IBM's Cryptolope (IBM, "Welcome...") technology allows a user to encrypt an electronic product for transport over the network. Two features distinguish this approach from other payment methods: usage tracking and non-encrypted abstracts. A cryptolope container has built-in abilities to track its usage regardless of when it is opened. This enables the owner to track the usage of a product after the product's first owner. For example, if user A buys a video clip contained in a cryptolope, and passes a copy to user B, when user B opens the cryptolope to get the video clip, the originator of the cryptolope is notified. The Cryptolope web site is not exact about how this notification is accomplished.
The second distinguishing feature is the availability of an abstract on every cryptolope. The abstract contains a description of the contents, the price to open the contents, and instructions for using the contents. Users on the network can look at the abstract to decide if they want to purchase the key to the cryptolope. IBM touts this technology as the best method of collecting payment for copyrighted information. No matter where the cryptolope travels, it is still only available to users who pay for access.
IBM also claims that cryptolope technology allows the creation of a unique digital object. This leads to the idea of a 'digital collectible'(IBM, "Digital Collectibles...") -- an object that has been reproduced by its owner into a limited number of copies. Each of these copies can be authenticated as one of the original copies. This idea potentially leads to genuine trade of original work on the Internet.
Copyright © 1996 Patrick N. Brooks
All Rights Reserved