secure electronic digital streaming,” U.S. Patent 6,445,797, (September 3, 2002).

McGough, Paul, “Method and system for performing secure electronic monetary transactions ,” U.S. Patent 6,058,189, (May 2, 2000).

McGough, Paul, “Method and system for performing secure electronic messaging,” U.S. Patent 6,002,769, (December 14, 1999).

Papers Assessing RPM

Di Crescenzo, Giovanni and Glenn O. Veach, “RPM: Lightweight Communication Security from Additive Stream Ciphers” (April 1, 2015).

Di Crescenzo, Giovanni, “Cryptography Assessment of RSCorp’s Real Privacy Management (RPM) System” , Telcordia Technologies, Inc., (Piscataway NJ, 2011)

Tanaka, Hatsukazu, “Informationally Secure Secret-Key Sharing Scheme Using the Singularity of Source Coding”, The 2007 Symposium on Cryptography and Information Security (SCIS 2010), The Institute of Electronics, Information and Communication Engineers, (Takamatsu, Japan, Jan. 19-22, 2010).

Tanaka, Hatsukazu, “A New Generation Scheme of Random Number Sequences and Its Application to Enhancing the Security of DES”, The Institute of Electronics, Information and Communication Engineers, IEICE Transactions, Manuscript submission (January 1, 2009).

Tanaka, Hatsukazu, “Generation of cryptographic random sequences and its application to secure enciphering,” The 2007 Symposium on Cryptography and Information Security (SCIS 2007), The Institute of Electronics, Information and Communication Engineers, (Sasebo, Japan, January 23 – 26, 2007).

Tanaka, Hatsukazu, “Security-function integrated simple cipher communication system,” The 2006 Symposium on Cryptography and Information Security (SCIS 2006), The Institute of Electronics, Information and Communication Engineers, (Hiroshima, Japan, January 17 – 20, 2006).

Sherman, Alan T., “An initial assessment of the 2factor authentication and key-management system: highlights,” unpublished memorandum, (May 27, 2005).

Technical Documentation

Relevant Security Corp., Real Privacy Management™ (RPM) RPM Communications Method Details v 4.1, (Denver Colorado, 2014).

Relevant Security Corp., Real Privacy Management™ (RPM) Cryptographic Description Version v 3.3, (Denver Colorado, 2014).

Relevant Security Corp., Real Privacy Management™ (RPM) RPM Federated Trust v 2.5, (Denver Colorado, 2014).

Relevant Security Corp., Real Privacy Management™ (RPM) RPM In Plain English v 2.1, (Denver Colorado, 2014).

Relevant Security Corp., Real Privacy Management™ (RPM) RPM Mobile Key Management v 1.10, (Denver Colorado, 2014).

Relevant Security Corp., Real Privacy Management™ (RPM) RPM Properties Description for Analysis v 2.2, (Denver Colorado, 2014).

Relevant Security Corp., Real Privacy Management™ (RPM) Recommendations, Considerations and Architectures for Initial Key Establishment (IKE) v 2.4, (Denver Colorado, 2014).

Relevant Security Corp., Real Privacy Management™ (RPM) Reference Guide Version v 3.2, (Denver Colorado, 2014).

Relevant Security Corp., Real Privacy Management™ (RPM) RPM Technical Capabilities Overview v 1.10, (Denver Colorado, 2015).