CPL Systems since 1984

Dunston Innovation Centre, Dunston Road, Chesterfield S41 8NG UK
Tel (0044)-114-262-0242 Fax (0044)-124-626-9381


Person To Person

End to End Data Encryption

The Story of RSA Encryption

Download PTP FREE license

View Release Notes

Send secure information such as credit card details with the Auto-Crypt button which creates self-decrypting files. These can be unpacked easily with one click at the other end on any PC and no encryption software needs to be installed by the receiver. All you need to do for maximum security is phone or fax through a pass code to the receiver.

Person To Person self-decrypting files are high-security encrypted files. The target recipient can click them and they unpack and de-crypt to plaintext themselves without any other software or digital certificates required.

Person To Person uses Cyphermax, a patented method of encrypting with RSA without the need for you to purchase or renew digital certificates. Why ? Because 3rd party digital certificates reduce your security.

Recently enacted laws by the US Congress (HIPAA, Gramm-Leach-Bliley and Sarbanes-Oxley) as well as the Data Protection Act in the UK have caused people to look again at email security. For email use, AES and DES type encryption is poor security. Only RSA guarantees your data will be transmitted safely "person to person".

Person To Person RSA encryption is a trillion times stronger than the same RSA encryption we all use for online shopping and banking.

Person To Person meets all important International Encryption Standards

Because Person To Person is based on encryption standards it means that you know exactly what you are getting. It does not use propietary algorithms which have no track record. RSA has had over forty years of rigourous practical testing in the field. All secure internet pages and online credit card transactions rely on RSA being secure. Without RSA being mathematically sound, the commercial internet could not exist. However, very few encryption tools use RSA and most of those that do rely on digital certificates which have their own security weaknesses.

Person To Person exceeds the following NIST standards:

USA Federal Information Processing Standards FIPS 180-2 USA Federal Information Processing Standards FIPS 140-2 USA Federal Information Processing Standards FIPS 46-3 U.S. National Institute of Standards and Technology (www.nist.gov) FIPS Publications are issued by NIST after approval by the Secretary of Commerce pursuant to Section 5131 of the Information Technology Reform Act of 1996 (Public Law 104-106) and the Federal Information Security Management Act of 2002 (Public Law 107-347). The Computer Security Division (http://csrc.nist.gov) is one of six divisions within NIST's Information Technology Laboratory. The CSD mission is to provide standards and technology to protect information systems against threats to the confidentiality of information, integrity of information and processes, and availability of information and services in order to build trust and confidence in Information Technology (IT) systems.

Person To Person exceeds the following ISO standards:

ISO 10118-3 ISO 18033-2 ISO 18033-3 ISO (International Organization for Standardization wwww.iso.org) is the world's largest developer and publisher of International Standards. ISO is a network of the national standards institutes of 159 countries, one member per country, with a Central Secretariat in Geneva, Switzerland who co-ordinate the system.

More Information - Contact Us via PTP Help/About


Convert HP3000 data to spreadsheet formats


The HP3000 Spooler Manager

'Trouble is easily stopped before it commences'

Lao-Tse 500 B.C.