Preventing an incorrect transmission of a copy of a record of data to a distributed ledger system

ABSTRACT

An incorrect transmission, of a record of data to a distributed ledger system, can be prevented. A first signal can be received. The first signal can include a first instruction to cause the record to be transmitted to the system. One or more items of information in the record can be determined. A delay of time to be elapsed, before a transmission of the record to the system, can be set in response to a receipt of the first signal and a determination of the one or more items. The transmission of the record to the system can be caused to occur after the delay has elapsed. The transmission of the record to the system can be prevented in response to a receipt of a second signal before the delay has elapsed. The second signal can include a second instruction that supersedes the first instruction.

BACKGROUND

A blockchain can be a database that can be used to ensure anauthenticity of a record of data. The blockchain can be organized as asequence of blocks. A block can be added to the blockchain after adiscrete duration of time has elapsed since a previous block was addedto the blockchain. A block can include one or more records of datareceived by an electronic ledger system within the discrete duration oftime since the previous block was added to the blockchain. A currentblock can include a hash of the previous block, a timestamp, and the oneor more records of data that are a subject of the current block. Thehash of the previous block can be a cryptographic hash. Another hash canrepresent the one or more records of data that are the subject of thecurrent block. The other hash can be, for example, a merkle tree roothash. Because a subsequent block can include a hash of the currentblock, etc., an alteration of a record of data included in theblockchain can be determined by reference to hashes included insubsequent blocks.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are included to provide a furtherunderstanding of the disclosed technologies, are incorporated in andconstitute a part of this specification. The drawings also illustrateimplementations of the disclosed technologies and together with thedetailed description serve to explain the principles of implementationof the disclosed technologies. No attempt is made to show structuraldetails in more detail than may be necessary for a fundamentalunderstanding of the disclosed technologies and the various ways inwhich it can be practiced.

FIG. 1 is a diagram illustrating an example of an environment forpreventing an incorrect transmission of a copy of a record of data to anelectronic network, according to the disclosed technologies.

FIG. 2 is a diagram illustrating an example of the record of data,according to the disclosed technologies.

FIG. 3 is a diagram illustrating an example of a plurality of settingsof durations of delays of time, according to the disclosed technologies.

FIG. 4 is a diagram illustrating an example of items of information inthe record of data and portions of a duration of a delay of time,according to the disclosed technologies.

FIG. 5 is a flow diagram illustrating an example of a method forpreventing the incorrect transmission of the copy of the record of datato the electronic network, according to the disclosed technologies.

FIG. 6 is a flow diagram illustrating an example of a method fordetermining the duration of the delay of time, according to thedisclosed technologies.

FIG. 7 illustrates an example computing device suitable for implementingconfigurations of the disclosed technologies.

DETAILED DESCRIPTION

As used herein, a statement that a component can be “configured to”perform an operation can be understood to mean that the componentrequires no structural alterations, but merely needs to be placed intoan operational state (e.g., be provided with electrical power, have anunderlying operating system running, etc.) in order to perform theoperation.

A blockchain can be a database that can be used to ensure anauthenticity of a record of data. The blockchain can be organized as asequence of blocks. A block can be added to the blockchain after adiscrete duration of time has elapsed since a previous block was addedto the blockchain. A block can include one or more records of datareceived by an electronic ledger system within the discrete duration oftime since the previous block was added to the blockchain. A currentblock can include a hash of the previous block, a timestamp, and the oneor more records of data that are a subject of the current block. Thehash of the previous block can be a cryptographic hash. Another hash canrepresent the one or more records of data that are the subject of thecurrent block. The other hash can be, for example, a merkle tree roothash. Because a subsequent block can include a hash of the currentblock, etc., an alteration of a record of data included in theblockchain can be determined by reference to hashes included insubsequent blocks.

The electronic ledger system can operate the blockchain. The electronicledger system can include an electronic device or, alternatively, caninclude several electronic devices disposed in a peer-to-peer network.An electronic ledger system in which several electronic devices aredisposed in a peer-to-peer network can be referred to as a distributedledger system. Each electronic device in a distributed ledger system canbe referred to as a node of the distributed ledger system. A distributedledger system can include one or more of a public distributed ledgersystem or a private distributed ledger system. A private distributedledger system can also be referred to as a permissioned distributedledger system, a consortium distributed ledger system, or a hybriddistributed ledger system. In a private distributed ledger system, anentity that controls the private distributed ledger system can vetentities that operate nodes in the private distributed ledger system.Additionally, a private distributed ledger system can allow an entity tokeep some information private such as, for example, credentialinformation.

In a distributed ledger system, each node can save a copy of theblockchain. In response to a block being added to the blockchain, eachnode can update its copy of the blockchain. A consensus algorithm canreceive, from the nodes, respective copies of the blockchain. Theconsensus algorithm can determine a consensus about which of therespective copies of the blockchain is a correct copy of the blockchain.In response to a determination of the consensus, the nodes can updatetheir respective copies of the blockchain to be the correct copy of theblockchain. Because a distributed ledger system can use a consensusalgorithm to determine the correct copy of the blockchain, an alterationof a record of data included in a copy of the blockchain stored at anode of the distributed ledger system can be prevented from being deemedto be the correct copy of the record of data. In this manner, adistributed ledger system can be used to ensure an authenticity of arecord of data.

Unfortunately, operations performed by a distributed ledger system toupdate copies of the blockchain, to determine the consensus, and toupdate respective copies of the blockchain to be the correct copy of theblockchain can consume a substantial amount of time and energy. Forexample, an average Bitcoin transaction on the Bitcoin.org blockchainconsumes about 215 kilowatt-hours of energy. For at least this reason,it is important to prevent an incorrect transmission of the copy of therecord of data to the distributed ledger system. Particularly, in thecase of a record of data associated with a transaction between entities,an incorrect transmission of the copy of the record of data to thedistributed ledger system can cause one or more errors in thetransaction to the detriment of one or both of the entities associatedwith the transaction.

The disclosed technologies can prevent an incorrect transmission of acopy of a record of data to a distributed ledger system. A first signalcan be received. The first signal can include a first instruction tocause the copy of the record of data to be transmitted to thedistributed ledger system. One or more items of information in therecord of data can be determined. A delay of time to be elapsed, beforea transmission of the copy of the record of data to the distributedledger system, can be set in response to a receipt of the first signaland a determination of the one or more items of information. Thetransmission of the copy of the record of data to the distributed ledgersystem can be caused to occur after the delay of time has elapsed. Thetransmission of the copy of the record of data to the distributed ledgersystem can be prevented in response to a receipt of a second signalbefore the delay of time has elapsed.

FIG. 1 is a diagram illustrating an example of an environment 100 forpreventing an incorrect transmission of a copy of a record of data to anelectronic network 102, according to the disclosed technologies. Theenvironment 100 can include, for example, the electronic network 102 anda system 104 for preventing an incorrect transmission of a copy of arecord of data to the electronic network 102. The record of data can beassociated with an item for which an authentication of a copy isimportant. For example, the record of data can be associated with atransaction, a will or testament, a document related to a qualityassurance program, a document to be used as evidence in a judicialproceeding, or the like. The electronic network 102 can include adistributed ledger system. If the record of data is associated with atransaction, then, additionally or alternatively, the electronic network102 can include one or more of an Automated Clearing House network, apayment rail network, another electronic ledger system, or the like. Ifthe electronic network 102 is a distributed ledger system, then therecord of data can be included, by the distributed ledger system, in ablock to be added, by the distributed ledger system, to a blockchain.

The system 104 can be configured to receive 106 a a first signal. Thefirst signal can include a first instruction to cause the copy of therecord of data to be transmitted to the electronic network 102.

The system 104 can be configured to determine one or more items ofinformation in the record of data.

The system 104 can be configured to set, in response to a receipt of thefirst signal and a determination of the one or more items ofinformation, a delay of time to be elapsed before a transmission of thecopy of the record of data to the electronic network 102.

The system 104 can be configured to cause, after the delay of time haselapsed, the transmission of the copy of the record of data to theelectronic network 102.

The system 104 can be configured to prevent, in response to a receipt ofa second signal before the delay of time has elapsed, the transmissionof the copy of the record of data to the electronic network 102. Thesecond signal can include a second instruction that supersedes the firstinstruction.

In a first optional implementation of the disclosed technologies, therecord of data can be associated with a transaction. For example, theone or more items of information can include one or more of an amount ofthe transaction, an identification of a transferor account, or anidentification of a transferee account. Additionally, for example, theone or more items of information can further include one or more of anidentification of the transaction, an identification of an entity thatinitiated the transaction, or one or more identifications of one or moreentities that approved the transaction.

FIG. 2 is a diagram illustrating an example of the record of data,according to the disclosed technologies. For example, the one or moreitems of information can include the amount of the transaction($700,000), the identification of the transferor account (ESB4321098),and the identification of the transferee account (FNB765432). Forexample, the one or more items of information can further include theidentification of the transaction (98765), the identification of theentity that initiated the transaction (Fran Dunlop), the identificationof the first entity that approved the transaction (Alice Jones), andidentification of the second entity that approved the transaction(Charlie Sanders).

Returning to FIG. 1, in a second optional implementation of thedisclosed technologies, the first signal can include a plurality offirst signals and the first instruction can include a plurality of firstinstructions. For example, the system 104 can be configured to receive106 a and 106 b the plurality of first signals from a device 108 a and adevice 108 b. In the second optional implementation, the system 104 canbe further configured to determine that a count of the plurality offirst signals is greater than a threshold. In the second optionalimplementation, the system 104 can be configured to set, in response tothe count being greater than the threshold, the delay of time.

In a third optional implementation of the disclosed technologies, thesystem 104 can be configured to receive 106 a the first signal from thedevice 108 a. The device 108 a can be associated with an entity that isauthorized to cause the copy of the record of data to be transmitted tothe electronic network 102. Alternatively, for example, the system 104can be configured to receive 110 a and 112 the first signal from thedevice 108 a via one or more intermediate devices 114.

In the third optional implementation, the receipt of the second signalcan include a receipt of the second signal from the device 108 a.Alternatively, the receipt 116 of the second signal can include areceipt of the second signal from a device 118. The device 118 can beunassociated with the entity that is authorized to cause the copy of therecord of data to be transmitted to the electronic network 102.

In a fourth optional implementation of the disclosed technologies, thereceipt of the second signal can include a receipt of the second signalfrom an operation 120 performed by the system 104.

In a fifth optional implementation of the disclosed technologies, thesystem 104 can be further configured to receive the copy of the recordof data. For example, the system 104 can be configured to receive 106 athe copy of the record of data from the device 108 a. The device 108 acan be associated with the entity that is authorized to cause the copyof the record of data to be transmitted to the electronic network 102.Alternatively, for example, the system 104 can be configured to receive122 the copy of the record of data from a device 124. The device 124 canbe unassociated with the entity that is authorized to cause the copy ofthe record of data to be transmitted to the electronic network 102.

In a sixth optional implementation of the disclosed technologies, thesystem 104 can be further configured to determine, in response to thedetermination of the one or more items of information, a duration of thedelay of time.

For example, the system 104 can be configured to determine the durationof the delay of time by selecting the duration of the delay of time froma plurality of settings of durations of delays of time. FIG. 3 is adiagram illustrating an example of a plurality of settings of durationsof delays of time, according to the disclosed technologies. For example,with reference to FIGS. 1 through 3, the system 104 can be configured todetermine the duration of the delay of time by selecting the duration ofthe delay of time (1 day (based upon the entity being a transferor in atransaction ($700,000) of less than $1 million) from the plurality ofsettings of durations of delays of time.

Alternatively, for example, the system 104 can be configured todetermine the duration of the delay of time by calculating a sum ofportions of the duration of the delay of time determined from items ofinformation in the record of data. For example, the system 104 can beconfigured to determine the one or more items of information by: (1)determining a first item of the one or more items of information, (2)determining a second item of the one or more items of information, etc.Then, the system 104 can be configured to determine the duration of thedelay of time by: (1) determining, in response to a determination of thefirst item, a first portion of the duration of the delay of time, (2)determining, in response to a determination of the second item, a secondportion of the duration of the delay of time, etc., and (3) calculatinga sum of the first portion added to the second portion. The sum can bethe duration of the delay of time.

FIG. 4 is a diagram illustrating an example of items of information inthe record of data and portions of a duration of a delay of time,according to the disclosed technologies. For example, with reference toFIGS. 1, 2, and 4, the system 104 can be configured to determine: (1)the first item is that Empire State Bank is the transferor, (2) thesecond item is that First National Bank is the transferee, (3) the thirditem is that $700,000 is the amount of the transaction, (4) the fourthitem is that Fran Dunlop is the initiator, (5) the fifth item is thatAlice Jones is the first approver, and (6) the sixth item is thatCharlie Sanders is the second approver. Then, the system 104 can beconfigured: (1) to determine: (a) the first portion is 1 day (based uponEmpire State Bank being the transferor), (b) the second portion is 0days (based upon First National Bank being the transferee), (c) thethird portion is 1 day (based upon the entity being a transferor in atransaction of less than $1 million), (d) the fourth portion is 0 days(based upon Fran Dunlop being the initiator), (e) the fifth portion is 0days (based upon Alice Jones being the first approver), and (f) thesixth portion is 0 days (based upon Charlie Sanders being the secondapprover), and (2) to calculate the sum of the first portion (1 day),the second portion (0 days), the third portion (1 day), the fourthportion (0 days), the fifth portion (0 days), and the sixth portion (0days). The sum (2 days) can be the duration of the delay of time.

As stated above, the system 104 can be configured to cause, after thedelay of time has elapsed, the transmission of the copy of the record ofdata to the electronic network 102. For example, the system 104 can beconfigured to transmit 126 the copy of the record of data to theelectronic network 102. Alternatively, for example, the system 104 canbe configured to send 128 the copy of the record of data to a remotedevice 130. The copy of the record of data can be transmitted 132 to theelectronic network 102 by the remote device 130.

As stated above, the disclosed technologies can prevent an incorrecttransmission of a copy of a record of data to the electronic network102. An intended transmission of a record of data can be incorrect for avariety of reasons. For example, one or more of the items of informationin the record of data can simply be incorrect. In another example, theentity that initiated the transaction and the entities that approved thetransaction can have been coerced to attempt to cause the copy of therecord of data to be transmitted to the electronic network 102.

For example, with reference to FIGS. 1, 2, and 4, an evildoer can havecoerced Fran Dunlop, Alice Jones, and Charlie Sanders to initiate and toapprove a transaction of $700,000 from Empire State Bank not to FirstNational Bank (as illustrated in FIG. 2), but to Sketchy Savings & Loan(not illustrated). Then, the system 104 can be configured: (1) todetermine: (a) the first portion is 1 day (based upon Empire State Bankbeing the transferor), (b) the second portion is 30 days (based uponSketchy Savings & Loan (other financial institute) being thetransferee), (c) the third portion is 1 day (based upon the entity beinga transferor in a transaction of less than $1 million), (d) the fourthportion is 0 days (based upon Fran Dunlop being the initiator), (e) thefifth portion is 0 days (based upon Alice Jones being the firstapprover), and (f) the sixth portion is 0 days (based upon CharlieSanders being the second approver), and (2) to calculate the sum of thefirst portion (1 day), the second portion (30 days), the third portion(1 day), the fourth portion (0 days), the fifth portion (0 days), andthe sixth portion (0 days). The sum (32 days) can be the duration of thedelay of time. Hopefully, having the duration of the delay of time being32 days is a sufficient duration of time so that the second signal canbe received before the 32-day delay of time has elapsed and thetransmission of the copy of the record of data to the electronic network102 can be prevented.

As stated above, if the system 104 is in the third optionalimplementation, then the receipt of the second signal can include areceipt of the second signal from the device 108 a. For example, one ormore of Fran Dunlop, Alice Jones, or Charlie Sanders, no longer beingcoerced, can cause the second signal to be transmitted from the device108 a to the system 104. Alternatively, for example, another individualin the organization that includes Fran Dunlop, Alice Jones, or CharlieSanders can cause the second signal to be transmitted from the device108 a to the system 104.

Alternatively, as stated above, if the system 104 is in the thirdoptional implementation, then the receipt of the second signal caninclude a receipt of the second signal from the device 118. For example,the other individual in the organization that includes Fran Dunlop,Alice Jones, or Charlie Sanders can cause the second signal to betransmitted from the device 118 to the system 104. Alternatively, forexample, an individual in a law enforcement agency can cause the secondsignal to be transmitted from the device 118 to the system 104.

Alternatively, as stated above, if the system 104 is in the fourthoptional implementation, then the receipt of the second signal caninclude a receipt of the second signal from the operation 120 performedby the system 104.

FIG. 5 is a flow diagram illustrating an example of a method 500 forpreventing the incorrect transmission of the copy of the record of datato the electronic network, according to the disclosed technologies. Therecord of data can be associated with an item for which anauthentication of a copy is important. For example, the record of datacan be associated with a transaction, a will or testament, a documentrelated to a quality assurance program, a document to be used asevidence in a judicial proceeding, or the like. The electronic networkcan include a distributed ledger system. If the record of data isassociated with a transaction, then, additionally or alternatively, theelectronic network can include one or more of an Automated ClearingHouse network, a payment rail network, another electronic ledger system,or the like. If the electronic network is a distributed ledger system,then the record of data can be included, by the distributed ledgersystem, in a block to be added, by the distributed ledger system, to ablockchain.

In a first optional implementation of the method 500, at an optionaloperation 502, the copy of the record of data can be received. Forexample, the copy of the record of data can be received from a firstdevice. The first device can be associated with an entity that isauthorized to cause the copy of the record of data to be transmitted tothe electronic network. Alternatively, for example, the copy of therecord of data can be received from a second device. The second devicecan be unassociated with the entity that is authorized to cause the copyof the record of data to be transmitted to the electronic network.

At an operation 504, a first signal can be received. The first signalcan include a first instruction to cause the copy of the record of datato be transmitted to the electronic network.

In a second optional implementation of the method 500, the first signalcan include a plurality of first signals and the first instruction caninclude a plurality of first instructions. For example, the plurality offirst signals can be received from a plurality of devices. In the secondoptional implementation, at an optional operation 506, a count of theplurality of first signals can be determined to be greater than athreshold.

In a third optional implementation of the method 500, the first signalcan be received from the first device. Alternatively, for example, thefirst signal can be received from the first device via one or moreintermediate devices.

At an operation 508, one or more items of information in the record ofdata can be determined.

In a fourth optional implementation of the method 500, the record ofdata can be associated with a transaction. For example, the one or moreitems of information can include one or more of an amount of thetransaction, an identification of a transferor account, or anidentification of a transferee account. Additionally, for example, theone or more items of information can further include one or more of anidentification of the transaction, an identification of an entity thatinitiated the transaction, or one or more identifications of one or moreentities that approved the transaction.

At an optional operation 510, a duration of a delay of time, to beelapsed before a transmission of the copy of the record of data to theelectronic network, can be determined in response to a determination ofthe one or more items of information.

For example, the duration of the delay of time can be determined byselecting the duration of the delay of time from a plurality of settingsof durations of delays of time.

Alternatively, for example, the duration of the delay of time can bedetermined by calculating a sum of portions of the duration of the delayof time determined from items of information in the record of data. FIG.6 is a flow diagram illustrating an example of a method 510 fordetermining the duration of the delay of time, according to thedisclosed technologies. In the method 510, at an operation 602, a firstitem of the one or more items of information can be determined. At anoperation 604, a second item of the one or more items of information canbe determined. At an operation 606, a first portion of the duration ofthe delay of time can be determined in response to a determination ofthe first item. At an operation 608, a second portion of the duration ofthe delay of time can be determined in response to a determination ofthe second item. At an operation 610, a sum of the first portion addedto the second portion can be calculated. The sum can be the duration ofthe delay of time.

Returning to FIG. 5, at an operation 512, the delay of time can be setin response to a receipt of the first signal and a determination of theone or more items of information. If the method 500 includes performingthe operation 510, then the delay of time can further be set in responseto the count being greater than the threshold.

At an operation 514, the transmission of the copy of the record of datato the electronic network can be caused to occur after the delay of timehas elapsed. Optionally, the copy of the record of data can be sent to aremote device. The copy of the record of data can be transmitted to theelectronic network by the remote device.

At an operation 516, the transmission of the copy of the record of datato the electronic network can be prevented in response to a receipt of asecond signal before the delay of time has elapsed. The second signalcan include a second instruction that supersedes the first instruction.

In a fifth optional implementation of the method 500, the receipt of thesecond signal can include a receipt of the second signal from the firstdevice. Alternatively, the receipt of the second signal can include areceipt of the second signal from a third device. The third device canbe unassociated with the entity that is authorized to cause the copy ofthe record of data to be transmitted to the electronic network.

In a sixth optional implementation of the method 500, the receipt of thesecond signal can include a receipt of the second signal from anoperation performed by a system for preventing the incorrecttransmission of the copy of the record of data to the electronicnetwork.

In general, in light of the technologies described above, one of skillin the art understands that technologies to prevent an incorrecttransmission of a copy of a record of data to an electronic network caninclude any combination of some or all of the foregoing configurations.

Configurations of the disclosed technologies may be implemented in andused with a variety of component and network architectures. FIG. 7illustrates an example computing device 20 suitable for implementingconfigurations of the disclosed technologies. The device 20 can be, forexample, a desktop or laptop computer, or a mobile computing device suchas a smart phone, tablet, or the like. The device 20 can include a bus21 (which can interconnect major components of the computer 20, such asa central processor 24), a memory 27 (such as random-access memory(RAM), read-only memory (ROM), flash RAM, or the like), a user display22 (such as a display screen), a user input interface 26 (which caninclude one or more controllers and associated user input devices suchas a keyboard, mouse, touch screen, and the like), a fixed storage 23(such as a hard drive, flash storage, and the like), a removable mediacomponent 25 (operative to control and receive an optical disk, flashdrive, and the like), and a network interface 29 operable to communicatewith one or more remote devices via a suitable network connection.

The bus 21 can allow data communication between the central processor 24and one or more memory components, which can include RAM, ROM, and othermemory, as previously noted. Typically RAM can be the main memory intowhich an operating system and application programs are loaded. A ROM orflash memory component can contain, among other code, the basicinput-output system (BIOS) which can control basic hardware operationsuch as the interaction with peripheral components. Applicationsresident with the computer 20 can generally be stored on and accessedvia a computer readable medium, such as a hard disk drive (e.g., fixedstorage 23), an optical drive, floppy disk, or other storage medium.

The fixed storage 23 can be integral with the computer 20 or can beseparate and accessed through other interfaces. The network interface 29can provide a direct connection to a remote server via a wired orwireless connection. The network interface 29 can provide suchconnection using any suitable technique and protocol as is readilyunderstood by one of skill in the art, including digital cellulartelephone, WiFi™, Bluetooth®, near-field, and the like. For example, thenetwork interface 29 can allow the computer to communicate with othercomputers via one or more local, wide-area, or other communicationnetworks, as described in further detail below.

Many other devices or components (not illustrated) can be connected in asimilar manner (e.g., document scanners, digital cameras, and so on).Conversely, all of the components illustrated in FIG. 7 need not bepresent to practice the disclosed technologies. The components can beinterconnected in different ways from that illustrated. The operation ofa computer such as that illustrated in FIG. 7 is readily known in theart and is not discussed in detail in this application. Code toimplement the disclosed technologies can be stored in computer-readablestorage media such as one or more of the memory 27, fixed storage 23,removable media 25, or on a remote storage location.

More generally, various configurations of the presently disclosedtechnologies can include or be realized in the form ofcomputer-implemented processes and apparatuses for practicing thoseprocesses. Configurations also can be realized in the form of a computerprogram product having computer program code containing instructionsembodied in non-transitory and/or tangible media, such as floppydiskettes, CD-ROMs, hard drives, universal serial bus (USB) drives, orany other machine readable storage medium, such that when the computerprogram code is loaded into and executed by a computer, the computerbecomes an apparatus for practicing configurations of the disclosedtechnologies. Configurations also can be realized in the form ofcomputer program code, for example, whether stored in a storage medium,loaded into and/or executed by a computer, or transmitted over sometransmission medium, such as over electrical wiring or cabling, throughfiber optics, or via electromagnetic radiation, such that when thecomputer program code is loaded into and executed by a computer, thecomputer becomes an apparatus for practicing configurations of thedisclosed technologies. When implemented on a general-purposemicroprocessor, the computer program code segments configure themicroprocessor to create specific logic circuits.

In some configurations, a set of computer-readable instructions storedon a computer-readable storage medium can be implemented by ageneral-purpose processor, which can transform the general-purposeprocessor or a device containing the general-purpose processor into aspecial-purpose device configured to implement or carry out theinstructions. Configurations can be implemented using hardware that caninclude a processor, such as a general purpose microprocessor and/or anapplication-specific integrated circuit (ASIC) that embodies all or partof the techniques according to configurations of the disclosedtechnologies in hardware and/or firmware. The processor can be coupledto memory, such as RAM, ROM, flash memory, a hard disk or any otherdevice capable of storing electronic information. The memory can storeinstructions adapted to be executed by the processor to perform thetechniques according to configurations of the disclosed technologies.

The foregoing description, for purpose of explanation, has beendescribed with reference to specific configurations. However, theillustrative discussions above are not intended to be exhaustive or tolimit configurations of the disclosed technologies to the precise formsdisclosed. Many modifications and variations are possible in view of theabove teachings. The configurations were chosen and described in orderto explain the principles of the disclosed technologies and theirpractical applications, to thereby enable others skilled in the art toutilize those configurations as well as various configurations withvarious modifications as may be suited to the particular usecontemplated.

The invention claimed is:
 1. A method for preventing an incorrecttransmission of a copy of a record of data to a distributed ledgersystem, the method comprising: receiving, by a processor, a plurality ofsignals including a first signal, wherein each of the plurality ofsignals includes a corresponding instruction to cause the copy of therecord of data to be transmitted to the distributed ledger system;determining, by the processor, at least one item of information in therecord of data; setting, by the processor and in response to a receiptof the plurality of signals, a determination of the at least one item ofinformation, and a determination that a count of the plurality ofsignals is greater than a threshold, a delay of time to be elapsedbefore a transmission of the copy of the record of data to thedistributed ledger system; causing, by the processor and after the delayof time has elapsed, the transmission of the copy of the record of datato the distributed ledger system; and preventing, by the processor andin response to a receipt of a second signal before the delay of time haselapsed, the transmission of the copy of the record of data to thedistributed ledger system, wherein the second signal includes a secondinstruction that supersedes the first instruction.
 2. The method ofclaim 1, wherein the record of data is to be included, by thedistributed ledger system, in a block to be added, by the distributedledger system, to a blockchain.
 3. The method of claim 1, wherein therecord of data is associated with a transaction.
 4. The method of claim3, wherein the at least one item of information includes at least one ofan amount of the transaction, an identification of a transferor account,or an identification of a transferee account.
 5. The method of claim 4,wherein the at least one item of information further includes at leastone of an identification of the transaction, an identification of anentity that initiated the transaction, or at least one identification ofat least one entity that approved the transaction.
 6. The method ofclaim 1, wherein the receiving the first signal comprises receiving thefirst signal from a first device, wherein the first device is associatedwith an entity that is authorized to cause the copy of the record ofdata to be transmitted to the distributed ledger system.
 7. The methodof claim 6, wherein the receiving the first signal from the first devicecomprises receiving the first signal from the first device via at leastone intermediate device.
 8. The method of claim 6, wherein the receiptof the second signal comprises a receipt of the second signal from thefirst device.
 9. The method of claim 6, wherein the receipt of thesecond signal comprises a receipt of the second signal from a seconddevice.
 10. The method of claim 1, wherein the receipt of the secondsignal comprises a receipt of the second signal from an operationperformed by the processor.
 11. The method of claim 1, furthercomprising receiving, by the processor, the copy of the record of data.12. The method of claim 11, wherein the receiving the copy of the recordof data comprises receiving the copy of the record of data from adevice, wherein the device is associated with an entity that isauthorized to cause the copy of the record of data to be transmitted tothe distributed ledger system.
 13. The method of claim 11, wherein thereceiving the copy of the record of data comprises receiving the copy ofthe record of data from a device, wherein the device is unassociatedwith an entity that is authorized to cause the copy of the record ofdata to be transmitted to the distributed ledger system.
 14. The methodof claim 1, further comprising determining, by the processor and inresponse to the determination of the at least one item of information, aduration of the delay of time.
 15. The method of claim 14, wherein thedetermining the duration of the delay of time comprises selecting theduration of the delay of time from a plurality of settings of durationsof delays of time.
 16. The method of claim 14, wherein: the determiningthe at least one item of information comprises: determining a first itemof the at least one item of information; and determining a second itemof the at least one item of information; and the determining theduration of the delay of time comprises: determining, in response to adetermination of the first item, a first portion of the duration of thedelay of time; determining, in response to a determination of the seconditem, a second portion of the duration of the delay of time; andcalculating a sum of the first portion added to the second portion,wherein the sum is the duration of the delay of time.
 17. The method ofclaim 1, wherein the causing the transmission of the copy of the recordof data to the distributed ledger system comprises sending the copy ofthe record of data to a remote device, the copy of the record of data tobe transmitted to the distributed ledger system by the remote device.18. A non-transitory computer-readable medium storing computer code forcontrolling a processor to cause the processor to prevent an incorrecttransmission of a copy of a record of data to a distributed ledgersystem, the computer code including instructions to cause the processorto: receive a plurality of signals including a first signal, whereineach of the plurality of signals includes a corresponding instruction tocause the copy of the record of data to be transmitted to thedistributed ledger system; determine at least one item of information inthe record of data; set, in response to a receipt of the plurality ofsignals, a determination of the at least one item of information, and adetermination that a count of the plurality of signals is greater than athreshold, a delay of time to be elapsed before a transmission of thecopy of the record of data to the distributed ledger system; cause,after the delay of time has elapsed, the transmission of the copy of therecord of data to the distributed ledger system; and prevent, inresponse to a receipt of a second signal before the delay of time haselapsed, the transmission of the copy of the record of data to thedistributed ledger system, wherein the second signal includes a secondinstruction that supersedes the first instruction.
 19. A system forpreventing an incorrect transmission of a copy of a record of data to adistributed ledger system, the system comprising: a memory configured tostore the copy of the record of data, a plurality of signals including afirst signal, a first instruction, a second signal, and a secondinstruction; and a processor configured to: receive the plurality ofsignals, wherein each of the plurality of signals includes acorresponding instruction including the first instruction to cause thecopy of the record of data to be transmitted to the distributed ledgersystem; determine at least one item of information in the record ofdata; set, in response to a receipt of the plurality of signals, adetermination of the at least one item of information, and adetermination that a count of the plurality of signals is greater than athreshold, a delay of time to be elapsed before a transmission of thecopy of the record of data to the distributed ledger system; cause,after the delay of time has elapsed, the transmission of the copy of therecord of data to the distributed ledger system; and prevent, inresponse to a receipt of the second signal before the delay of time haselapsed, the transmission of the copy of the record of data to thedistributed ledger system, wherein the second signal includes the secondinstruction that supersedes the first instruction.
 20. Thenon-transitory computer-readable medium of claim 18, wherein thereceiving the first signal comprises receiving the first signal from afirst device, wherein the first device is associated with an entity thatis authorized to cause the copy of the record of data to be transmittedto the distributed ledger system.
 21. The non-transitorycomputer-readable medium of claim 20, wherein the receipt of the secondsignal comprises a receipt of the second signal from the first device.22. The non-transitory computer-readable medium of claim 20, wherein thereceipt of the second signal comprises a receipt of the second signalfrom a second device.
 23. The non-transitory computer-readable medium ofclaim 18, wherein the receipt of the second signal comprises a receiptof the second signal from an operation performed by the processor. 24.The system of claim 19, wherein the receiving the first signal comprisesreceiving the first signal from a first device, wherein the first deviceis associated with an entity that is authorized to cause the copy of therecord of data to be transmitted to the distributed ledger system. 25.The system of claim 24, wherein the receipt of the second signalcomprises a receipt of the second signal from the first device.
 26. Thesystem of claim 24, wherein the receipt of the second signal comprises areceipt of the second signal from a second device.
 27. The system ofclaim 19, wherein the receipt of the second signal comprises a receiptof the second signal from an operation performed by the processor.