Energy resource network

ABSTRACT

A solar panel energy system, energy resource network comprising a plurality of energy resources each capable of delivering a quantum of energy; and a plurality of energy-consuming-devices each capable of accepting a quantum of energy. Each energy resource is associated with an energy-resource-processor which is configured to issue one or more offer-messages in respect of a quantum of energy available for supply from the energy resource Each energy-consuming-device is associated with at least one energy-consuming-processor) that is configured to receive one or more offer-messages in respect of a transaction for receiving a quantum of energy from one of the energy resources The energy-resource-processor and/or the energy-consuming-processor being configured to issue a cryptographically-secured transaction record of the transaction for inclusion within a publicly-available distributed ledger.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation-in-part of U.S. application Ser. No.15/077,763, filed on Mar. 22, 2016, which claims priority to foreignapplication GB 1504946.3, filed Mar. 24, 2015, the contents of which areincorporated herein by reference as fully set forth herein.

TECHNICAL FIELD

The disclosure relates to energy resource networks and in particularenergy transactions between energy resources andenergy-consuming-devices.

BACKGROUND

In existing energy distribution networks, such as electrical powerdistribution networks, electrical power is commonly distributed to endusers or energy consumers by an energy supplier who obtains electricalpower from one or more electricity generators. The system is generallycentralized in that each energy consumer's usage is metered and recordedby the energy supplier, who invoices the energy consumers for the powerused. The energy supplier simultaneously secures supplies of energy fromthe one or more electricity generators for delivery of power to theenergy consumers.

Local generation of electrical energy by energy consumers themselves,for example by domestic-scale solar panels or wind turbines etc may betransferred to the network, for example by compensating meter readingsfor that energy consumer which are transmitted to the energy supplier.

A significant increase in interest in decentralised power generation anddistribution, for example using many smaller scale local powergeneration units, may require alternative strategies for enabling morelocalised and distributed control, monitoring and implementing of energyexchange.

SUMMARY

Aspects of some exemplars include an energy resource network comprising:a plurality of energy resources each capable of delivering a quantum ofenergy; a plurality of energy-consuming-devices each capable ofaccepting a quantum of energy; each energy resource being associatedwith an energy-resource-processor configured to issue one or moreoffer-messages in respect of a quantum of energy available for supplyfrom the energy resource; each energy-consuming-device being associatedwith an energy-consuming-processor configured to receive one or moreoffer-messages in respect of a transaction for receiving a quantum ofenergy from one of the energy resources; and theenergy-resource-processor and/or the energy-consuming-processor beingconfigured to issue a cryptographically-secured transaction record ofthe transaction for inclusion within a publicly-available distributedledger.

The energy resource network may further comprise a plurality of thirdparty nodes, each configured to locally store and maintain thepublicly-available distributed ledger. The third party nodes may each beconfigured to identify, and store locally, a correct version of thepublicly-available distributed ledger as the version of thepublicly-available distributed ledger that is most commonly stored onthe plurality of third party nodes.

The energy resource network may further comprise a third party nodeconfigured to: perform a verification routine on one or morecryptographically-secured transaction records (for example using apublic key); and only add the one or more cryptographically-securedtransaction records to the publicly-available distributed ledger if theverification routine is successful.

The third party node may be configured to perform the verificationroutine by processing the publicly-available distributed ledger in orderto determine whether or not an energy resource associated with thetransaction has sufficient energy to perform the transaction. The thirdparty node may be configured to perform the verification routine byprocessing the publicly-available distributed ledger in order todetermine whether or not an energy resource associated with thetransaction has sufficient energy-generating capacity (which may bereferred to as power) available to perform the transaction.

The publicly-available distributed ledger may comprise a balance ofavailable energy-generating capacity or energy available for each energyresource. The third party node may be configured to determine whether ornot an energy resource associated with the transaction has sufficientavailable energy-generating capacity or energy to perform thetransaction by comparing at least part of the transaction record withthe balance of available energy-generating capacity or energy availablefor the energy resource associated with the transaction.

The publicly-available distributed ledger may comprise a plurality ofblocks of data, wherein each block of data comprises informationrepresentative of: one or more transaction records; and a cryptographichash value of at least a part of a previous block in the ledger. Thepublicly-available distributed ledger may comprise a block chain.

The energy resource network may further comprise a third party nodeconfigured to: process one or more cryptographically-secured transactionrecords; and determine a new block of data for the publicly-availabledistributed ledger by determining the cryptographic hash value byapplying a hash algorithm to at least a part of a previous block in thepublicly-available distributed ledger.

The third party node may be configured to determine the cryptographichash value by applying the hash algorithm to: at least a part of animmediately preceding block in the ledger; the one or more transactions;and a cryptographic nonce value.

The third party node may be configured to: generate cryptographic hashvalues for a plurality of different cryptographic nonce values; identifya determined cryptographic hash value as valid if it satisfies one ormore predetermined characteristics; and broadcast a new block of data,comprising the valid cryptographic hash value, for inclusion in thepublicly-available distributed ledger.

The part of the immediately preceding block in the ledger may be thecryptographic hash value of the immediately preceding block in theledger. One or more of: the issue of offer-messages by the energyresource via the network; an acceptance of offer-messages by the energyconsuming devices; an issue of acceptance-messages by the energyconsuming devices in acceptance of an offer-message; processing ofacceptance-messages by a third party for inclusion in acryptographically-secured, publicly-available distributed ledger ofacceptance-messages; and a physical exchange of energy between theenergy resource and the energy consuming device; may be controlled basedon a cryptographically-secured, publicly-available distributed ledger ofacceptance-messages and/or a cryptographically-secured,publicly-available distributed ledger of transactions.

The energy-resource-processors may be configured to automatically issuean offer-message if an available amount of energy (for example,energy-available-value), or an available capacity for providing energy(for example, power-rating), exceeds a high-energy-threshold level.

The energy-consuming-processors may be configured to automaticallyaccept or reject an offer-message by comparing one or more pieces ofinformation of the offer-message with one or more predeterminedacceptance-criteria.

The processor of each energy-consuming-device or each energy resourcemay be configured to generate the cryptographically-secured transactionrecord using a private key.

The transaction record may comprise information representative of anacceptance of the quantum of energy and/or a debit of an accountassociated with the energy-consuming-device.

Each offer-message may comprise information representative of one ormore of: a quantum of energy; a generating capacity of the energyresource; a time window; a price.

The energy-resource-processor of each energy resource may be configuredto issue a cryptographically-secured offer record for inclusion within apublicly-available distributed ledger.

The energy resource network may further comprise a metering apparatus.The metering apparatus may be configured to generate acryptographically-secured transaction record of metered units of energytransferred between an energy resource and an energy-consuming-devicecounterparties.

There may be provided an energy-consuming-device configured to consumequanta of energy from one or more energy resources, theenergy-consuming-device comprising: optionally, a load device; anenergy-consuming-processor configured to: (i) receive offer-messages inrespect of quanta of energy available for supply from one or more energyresources; and (ii) in response to accepting an offer-message in respectof a transaction for receiving a quantum of energy from one or more ofthe energy resources, issue a cryptographically-secured transactionrecord of the transaction for inclusion within a publicly-availabledistributed ledger.

There may be provided an energy resource configured to deliver quanta ofenergy to one or more energy-consuming-devices, the energy resourcecomprising: an energy-resource-processor configured to: (i) issueoffer-messages in respect of quanta of energy available for supply fromthe energy resource; and (ii) in response to having an offer-message inrespect of a transaction for delivering a quantum of energy to anenergy-consuming-device accepted, issue a cryptographically-securedtransaction record of the transaction for inclusion within apublicly-available distributed ledger.

There may be provided a device for updating a publicly-availabledistributed ledger for an energy resource network, the networkcomprising: a plurality of energy resources each capable of delivering aquantum of energy; a plurality of energy-consuming-devices each capableof accepting a quantum of energy; each energy resource being associatedwith an energy-resource-processor configured to issue one or moreoffer-messages in respect of a quantum of energy available for supplyfrom the energy resource; and each energy-consuming-device beingassociated with an energy-consuming-processor configured to receive oneor more offer-messages in respect of a transaction for receiving aquantum of energy from one of the energy resources; wherein the deviceis configured to receive, from the energy-resource-processor and/or theenergy-consuming-processor, a cryptographically-secured transactionrecord of the transaction and include said record within apublicly-available distributed ledger.

There may be provided a method of operating an energy resource network,the energy resource network comprising: a plurality of energy resources;and a plurality of energy-consuming-devices; wherein the methodcomprises: an energy resource issuing one or more offer-messages inrespect of a quantum of energy available for supply from the energyresource; an energy-consuming-device receiving one or moreoffer-messages in respect of a transaction for receiving a quantum ofenergy from one of the energy resources; and issuing acryptographically-secured transaction record of the transaction forinclusion within a publicly-available distributed ledger.

There may be provided a computer program, which when run on a computer,causes the computer to configure any apparatus, including an energyresource network, an energy resource, an energy-resource-processor, anenergy-consuming-device, an energy-consuming-processor, a third partynode, a circuit, controller, or device disclosed herein or perform anymethod disclosed herein. The computer program may be a softwareimplementation, and the computer may be considered as any appropriatehardware, including a digital signal processor, a microcontroller, andan implementation in read only memory (ROM), erasable programmable readonly memory (EPROM) or electronically erasable programmable read onlymemory (EEPROM), as non-limiting examples. The software may be anassembly program.

The computer program may be provided on a computer readable medium,which may be a physical computer readable medium such as a disc or amemory device, or may be embodied as a transient signal. Such atransient signal may be a network download, including an internetdownload.

BRIEF DESCRIPTION OF THE DRAWINGS

Aspects of Embodiments of the present disclosure will now be describedby way of example and with reference to the accompanying drawings inwhich:

FIG. 1 shows an energy resource network;

FIG. 2 shows schematically an example of a publicly-availabledistributed ledger; and

FIG. 3 shows another energy resource network.

The disclosure and the following further disclosure are exemplary andexplanatory only and are not restrictive of the disclosure, as definedin the appended claims. Other aspects of the present disclosure will beapparent to those skilled in the art in view of the details as providedherein. In the figures, like reference numerals designate correspondingparts throughout the different views. All callouts and annotations arehereby incorporated by this reference as if fully set forth herein.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

FIG. 1 shows an energy resource network 100, which includes a firstenergy resource 102, a second energy resource 104, a firstenergy-consuming-device 106 and a second energy-consuming-device 108. Itwill be appreciated that the energy resource network 100 can include anynumber of energy resources and any number of energy-consuming-devices.The energy resources 102, 104 can deliver a quantum of energy, and theenergy-consuming-devices 106, 108 can accept/consume a quantum ofenergy.

A purpose of the energy resource network 100 is to enable anenergy-consuming-device 106, 108 to acquire energy from an energyresource 102, 104, in a peer-to-peer manner, and to provide an accuraterepresentation of how energy is exchanged in the network. As will bediscussed in more detail below, this can be achieved by recordingtransactions on a publicly-available distributed ledger. Use of such adistributed ledger can remove, or reduce, any disadvantages associatedwith a centralised recordal system and can maintain a high integrity ofthe data stored in the ledger. In this way, an alternative system forfacilitating one or more aspects of controlling, monitoring andimplementing energy exchange between energy generators and energyconsumers can be provided.

The energy-consuming-device 106, 108 and the energy resource 102, 104are in data communication through a data exchange network 120, such asthe interne, or any other communications network including Bluetooth,Wi-Fi, etc.

The energy resources 102, 104 can be any resource that is capable ofsupplying an amount of energy at a given time. An energy resource 102,104 may have a known power-rating, which can be considered as a capacityfor supplying energy. The energy resource 102, 104 could be aconventional power station (gas, oil, coal, nuclear, etc.) having awell-defined capacity for providing energy at any given period of time;a renewable energy supply (wind, solar, tidal, etc.) having a variablecapacity at any given period of time; or an alternative generator systemsuch as hydrogen-based fuel cells, pumped storage etc. Hydrogen-basedfuel cells and fuel cell stacks can have a known capacity for providingenergy. For example, a hydrogen-based fuel cell may have a power-ratingthat is determined by a number of fuel cells in a fuel cell stack, andthe size of an active area of the fuel cells. Some energy resources 102,104 may have a defined, but not constant over time, capacity forproviding energy (power-rating) based on environmental conditions, forexample a wind turbine's power-rating may be based on wind speed.

The energy resources 102, 104 can also have an energy-available-value,which defines an amount of energy that is available for supply. Forenergy resources 102, 104 that consume a fuel, such as a hydrogen-basedfuel cell stack, the energy-available-value may define a quantity offuel that the fuel cell stack has access to.

The energy-consuming-devices 106, 108 can be any apparatus, device ornetwork that is capable of consuming energy, or providing an electricalload to an energy resource 102, 104 within a specified time period. Anenergy-consuming-device can be a portable computing device, such as amobile telephone, a smartphone, a tablet computer or a laptop computer.In some examples the energy-consuming-device 106, 108 may be, or mayinclude, an energy storage system such as a battery. Theenergy-consuming-devices 106, 108 can also provide the functionality ofan energy resource in some examples.

The first and second energy resources 102, 104 have associatedenergy-resource-processors 110, 112. It will be appreciated that theenergy-resource-processors 110, 112 need not necessarily be co-locatedwith the associated energy resources 102, 104. Theenergy-resource-processors 110, 112 can issue one or more offer-messagesin respect of a quantum of energy available for supply from theassociated energy resource 102, 104. For example, a user associated withan energy resource 102, 104 may provide input to theenergy-resource-processors 110, 112 representative of a desire toprovide energy to an energy-consuming-device 106, 108.

In some examples, the energy-resource-processors 110, 112 mayautomatically issue an offer-message if an available amount of energy(energy-available-value), or an available capacity for providing energy(power-rating), exceeds a high-energy-threshold level. In some examples,such offer-messages may be issued in response to the receipt of anenergy-request-message from an energy-consuming-device 106, 108. Theautomatic exchange of such messages can enable an effective andefficient energy network to be maintained.

The offer-message can be completely public, for example broadcast to anentire network, or can broadcast only to a subset ofenergy-consuming-devices 106, 108.

The offer-message may include information representative of one or moreof:

-   an identifier of the energy resource 102, 104 making the offer;-   an identifier of one or more energy-consuming-devices 106, 108 to    which the offer is made. This can allow personalised/non-public    offers to be made;-   a quantum of energy being offered, which may be:

an amount of energy that is being offered;

an available generating capacity that is being offered;

a generating capacity of the energy resource 102, 104, which in someexamples can be used as the quantum of energy being offered;

a start time, an end time, and/or a time window during which the offeris valid;

a price; and

a proposed transaction record, which is described in more detail below.

A quantum of energy specified in an offer can represent an ability todraw on a specified maximum number of watts (an instantaneous loadvalue) for the duration of a specified time period or could be a totalamount of energy to be delivered over a specified time period, whetheror not the energy transfer actually takes place either in part or infull. The specified period may or may not have a predetermined end time.

In some examples, the offer-message can be cryptographically secured sothat recipients can confirm the identity of the energy resource 102, 104that is making the offer. That is, the energy-resource-processor 110,112 can encrypt the offer-message using a private key associated withthe energy-resource-processor 110, 112 and/or associated with a user ofthe energy resource 102, 104. This can advantageously secure theintegrity of the offer-message.

In some examples, cryptographic securing of public offers from energyresources 102, 104 could be digitally signed by secure modules thatcheck or confirm the integrity of the energy resource, its maximumcapacity, its market authorisation, etc.

The first and second energy-consuming-devices 106, 108 have associatedenergy-consuming-processors 114, 116. Again, theenergy-consuming-processors 114, 116 need not necessarily be co-locatedwith the associated energy-consuming-devices 106, 108. Theenergy-consuming-processors 114, 116 can receive and process one or moreoffer-messages that are received from energy resources 102, 104. Thisprocessing may involve displaying to a user of theenergy-consuming-device 106, 108 one or more of the pieces ofinformation that is included in the offer-message. The user of theenergy-consuming-device 106, 108 can then provide input to theenergy-consuming-processor 114, 116 indicative of a desire to accept orreject the offer.

In some examples, the energy-consuming-processor 114, 116 may beconfigured to automatically accept or reject the offer by comparing oneor more of the above pieces of information in the offer-message with oneor more predetermined acceptance-criteria. In this way, theenergy-consuming-processors 114, 116 can automatically accept one ormore offers in respect of a transaction for receiving a quantum ofenergy from one of the energy resources.

If the offer is rejected, then the energy-consuming-processor 114, 116may send an offer-rejection message to the energy resource 102, 104 thatmade the offer. Alternatively, the energy-consuming-processor 114, 116may simply ignore the offer-message by not responding to it, if itrejects the offer.

If the offer is accepted, then the energy-consuming-processor 114, 116may send an offer-acceptance-message to the energy resource 102, 104that made the offer. The offer-acceptance-message may includeinformation representative of one or more of:

-   an identifier of the energy-consuming-device 106, 108 that accepts    the offer;-   an identifier of the energy resource 102, 104 that made the offer;-   a quantum of energy that has been accepted, which may be:

an amount of energy; or

a generating capacity of the energy resource 102, 104;

a start time, an end time, and/or a time window during which the offeris accepted;

a price; and

a proposed transaction record, which is described in more detail below.

In some examples, the offer-acceptance-message can be cryptographicallysecured so that recipients can confirm the identity of theenergy-consuming-device 106, 108 that is accepting the offer. That is,the energy-consuming-processor 114, 116 can encrypt theoffer-acceptance-message using a private key associated with theenergy-consuming-processor 114, 116 and/or associated with a user of theenergy-consuming-device 106, 108. This can advantageously secure theintegrity of the offer-acceptance-message.

In some examples, the same types of information can be included in theoffer-message and the offer-acceptance-message, but with differentvalues. For example, an energy-consuming-processor 114, 116 may make aconditional acceptance of an offer, for example conditional upon arevised price being acceptable to the energy-resource-processor 110,112. In this way, the energy-consuming-processor 114, 116 can modify oneor more of the pieces of information received in an offer-message andsend the modified information back to the energy-resource-processor 110,112 as part of an offer-acceptance-message. This can enable a user ofthe energy-consuming-device 106, 108 to indicate an acceptance of awhole or a part of an offered quantum of energy from an energy resource,optionally during or for a given time period.

If the offer is accepted, then either or both of theenergy-consuming-processor 114, 116 and the energy-resource-processor110, 112 can generate a transaction record using information from theoffer-message and/or acceptance-message. The transaction record canencode an acceptance of the quantum of energy and/or can be used todebit an account associated with the energy-consuming-device 106, 108.The transaction record can include information representative of one ormore of:

-   an identifier of the energy resource 102, 104 that is to deliver the    energy;-   an identifier of the energy-consuming-device 106, 108 that is to    receive the energy;-   a quantum of energy that is to be delivered, which may be:

an amount of energy that is being offered;

an amount of generating capacity of the energy resource 102, 104;

an amount of generating capacity of the energy resource 102, 104 thatremains unallocated;

a start time, an end time, and/or a time window during which the quantumof energy that is to be delivered; and

a price.

In some examples, energy may be delivered by the energy resource to theenergy-consuming-device through a USB connection, optionally abi-directional USB connection.

In this example, the energy-consuming-processor 114, 116 and/or theenergy-resource-processor 110, 112 can issue a cryptographically-securedtransaction record of the transaction. For example, one or both of theprocessors can encrypt the transaction record using a private key togenerate the cryptographically-secured transaction record, wherein theprivate key is unique to a registered user of the energy resource 102,104 or a user of the energy-consuming-device 106, 108, or is unique tothe associated hardware/device.

The cryptographically-secured transaction record can be broadcast to thenetwork 120 such that it is accessible by all nodes/devices in thenetwork 120. A single third party node 118 is shown in FIG. 1, with anassociated third-party-processor 122. As will be discussed below, thethird-party-processor 122 can be programmed to include details of atransaction that is represented by the cryptographically-securedtransaction record within a publicly-available distributed ledger. Inpractice, there can be a plurality, and often a great many, third partynodes that are competing to be the first node to add the transaction tothe ledger. Optionally, the third-party-processor 122 can also verifythe transaction, and only include details of the transaction within thepublicly-available distributed ledger if the verification is successful.

The functionality of including the transaction on the ledger, andoptionally verifying the transaction, may be performed in a similar wayto how Bitcoin transactions are processed before being added to a blockchain. Such processing can be implemented in a number of different ways,for example depending upon the type of transaction, as discussed below.

FIG. 2 shows schematically an example of information that can beincluded in blocks 202, 204 of a publicly-available distributed ledger200, which can be used with at least some of the examples disclosedherein. The ledger 200 can be locally stored and maintained by aplurality of, and in some examples all, nodes in the network, which iswhy it is referred to as distributed. As will be discussed below, when anew block 202, 204 is to be added to the ledger 200, it is distributedto all nodes in the network for inclusion in their local copy of theledger 200. In the event that two new blocks are identified by differentparties at similar times and are broadcast for inclusion in the ledger200, then the new block that is accepted into the ledger 200 will be theblock that has been added to the majority of the local copies of theledger 200, in particular by the majority of nodes at the time that thenext block is to be added. In this way, an accepted new block is definedby a consensus/majority of the nodes in the network. As will bediscussed below, an approximate time delay between successive blocks202, 204 being added to the ledger 200 can be defined by setting thecomputational complexity of operations that must be performed before anew block can be added.

FIG. 2 shows a first block 202 of data and a second block 204 of data.Each of the first and second blocks of data 202, 204 include informationrepresentative of one or more transactions 210, 212, and a cryptographichash value 206, 208. The cryptographic hash value 206, 208 is the resultof the application of a cryptographic hash function / algorithm that hasbeen applied to at least a part of a previous block in the ledger 200.Use of the cryptographic hash value 206, 208 can mean that the blocks202, 204 are linked together in a defined sequence, with each blocklinked to an earlier block by the hash. In this example, the ledger 200can be referred to as a block chain because it includes a plurality ofblocks of data, that are “linked together” to define a chain. Also, itis not possible to begin processing the second block 204 until the firstblock 202 has been accepted into the ledger 200 because determination ofthe hash value 208 for the second block 204 requires details of at leastpart of the first block 202.

As is known in the art, a hash algorithm can be applied to anarbitrarily-large amount of data (such as the previous block) in orderto provide a fixed-length hash value. The same fixed-length hash valuewill always result from the same arbitrarily-large amount of data. Overtime, new blocks of data are added to the end of the block chain inorder to publicly record new transactions. Each new block is guaranteedto come after the previous block chronologically because the new block'shash value cannot be calculated until the previous block is acceptedinto the ledger 200. Also, each block 202, 204 is computationallyimpractical to modify once it has been accepted into the ledger 200because every block 202, 204 after it would also have to be regenerated.

The cryptographic hash value 208 of the second block 204 can bedetermined by applying a hash function to:

-   at least a part of a previous block 202 in the ledger 200. The    previous block 202 may be the immediately preceding block. The part    of the previous block 202 may be the hash value 206 of the    immediately preceding block 202;-   the one or more transactions 212 (of the current block 204); and-   a cryptographic nonce value (not shown).

A third-party-processor that receives details of the one or moretransaction records 212, and intends to add a new block 204 to theledger 200, must first determine a cryptographic hash value 208 thatsatisfies one or more predetermined characteristics before the new block204 can be added to the ledger 200. That is, a new block 202, 204 cannotbe added to the ledger 200 until a valid cryptographic hash value 208has been determined. This process can be referred to as “mining” and thethird-party-processor may be referred to as a “miner”. The one or morepredetermined characteristics may be a specified number of leading zerobits, as is the case with the block chain that is associated withBitcoins. The third-party-processor can apply the hash algorithm usingdifferent cryptographic nonce values until a valid cryptographic hashvalue 208 with the predetermined characteristics is achieved. Inresponse to determining the valid cryptographic hash value 208 with thepredetermined characteristics, the third-party-processor can generate anew block 204 that includes at least the cryptographic hash value 208and the associated transaction records 212, and thenbroadcast/distribute the new block 204 to all nodes in the network forinclusion in their local copies of the ledger 200.

It will be appreciated that different third party processors maysimultaneously be trying to identify a new block based on differenttransaction records; that is, the transaction records identified forinclusion in the ledger 200 by each third party processor need notnecessarily be the same. As indicated above, in the event that twopotential new blocks are identified by different third party processorsat similar times, then the accepted new block is defined by a consensusof the nodes in the network. The computational requirements ofgenerating the hash value 208 with the predetermined characteristicsdictates that the next block cannot be added too soon after the previousblock so that there is sufficient time for the previous block to bedistributed throughout the network and a consensus to be determined asto which of the two blocks is to be accepted into the ledger 200.

As the processing power of computers increases over time, thecomputational complexity of arriving at a valid hash value 208 can beincreased by changing the required predetermined characteristics. Forexample, the number of leading zeros required of the hash value 208 canbe increased. In this way, the requirements of the cryptographic hashvalue 208 dictates a time delay between successive blocks 202, 204 beingadded to the ledger 200. The length of the time delay can be defined bythe computational complexity required to satisfy the requirements of thecryptographic hash value 208.

In some implementations, the third party processors may be rewarded forsuccessfully adding a block 202, 204 to the ledger. For example, one orboth of the energy resource and the energy-consuming-device may pay atransaction fee to the specific third party processor that successfullyadds an associated transaction record to the ledger 200. Such atransaction fee may only be paid upon confirmation that the transactionrecord has been added to a minimum number of locally-stored copies ofthe ledger 200. This can reduce the likelihood that a transaction fee ispaid to a third party processor that generates a candidate block foradding to the ledger 200, only for it to be dismissed because anotherblock, generated at a similar time, is accepted as valid by a majorityof third party processors.

The information representative of one or more transactions 210, 212 caninclude information derived from the transaction records discussed abovewith reference to FIG. 1.

The third party processors, in determining a new block for adding to theledger 200, may also perform verification processing on the transactionsin order to determine whether or not the transactions should be includedin the ledger 200. In one example, a verification routine can includecomparing any seemingly unverified transactions with transactions 210,212 that are already present in the ledger 200. This can prevent asingle transaction being recorded in the ledger 200 twice because theverification routine will fail for a transaction that is not alreadypresent in the ledger 200.

Another verification routine can include checking that an energyresource has sufficient available energy or capacity to satisfy atransaction, as will be discussed below.

Use of ledger, such as the one described with reference to FIG. 2, canprovide accurate visibility of how energy is exchanged between variousdevices. That is, the ledger can represent the real-world energycharacteristics of devices, and accurately display how thosecharacteristics change over time. In some examples, a distributed natureof the ledger, and a requirement for a consensus on the accuracy of theledger, can provide the required accuracy, and integrity in the data onthe ledger. Optionally, the integrity of the data on the ledger can befurther improved by implementing the ledger as a plurality of blocks ofdata, wherein each block of data comprises a cryptographic link to aprevious block in the ledger. Another option to improve the integrity ofthe data on the ledger is to only accept data onto the ledger after ithas successfully passed a verification routine.

A further advantage to using a publicly-verified distributed ledger isthat the information on the ledger can be considered trustworthy, forexample because transactions are only recorded if the ledger isindicative of the fact that the energy resource has the requisitecapacity to provide the amount of energy that has been offered, such aswithin a specified time widow.

Public verifiability of the encrypted ledger can also provide a basicmechanism for an energy “market”—users of energy resources can see howmuch resource is available within the (global) network and set a priceaccordingly; users of energy-consuming-devices can also see how muchresource is available within the network and the pricing, and can thendecide to buy or not buy according to need.

A publicly-verifiable, cryptographically-secured record of thetransaction, or acceptance of the offer, can serve as a non-repudiatablecommitment to the transaction by an energy-consuming-device. This couldbe a precursor to a separate payment mechanism that operatessubsequently, or could include an actual payment mechanism itself, ifthe public ledger also serves as an “energy currency” in similar mannerto Bitcoin.

A publicly-verifiable, cryptographically-secured transaction record orthe acceptance-message can in some examples be supplemented by a furthercryptographically-secured record of the actual energy transfer. That is,a cryptographically-secured “meter reading”. This could be provided bytamper-proof metering hardware, such as a smart meter. Any suchcryptographically-secured meter readings or records of actual completedenergy transfers can in some examples assist in a downstream paymentsystem.

A publicly-verifiable, cryptographically-secured ledger can bedata-mined by third parties for analysing trends in energy consumption,energy usage, potential demand, matching between energy resources andenergy-consuming-devices; pricing etc.

A publicly-verifiable, cryptographically-secured ledger can bedata-mined by third parties to verify that an energy resource hascapacity to provide the quantum of energy associated with an offer thatit has made, based on earlier transactions that are recorded on theledger. The transaction may only be recorded on the ledger if theverification is successful.

In some examples, the acceptance-messages and/or the offer-messagesdescribed above can also be included within the ledger of FIG. 2, oranother ledger. This or these ledgers can enable public visibility of“consumption” (for example booking or reservation) of available energyresource in a given time period, in some examples before the event ofenergy transfer or before the event of an energy-consuming-device going“on load” to an energy resource. By providing public visibility of thisacceptance, a market can be able to respond to remaining availableenergy resource capacity in the network, for example by re-pricing theremaining available energy resource.

Inclusion of offer-messages in the ledger of FIG. 2, or a differentledger, can enable a market to respond to available energy offers, andit can help to prevent disruptive offers from energy resources that arenot in fact capable of delivering because the ledger is publicly visibleand is secure in that historical information in the ledger cannot bereadily manipulated.

In some examples the acceptance-messages may be included with the ledgerof FIG. 2, or another ledger. The acceptance-message may include a timeframe for completing the energy transaction, which is also recorded inthe ledger. On sending of an offer-message by an energy resource 102,104 or receipt of an offer-message by an energy consuming device, theledger of acceptance-messages may be used to determine whether saidoffer-message comprises a valid offer and therefore control whether ornot said offer-message can be accepted with an acceptance-message. As apublic, distributed ledger is used to verify offers made by energyresources 102, 104 it reduces the risk or removes the risk of an energyresource committing to offers of energy that cannot be fulfilled, suchas within the specified time-window. Accordingly, an energy resource maybe prevented from offering more energy than they can supply at aparticular time or in a particular time window, as thepublicly-verifiable, cryptographically-secured ledger of acceptancemessages can be used to control the issue of offer-messages by theenergy resource via the network; the acceptance of offer-messages by theenergy consuming devices; the issue of acceptance-messages by the energyconsuming devices; or the processing of acceptance-messages by the thirdparty.

For example, if the third party refuses to process the acceptancemessage into the ledger because the offer of energy could not befulfilled by the energy resource, an attempt to physically exchangeenergy may be prevented because a record of the acceptance-message isnot present in the publically verifiable, cryptographically-securedledger of acceptance messages.

Further, a public, cryptographically-secured distributed ledger ofenergy transactions may also be used to control the issue or acceptanceof offer-messages. In particular, an energy consuming device or thirdparty or energy resource may compare a public ledger ofacceptance-messages and a public record of energy transactions todetermine which energy transfers have been accepted but not fulfilled todetermine an outstanding transaction parameter. The sending ofoffer-messages or acceptance of offer messages as valid or the sendingof acceptance-messages may be controlled by the outstanding transactionparameter, which may ensure that energy resources do not over commit tothe supply of energy that they may not be able to fulfil.

The use of the publicly-verifiable, cryptographically-secured ledgers(of energy transactions, offer-messages and/or acceptance-messages) tocontrol the issue of offer-messages by the energy resources, theacceptance of offer-messages as valid by the energy consuming devices,the issue of acceptance-messages by the energy consuming devices, therecording of transaction-messages in a transaction ledger by either theenergy consuming device, energy resource or third party, and/or thephysical energy exchanges may provide for a more secure system, asdiscussed in more detail below.

Returning to FIG. 1, one or more energy-resource-managing-entities (notshown) may store details of authorised energy-resources 102, 104. Anenergy-resource-managing-entity can store a database that includesdetails of one or more of:

-   an identifier of an energy resource 102, 104;-   a power-rating of the energy resource 102, 104; and-   in some examples, an amount of energy that the energy resource 102,    104 can make available for supplying to an energy-consuming-device    106, 108.

A publicly-available distributed ledger may be automatically updatedwhen changes are made to an energy-resource-managing-entity's database.For example, when a new energy resource 102, 104 is commissioned or itspower-rating changes, the new information may be automaticallytransferred onto the publicly-available distributed ledger. In someexamples, this can be implemented by the energy-resource-managing-entitysending an energy-resource-update-message for public verification in thesame way as transaction records, as discussed above.

Transacting Energy Generating Capacity (Power)

In some examples, the energy resource 102, 104 may offer some or all ofits energy generating capacity. The publicly-available distributedledger may include an entry that indicates the maximum energy generatingcapacity (power-rating) of each energy resource 102, 104. This entry maybe made when an energy resource 102, 104 is commissioned, for example. Asubsequently issued transaction record may therefore be publiclyverifiable because any third party 118 can process the ledger todetermine whether or not the energy resource 102, 104 has sufficientunreserved capacity to supply the energy required to satisfy thetransaction. The acceptance by an energy-consuming-device 106, 108 ofsuch an offer may be publicly recorded on the publicly-availabledistributed ledger so that it can be processed in order to verify anysubsequent transactions involving the energy resource 102, 104 beforethe subsequent transactions are recorded in the ledger.

In some examples, the ledger (optionally each block in the ledger)comprises a balance of available energy-generating capacity (power)and/or an energy-available-value for each energy resource 102, 104. Thethird party 118 can then determine whether or not an energy resource102, 104 associated with the transaction has sufficient availableenergy-generating capacity (power) or available energy to perform thetransaction by comparing at least part of the transaction record withthe balance of available energy-generating capacity orenergy-available-value for the energy resource 102, 104 that isassociated with the transaction.

In one example, Party A is an energy resource, Party B is anenergy-consuming-device, and Party C is another energy-consuming-device.Party A has a 10 kW capacity (power-rating) fuel cell stack, which isrecorded on the ledger. This initial adding of the power-rating of PartyA to the ledger may be performed in an authorised or authenticated way.At some time in the future, Party A sells 7 kW of capacity to Party B,and a corresponding transaction record is generated. This transactionrecord can be publicly verified with reference to the ledger becauseParty A is shown as having enough capacity available. Therefore thetransaction of 7 kW from Party A to Party B is recorded on the ledger.Then, at some future point in time whilst Party B has reserved 7 kW ofParty A's capacity, Party A tries to sell 4 kW to Party C. When thetransaction record for this transaction is made available for publicverification and inclusion in the ledger, the transaction is notverified because the verification routine will recognise from the ledgerhistory that Party A only has 3 kW capacity available. Therefore thetransaction to Party C will not be recorded on the ledger because it hasnot successfully passed the verification routine.

In some examples, either the energy resource 102, 104 or theenergy-consuming-device 106,108 may submit a further transaction recordto end a transaction. In the above example, this may involve Party Btransferring the 7 kW capacity back to Party A, optionally for no cost.

As discussed above, transaction records can in some examples include anend time for a transaction, after which an energy-consuming-deviceshould relinquish its energy consumption. In which case, the publicverification will also require a check of the power-rating availableduring specific periods of time defined by a proposed transaction, andalso earlier recorded transactions.

Transacting Available Energy

In some examples, the energy resource 102, 104 may offer some or all ofits available energy. If the energy resource 102, 104 is or includes afuel cell stack, then the amount of available energy may be defined bythe amount of hydrogen fuel that is available to the fuel cell stack. Inthis example, the system may use a public ledger that is not necessarilypublicly-verifiable or encrypted. A purpose of the public ledger is tomake publicly available all transactions of energy in a network. Theacceptance by an energy-consuming-device 106, 108 of an offer to supplyenergy is recorded on the public ledger so that it can be processed whenverifying any subsequent transactions involving the energy resource 102,104. In the same way as discussed above, the energy resource 102, 104and/or the energy-consuming-device can send a transaction record forincluding in the public ledger. A transaction record can be sent beforeand/or after the energy is exchanged.

A post-energy-exchange-transaction record may include one or more of thefollowing types of information, which can be included on the publicledger:

-   an identifier of a corresponding pre-energy-exchange-transaction    record, which can enable the two records to be linked together in    the ledger;-   an identifier of the energy resource 102, 104 that delivered the    energy;-   an identifier of the energy-consuming-device 106, 108 that consumed    the energy;-   a quantum of energy that was agreed to be supplied, which may be:

an amount of energy; or

an amount of generating capacity of the energy resource 102, 104;

-   a quantum of energy that was actually supplied, which may be:

an amount of energy that was supplied; or

an amount of generating capacity of the energy resource 102, 104 thatwas used by the energy-consuming-device 106, 108;

-   a difference between the quantum of energy that was agreed to be    supplied, and the quantum of energy that was actually supplied;-   a start time, an end time, and/or a time window during which the    quantum of energy that is to be delivered;-   an agreed price;-   an amount of money that was actually paid;-   a difference between the agreed price and the amount of money that    was actually paid;-   a score for the energy resource 102, 104, for example a mark out of    10 that has been provided by a user of the energy-consuming-device    106, 108 after the energy has been supplied; and-   a score for the energy-consuming-device 106, 108, for example a mark    out of 10 that has been provided by a user of the energy resource    102, 104 after the energy has been supplied.

The quantum of energy that was actually supplied may be provided by asmart meter, such as metering application software 119 associated witheither or both of the energy resource 102, 104 and theenergy-consuming-device 106, 108. Such information may becryptographically-secured.

A public ledger that includes some or all of the above information canprovide another basic mechanism for an energy “market”—users ofenergy-consuming-devices 106, 108 can monitor details of previousenergy-supply-transactions that have been engaged in by specific energyresources 102, 104 within the (global) network and determine from whichof the energy resources they wish to source their energy for a newtransaction. Also, such an energy market can enable energy resources102, 104 to set a price of energy for their future transactions. It willbe appreciated that other advantages of the publicly verifiableencrypted ledger that are discussed above can also be achieved by thepublic ledger discussed in this example.

Examples disclosed herein can relate to a system for monitoring energytransactions and providing a transparent platform for people to engagein such energy transactions. This can improve visibility of what energyexchanges are really taking place, and can also define standard protocolfor monitoring and recording transactions / energy exchanges.

FIG. 3 shows an exemplary embodiment of another energy resource network300, which includes Device A 302, Device B 304, Device C 306 and DeviceD 308. The devices are in data communication with each other through theinternet 320, which is an example of a data exchange network.

Consider that Device A 302 has surplus energy, and Device B 304 hasdepleting energy. Each device has an associated unique identifierthrough which it can transact over a secure area of the Internet (whichis illustrated schematically as network 320 in FIG. 3). Depending uponvarious parameters such as location, time of year, geographical demand,etc. Device A 302 can fix up a price for a unit of energy. Device B 304can see the price set by Device A 302 and can send a request for buying‘n’ units of energy. If agreed, an equivalent amount of money istransferred from Device B 304 to Device A 302. The transaction can be inany standard currency or cryptocurrency like Bitcoin.

This transaction can be recorded in a block that will then be added toan energy block chain 330. The transaction details can includeinformation such as the identity of the parties involved, amount ofenergy purchased, amount of energy left with Device A 302 and Device B304, etc.

Now consider two other devices, Device C 306 and Device D 308, which arealso energy deficient. Device A 302 has an option to sell energy toDevice B 304, Device C 306, Device D 308, or all. There can now be anauction to obtain the energy from Device A 302 where the highest bidderwins the auction. There can be a limit on maximum bid one can raise.Again such a transaction can be recorded on the energy block chain 330.

Each device 302, 304, 306, 308 can have two associated wallets (similarto Bitcoin wallets), an energy wallet 332 keeping a count of energy anda currency wallet 336 keeping a count of currency. These wallets 332,336 can be linked with two respective ledgers on the Internet 320; theenergy block chain 330 and a currency block chain 334.

A monitoring station 338 can also be connected to the internet 320, suchthat it can track the transactions on the energy and currency blockchains 330, 334. In this way, the monitoring station 338 can analyse thetrend in energy consumption and data related to energy usage habits ofthe users. Such information can be used to seek potential energyproviders, buyers, match right users, determine maximum pricing, etc.

Examples described herein relate to a decentralised energy exchange. Adevice with spare energy can directly engage in a transaction with arequesting power deficient device to provide requested units of energy.The transaction can be recorded in a public ledger. Several blocks ofsuch transactions can form an energy block chain. That is, a block chainof energy exchange can be provided.

Energy transactions can be recorded and managed in a new way, forexample by a decentralised transaction platform with central monitoring.Various advantages include:

-   No, or reduced, dependency on a central energy provider;-   Option of choosing a preferred energy provider anytime;-   Flexibility and transparency in payment;-   No regulation on prices;-   Transparent record of transactions;-   Only pay when using (no need to pay bills when you are not at home    for long time); and-   Generation of rich user data for various purposes.

Examples disclosed herein can enable energy producing/consuming devicesto engage in energy sharing transactions through a transparent anddecentralised platform. Similar to Bitcoins transactions being logged ina block chain (which is a public ledger), all energy transactions can berecorded in an energy block chain. If an energy source is a fuel cellstack, then the amount of energy (KWhs) can be limited by a lifespan ofthe stack, or an amount of fuel available, or an amount of energygenerating capacity available. This can be analogous to limited Bitcoinsin circulation. This limited availability of resource can be used todictate the rules of such transactions, such as pricing and amount ofenergy available in a set period of time. Since the energy block chainwill have a record of all energy transactions and the devices involved,it can be used for driving a whole ecosystem of peer to peer energydistribution.

In accordance with the various systems and examples discussed above, theenergy resource network may be applied to a range of application,including, but not limited to, residential solar panels, networkoperator energy trading, wall plugs, and fuel cell systems.

Residential solar panels can be installed and act as an energy resource104 consistent with energy network embodiments described herein. Forexample, solar panels can generate energy to act as an energy resource,and the produced energy is delivered to the energy resource networksimilar to the processes described with respect to FIGS. 1-3. Inembodiments, the solar panels can be provided with a computing device,having a processor and metering app to determine the amount of energyproduced. In examples, the produced energy can be consumed, in part, byone or more devices, e.g., metering devices associated with the solarpanel, and excess energy can be measured and subsequently delivered toone or more energy consuming devices. Energy consuming devices caninclude storage units, electrical lighting, heating and cooling devices,and other residential/household devices, and generally provide power tothe residential unit upon which the solar panels were installed.

The metering apps on the solar panel can assist in determining one ormore characteristics of energy delivery, such as a time of delivery,where to deliver the energy, which device to deliver the energy, and howmuch energy to deliver. In accordance with embodiments herein, themetering app can send characteristics of the generated energy to anetwork 120, which analyses the production and consumption of theplurality of energy resources and energy consuming devices in thenetwork. For example, the network can analyse data from each solar panelon the residential unit, or on a plurality of residential units, e.g., aneighbourhood. The network, which is also in communication with one ormore energy consuming devices, can determine energy demands and deliverytiming. For example, energy demands for electricity may be higher in theevenings than during the day or night time. The network can determinethe proper, and even optimum time of delivery, in view of currentlyavailable energy, and peak times of energy generation. Consequently, thenetwork and third party nodes work in unison to process energytransaction and deliver energy from the resource to the energy consumingdevices.

The various network determinations can occur through the use of one ormore third party nodes 118, in which energy transactions have and willbe recorded through the publicly-available distributed ledger. Asdiscussed herein, the transaction records can be publicly available andprovide information regarding when sufficient energy is available forcertain transactions and match up resources and consumers to optimizedelivery and consumption.

In an embodiment, network level energy trading can occur, wherein aplurality of district network operators can form a web network forenergy trading. In such an embodiment, a plurality of energy resourcenetworks can be combined to form an expanded network through whichenergy can be traded and distributed. Each district network operator maybe responsible for determining the overall energy consumption andrequirements of its network, as well as communicate with other districtnetwork operators to negotiate, deliver, and receive energy inaccordance with the supply and demand of each network. This can beparticularly useful in expanding the reach of each network and ensuringan efficient delivery, cost, and use of each network and its components.

In another example embodiment, which can be utilized in accordance withthe residential solar panels discussed above, a wall plug can beintroduced into the energy resource network to either or both provideinformation about energy consumption, and assist in monitoring suchconsumption. For example, the wall plug can comprise an energy monitor,which can record the amount of energy withdrawn by one or more devices,i.e., energy consuming devices, connected to the plug. The energymonitor can further deliver information to network 120 and includedetails regarding the energy transaction. Such details include but arenot limited to the amount of energy (kwH) withdrawn, a time and/orlength of withdrawal, the type of energy consuming device, etc.Accordingly, the wall plug can act as an intermediary device to promoteefficient energy transactions and consumption information.

In embodiments, the energy monitor can further compile and analysepricing data. For example, available energy and energy prices canfluctuate throughout the day. For certain household devices, which mayalways be “plugged in”, or consuming energy at a low level state, evenwhen powered off, e.g., televisions and computers, it may be desirableto cut off power during periods of low energy demand, or evenunnecessary demands. In another example, consumers may desire that highenergy consuming devices, such as an A/C unit, be limited during peakpricing periods, or periods where there is less energy available fordistribution. The energy monitor can analyse such pricing andconsumption trends to determine an optimal, and cost efficient, deliveryschedule.

The wall plug embodiment may be particularly desirable in that it actsas an intermediary between the energy resources and energy consumingdevices, and can provide energy consumption and availability datarelated to both aspects of the energy resource network. In embodiments,the wall plug is in communication with the server 120 and consequentlythe third party nodes upon which data analysis is completed.

Similarly, energy resource networks can be utilized with fuel cellsystems comprising one or more fuel cell stacks. For example, aplurality of fuel cell stacks can each be monitored similar to the solarpanel and wall plug embodiments discussed above. Excess available energycan be monitored and distributed to various energy consuming devices

Each of the solar panel, wall plug, and fuel cell devices can beincorporated into one or more embodiments of the energy resourcenetworks discussed herein. In various embodiments, these products can beutilized in different validation mechanisms, improve failure toleranceconcerns of the system, and increase monetary value and consumption.

For example, when controllers dynamically receive availability messagesfrom an energy resource and adjust the resulting offer to energyconsumers, the overall system becomes more fault tolerant. In a networkof energy resources and energy consuming devices linked by a controller,e.g., similar to those discussed with respect to solar panel and wallplug embodiments, the threshold for the energy consuming devices toaccept offer messages from the controller can be tuned to ensure thatthe combined energy demand never exceeds the network's available energyresource.

In an example wherein an energy supplier or resource goes off-line dueto climactic or other conditions that lead to a decrease in availableenergy (e.g., solar panels are not generating energy on a cloudy, rainyday, nightfall, or a physical device failure), the controller can modifythe energy offer messages to reflect the relative scarcity of theavailable energy quanta. This can be done, for example, by reducing thequantity of offer messages sent by the controller, of by increasing themonetary value associated with the energy quanta in the offer message.The thresholds of the energy consumers may constrain some the consumersfrom purchasing the energy quanta in this new state. This ensures thatthe network supplies energy to the most critical energy consumers asdefined by the thresholds of each consumer.

In the example of a residential setting where the energy providers maybe a renewable energy source, such as rooftop photovoltaic panels, anelectricity grid and a domestic battery system. The energy consumers maybe an alarm system, an air conditioning system, etc. Accordingly, thethresholds of each can be set so that upon a reduced availability ofenergy, the threshold for the air conditioning system to accept anavailability offer message from the controller device is not met, whilethe threshold of the alarm system is indeed met. As such, varioussystems can be prioritized based on one or more of energy demands,energy availability, and consumer preference.

Such prioritization and fault tolerances can apply across a wide rangeof embodiments. For example, a fuel cell system. If one or more fuelcells become degraded, the system can ensure that safety criticalconsumers such as fans, which ensure hydrogen dilution to preventexplosive mixtures as a result of exhaust are prioritized over pumps,which provide oxidant to the fuel cell stack.

Each of the above examples can be utilized with various validationmechanisms used by the third party node and ledger. That is, energyresource and consumption transactions can be recorded and confirmedthrough methods utilizing proof of work, proof of stake, and proof ofauthority. In a proof of work model, various nodes are competing tovalidate transactions for addition onto the public ledger. Sincenumerous nodes are tackling the same computational problem, thecomputational cost can be extremely high and efficiency of this methodcan be low. In a proof of stake model, a single node is selected tocreate a new entry in the publicly available ledger, depending on theamount (“stake”) invested by the node. Accordingly, the computationalcost of such a system is less than the proof of work model. In a proofof authority model, transactions may be completed based on a particularidentity. Given that transactions between energy resources and energyconsuming devices are determined and recorded on a publicly availableledger, the efficiency of such transactions greatly depend upon theefficiency of the recordation of such transactions, and some validationmethods may be more desirable than others, depending on the embodimentand the size of the energy resource network. For example, while thesolar panels may utilize a proof of work model, a proof of stake orproof of authority validation model can be preferred due to the lowerenergy and computational cost required compared to the proof of workmodel.

It will be understood that various aspects or details of theinvention(s) may be changed without departing from the scope of thedisclosure and invention. It is not exhaustive and does not limit theclaimed inventions to the precise form disclosed. Furthermore, theforegoing description is for the purpose of illustration only, and notfor the purpose of limitation. Modifications and variations are possiblein light of the above description or may be acquired from practicing theinvention. The claims and their equivalents define the scope of theinvention(s).

What is claimed:
 1. A solar panel energy system comprising: a pluralityof solar panels each capable of producing and delivering a quantum ofenergy and comprising a computing device having a processor configuredto determine a quantum of energy available for supply and generate anoffer message indicative of the quantum of energy available; a pluralityof energy-consuming-devices each capable of accepting the quantum ofenergy from the solar panels and comprising a processor configured todetermine an available energy capacity and energy request message, theenergy request message being cryptographically-secured and recorded onthe publicly-available distributed ledger; a monitoring station in datacommunication with the plurality of solar panels and the plurality ofenergy-consuming devices, the monitoring station managing thepublicly-available distributed ledger, configured to at least: monitoroffer messages from the plurality of solar panels and energy requestmessages from the plurality of energy-consuming-devices; analyze energyconsumption within the solar panel energy system; and facilitatedelivery of offer messages and energy request messages between one ormore solar panels and energy-consuming-devices; wherein, based on thedelivered offer message or energy request message, the respective one ormore solar panels or energy-consuming-devices execute a transaction toexchange the quanta of energy available, and a currency amount, and theexecuted transaction is cryptographically-secured and recorded on thepublicly-available distributed ledger.
 2. The solar panel energy systemof claim 1, further comprising a plurality of third party nodes, eachconfigured to locally store and maintain the publicly-availabledistributed ledger.
 3. The solar panel energy system of claim 2, whereinthe third party nodes are each configured to identify, and storelocally, a correct version of the publicly-available distributed ledgeras the version of the publicly-available distributed ledger that is mostcommonly stored on the plurality of third party nodes.
 4. The solarpanel energy system of claim 1, further comprising a third party nodeconfigured to: perform a verification routine on one or morecryptographically-secured transaction records; and, only add the one ormore cryptographically-secured transaction records to thepublicly-available distributed ledger if the verification routine issuccessful.
 5. The solar panel energy system of claim 4, wherein thethird party node is configured to perform the verification routine byprocessing the publicly-available distributed ledger in order todetermine whether or not an energy resource associated with thetransaction has sufficient energy to perform the transaction.
 6. Thesolar panel energy system of claim 4, wherein the third party node isconfigured to perform the verification routine by processing thepublicly-available distributed ledger in order to determine whether ornot an energy resource associated with the transaction has sufficientenergy-generating capacity available to perform the transaction.
 7. Thesolar panel energy system of claim 6, wherein the publicly-availabledistributed ledger comprises a balance of available energy-generatingcapacity or energy available for each energy resource, and wherein thethird party node is configured to determine whether or not an energyresource associated with the transaction has sufficient availableenergy-generating capacity or energy to perform the transaction bycomparing at least part of the transaction record with the balance ofavailable energy-generating capacity or energy available for the energyresource associated with the transaction.
 8. The solar panel energysystem of claim 1, wherein the publicly-available distributed ledgercomprises a plurality of blocks of data, wherein each block of datacomprises information representative of: one or more transactionrecords; and, a cryptographic hash value of at least a part of aprevious block in the ledger.
 9. The solar panel energy system of claim8, wherein the publicly-available distributed ledger comprises a blockchain.
 10. The solar panel energy system of claim 8, further comprisinga third party node configured to: process one or morecryptographically-secured transaction records; and, determine a newblock of data for the publicly-available distributed ledger bydetermining the cryptographic hash value by applying a hash algorithm toat least a part of a previous block in the publicly-availabledistributed ledger.
 11. The solar panel energy system of claim 7,wherein the third party node is configured to determine thecryptographic hash value by applying the hash algorithm to: at least apart of an immediately preceding block in the ledger; the one or moretransactions; and, a cryptographic nonce value.
 12. The solar panelenergy system of claim 11, wherein the third party node is configuredto: generate cryptographic hash values for a plurality of differentcryptographic nonce values; identify a determined cryptographic hashvalue as valid if it satisfies one or more predeterminedcharacteristics; and, broadcast a new block of data, comprising thevalid cryptographic hash value, for inclusion in the publicly-availabledistributed ledger.
 13. The solar panel energy system of claim 10,wherein the part of the immediately preceding block in the ledger is thecryptographic hash value of the immediately preceding block in theledger.
 14. The solar panel energy system of claim 1, wherein one ormore of: the issue of offer-messages by the energy resource via thenetwork; an acceptance of offer-messages by the energy consumingdevices; an issue of acceptance-messages by the energy consuming devicesin acceptance of an offer-message; processing of acceptance-messages bya third party for inclusion in a cryptographically-secured,publicly-available distributed ledger of acceptance-messages; and, aphysical exchange of energy between the energy resource and the energyconsuming device are controlled based on a cryptographically-secured,publicly-available distributed ledger of acceptance-messages and acryptographically-secured, publicly-available distributed ledger oftransactions.
 15. The solar panel energy system of claim 1, wherein theenergy-resource-processors are configured to automatically issue anoffer-message if an available amount of energy, or an available capacityfor providing energy, exceeds a high-energy-threshold level.
 16. Thesolar panel energy system of claim 1, wherein theenergy-consuming-processors are configured to automatically accept orreject an offer-message by comparing one or more pieces of informationof the offer-message with one or more predetermined acceptance-criteria.17. The solar panel energy system of claim 1, wherein the transactionrecord comprises information representative of an acceptance of thequantum of energy and/or a debit of an account associated with theenergy-consuming-device.
 18. The solar panel energy system of claim 1,wherein each offer-message comprises information representative of oneor more of: a quantum of energy; a generating capacity of the energyresource; a time window; a price.
 19. The solar panel energy system ofclaim 1, wherein the energy-resource-processor of each energy resourceis configured to issue a cryptographically-secured offer record forinclusion within a publicly-available distributed ledger.
 20. The solarpanel energy system of claim 1, further comprising a metering apparatusconfigured to generate a cryptographically-secured transaction record ofmetered units of energy transferred between an energy resource and anenergy-consuming-device counterparties.