Transcription: As content owners make their copyrighted intellectual property accessible outside their organization, rights management and security become key concerns. Understanding the need to exploit yet protect content, IBM is providing solutions based on a six-year focus in the advanced technologies of watermarking, encryption, and trusted clients. A visible watermark can denote the source of the object to help deter improper use. invisible marking or fingerprinting can identify the requester or the source and allow for authentication. And cryptolope, an encryption protected envelope that can travel on ...