Resource transfer system

ABSTRACT

Systems and techniques are provided for a resource transfer system. An instruction to transfer a first quantity of a resource from a first resource pool to a second resource pool may be received. A hold may be placed on a second quantity of the resource in the first resource pool. The held second quantity of the first resource may not be transferred from the first resource pool until the hold is released. Responsive to receiving a message that fulfills a condition on the hold and an instruction to execute the transfer, the hold may be released. A register that is in the first resource pool and is associated with the resource may decremented by the first quantity, and a register that is in the second resource pool and is associated with the resource may be incremented by the first quantity.

BACKGROUND

The transfer of resources between two parties may require theinvolvement of one or more third parties. For example, if the sendingparty has one type of resource (such as dollars) to send, but thereceiving party expects to receive a different type of resource (such aseuros), a third party may be needed to convert the sending party'sresource (dollars) into the resource expected by the receiving party(euros). More parties can be introduced into a resource transfer. Forexample, a first intermediary may convert dollars to yen and a secondintermediary may convert the yen into euros for the receiving party. Asthe number of intermediaries increase, the risk for the parties involvedin the transfer may increase. For example, it may be possible for one ofthe third parties (such as an intermediary) in between the sending partyand receiving party to take resources (such as dollars from the sendingparty), but keep them instead of converting them into a different typeof resource (e.g., yen) and passing them on to another intermediarytowards the receiving party. It may also be possible for a third partyto transfer resources such as euros to the receiving party, and thenfail to be reimbursed either by the sending party or an intermediarybetween the sending party and the third party. Malicious sending partiesmay also initiate resource transfers designed to fail on purpose totemporarily tie up resources held by one or more of the other parties toa transaction.

BRIEF SUMMARY

Systems and techniques disclosed herein may allow for a resourcetransfer system. Additional features, advantages, and embodiments of thedisclosed subject matter may be set forth or apparent from considerationof the following detailed description, drawings, and claims. Moreover,it is to be understood that both the foregoing summary and the followingdetailed description are examples and are intended to provide furtherexplanation without limiting the scope of the claims.

An instruction may be received to transfer a first quantity of a firstresource type from a first resource pool to a second resource pool. Aninstruction may be received to place a hold on a second quantity of thefirst resource type in the first resource pool. An authorization toplace the hold on the second quantity of the first resource type in thefirst resource pool. Responsive to receiving the authorization, the holdmay be placed on the second quantity of the first resource type in thefirst resource pool to create a held second quantity of the firstresource type. The held second quantity of the first resource typecannot be transferred from the first resource pool until the hold isreleased.

A message may be received that fulfills a condition of the hold. Aninstruction may be received to execute the transfer of the firstquantity of the first resource type from the first resource pool to thesecond resource pool. Responsive to receiving the message that fulfillsthe condition on the hold and the instruction to execute the transfer,the hold may be released on the held second quantity of the firstresource type, a first register that is in the first resource pool andis associated with the first resource type may be decremented by thefirst quantity, and a second register that is in the second resourcepool and is associated with the first resource type may be incrementedby the first quantity.

A message may be received including a proposed transfer. The proposedtransfer may include a source transfer of a first quantity of a firstresource type from a first resource pool to a second resource pool and adestination transfer of a second quantity of a second resource type froma third resource pool to a fourth resource pool. A message may bereceived indicating that a hold has been placed on a third quantity ofthe first resource type in the first resource pool. A message associatedwith the performance of the destination transfer may be sent. A messageindicating that a condition on the hold of the third quantity of thefirst resource type in the first resource pool has been fulfilled may bereceived. An instruction to execute the source transfer of the firstquantity of the first resource type from the first resource pool to thesecond resource pool may be sent.

A prepared transfer receipt may be received from each of a number ofresource tracking systems in a transfer chain. The prepared transferreceipt may indicate that each of the resource tracking systems hasplaced a hold on a respective quantity of a respective resource type. Asigned message may be sent to each of the number of resource trackingsystems and each of a number of intermediaries. The signed message mayfulfill a condition on each of the holds placed by each of the resourcetracking systems and cause each of the number of intermediaries to sendat least on instruction to execute a transfer to one of the number ofresource tracking systems.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are included to provide a furtherunderstanding of the disclosed subject matter, are incorporated in andconstitute a part of this specification. The drawings also illustrateembodiments of the disclosed subject matter and together with thedetailed description serve to explain the principles of embodiments ofthe disclosed subject matter. No attempt is made to show structuraldetails in more detail than may be necessary for a fundamentalunderstanding of the disclosed subject matter and various ways in whichit may be practiced.

FIG. 1 shows an example system suitable for a resource transfer systemaccording to an implementation of the disclosed subject matter.

FIG. 2 shows an example system suitable for a resource transfer systemaccording to an implementation of the disclosed subject matter.

FIG. 3 shows an example system suitable for a resource transfer systemaccording to an implementation of the disclosed subject matter.

FIG. 4 shows an example system suitable for a resource transfer systemaccording to an implementation of the disclosed subject matter.

FIG. 5 shows an example system suitable for a resource transfer systemaccording to an implementation of the disclosed subject matter.

FIGS. 6A-D shows example arrangements suitable for a resource transfersystem according to an implementation of the disclosed subject matter.

FIGS. 7A-C shows example arrangements suitable for a resource transfersystem according to an implementation of the disclosed subject matter.

FIGS. 8A-C shows example arrangements suitable for a resource transfersystem according to an implementation of the disclosed subject matter.

FIGS. 9A-C shows example arrangements suitable for a resource transfersystem according to an implementation of the disclosed subject matter.

FIG. 10 shows an example arrangement suitable for a resource transfersystem according to an implementation of the disclosed subject matter.

FIG. 11 shows an example sequence suitable for a resource transfersystem according to an implementation of the disclosed subject matter.

FIG. 12 shows an example sequence suitable for a resource transfersystem according to an implementation of the disclosed subject matter.

FIG. 13 shows an example sequence suitable for a resource transfersystem according to an implementation of the disclosed subject matter.

FIG. 14 shows an example sequence suitable for a resource transfersystem according to an implementation of the disclosed subject matter.

FIG. 15 shows an example sequence suitable for a resource transfersystem according to an implementation of the disclosed subject matter.

FIG. 16 shows an example arrangement suitable for a resource transfersystem according to an implementation of the disclosed subject matter.

FIG. 17 shows an example arrangement suitable for a resource transfersystem according to an implementation of the disclosed subject matter.

FIG. 18 shows an example procedure suitable for a resource transfersystem according to an implementation of the disclosed subject matter.

FIG. 19 shows an example procedure suitable for a resource transfersystem according to an implementation of the disclosed subject matter.

FIG. 20 shows an example procedure suitable for a resource transfersystem according to an implementation of the disclosed subject matter.

FIG. 21 shows a computer according to an embodiment of the disclosedsubject matter.

FIG. 22 shows a network configuration according to an embodiment of thedisclosed subject matter.

DETAILED DESCRIPTION

According to embodiments disclosed herein, a resource transfer systemmay allow for the transfer of resources of different types from asending party to a receiving party and involving one or more thirdparties (such as intermediary parties), while reducing the risk to theparties involved. A sending party may initiate a transfer of resourcesto a receiving party, using any suitable computing device. The transfermay be performed using resource tracking systems, which may be anysuitable computing devices for tracking the ownership of resources bythe various parties. The sending party, receiving party, andintermediary parties may use computing devices such as a sender,intermediary, and receiver. The sender, intermediaries, receiver, andresource tracking systems can be considered parts of a transfer chainfrom the sender to the receiver.

As used herein, for a given party in the transfer, a transfer ofresources to that party on a resource tracking system is referred to as“source transfer”, and a transfer of resource away from the party isreferred to as a “destination transfer”. Source and destinationtransfers for the same party may take place using two separate resourcetracking systems, both of which can track resources controlled by theparty. A resource tracking system may be between two parties when bothparties have resources that are tracked by the resource tracking system,so that the resource tracking system may transfer resources between theparties.

Holds may be placed on resources to be transferred. A purpose of thehold is to reduce the amount of risk taken by one or more participantsin a transfer chain. Generally, a “hold” prevents the transfer of aquantity of resources and/or specific resources unless and until certainconditions of the hold are fulfilled. The conditions may be, forexample, the receiving of a signed message from a computing device orsystem trusted by all of the parties participating in the transferindicating that the transfer can proceed. The conditions may also be,for example, that a source transfer of resources to a party may proceedupon receiving a message (“receipt”) that may be evidence that adestination transfer of resources from that party has taken place. Asanother example, a condition may be the receiving of evidence that oneor more other holds in place at one or more different points in atransfer chain. The conditions may also be, for example, evidence that asmart contract is being executed, or a digital signature or other signedmessage from a third-party indicating the occurrence of an event, suchas a digital signature confirming the successful delivery of a physicalpackage by a delivery service. The conditions of a hold may also be, forexample, evidence of the fulfillment of multiple other, non-holdconditions, including, for example, the receipt of signatures frommultiple other parties.

A sending party, using a sender computing device, or “sender,” mayinitiate a transfer to a receiver by requesting a quote. A quote canrelate to the resources required to make a transfer from the sender tothe receiver. It can include an amount of resources to be transferred toa recipient, as well as any fees for effectuating the transfer. Suchfees may be charged by intermediaries. The quote may be requested fromany suitable party, with any suitable computing device or system thatmay be in communication with computing devices or system for variousintermediaries.

For all transfer chains, using any conditions on held resources andnumber of intermediaries, the sending party may accept a quote andauthorize a hold on its own resources that are to be transferred. Thehold can be put in place on a resource tracking system between thesending party and the first intermediary party in the transfer chain,which may be a sender-intermediary resource tracking system. Thesender-intermediary resource tracking system may track certain resourcescontrolled by the sending party and other resources controlled by thefirst intermediary party. In general, a hold can be put in place on theresource tracking system responsible for tracking resources of adjacentparties in the transfer chain. For example, a record of the amount andtype of a sending party resource may be stored in a database that ispart of a resource tracking system. In placing a hold on a certainquantity of the resources belonging to the sending party, the resourcetracking system may prevent the transfer of that quantity of resourcesand/or specific resources unless and until the specific conditions ofthe hold are fulfilled. The resources for both the sending party and forthe next party in the transfer chain may be of the same type. Once thehold has been authorized, the next party in the transfer, for example,an intermediary party using an intermediary computing device, or“intermediary,” may cause the resource tracking system to implement thehold on the resources as authorized by the sending party. This may lockup some quantity of the sending party's resources, preventing othertransfers from reducing the quantity of the sending party's resources onthe sender-intermediary resource tracking system below the held quantityfor some time period. The sender-intermediary resource tracking systemmay send a hold receipt (a “prepared transfer receipt”) that mayindicate that the requested hold has been placed on the resource inpreparation for the planned transfer. The hold may also be placed bytransferring the held resources to a holding account on the resourcetracking system. The holding account may be owned by the operator of theresource tracking system, or by owned by a third party. For example, athird party may establish an account on a resource tracking system towhich a sending party may transfer resources to be used in a transfer.The sending party's resources may be transferred out of the thirdparty's account on the resource tracking system when being transferredto an account of a first intermediary party in a transfer chain.

For a single intermediary transfer chain, the condition for the resourcetracking system allowing the transfer of held resources may be receivinga signed message from a trusted system indicating that the transfer mayproceed. The intermediary may receive the prepared transfer receipt thatwas sent out by the sender-intermediary resource tracking system. Inresponse, the intermediary may place a hold on a certain amount ofresources controlled by the intermediary party and tracked by anintermediary-receiver resource tracking system, which may also trackresources controlled by the receiving party. When all of the resourcesfor the transfer on both resource tracking systems have been put on holdfor the transfer, the transfer may proceed. This can prevent partialtransfers without the entire transfer going through. A condition forreleasing the holds can be receiving a cryptographically signedstatement from a trusted third party (a “trusted system”) that hasverified that appropriate the resources involved in the transfer ondifferent resource tracking systems have been placed on hold and thatthe transfer may proceed. The trusted system can base this statement onverified messages from, for example, the resource tracking systemsinvolved in the transfer (the sender-intermediary andintermediary-receiver resource tracking systems) that the amounts are onhold.

The trusted system may receive prepared transfer receipts (holdreceipts) indicating that holds have been placed on the resources atboth resource tracking systems in the transfer, and may send theresource tracking systems and the intermediary the signed messageindicating that the transfer can proceed. The intermediary may sendinstructions to the intermediary-receiver resource tracking system totransfer the intermediary party's resources on which the hold was placedto the receiving party. The intermediary may also instruct thesender-intermediary resource tracking system to transfer the sendingparty's resources on which the hold was placed to the intermediaryparty. Because the hold conditions may have been fulfilled by thereceiving of the signed message from the trusted system, the resourcetracking systems may execute the transfers as instructed by theintermediary, and may send transfer confirmation receipts to theintermediary. The intermediary may notify the receiving party, forexample, at a receiver computing device, or “receiver,” and the sendingparty, at the sender, that the transfer was completed.

Another example of a condition that must be satisfied to release a holdon resources may be evidence that a certain transfer of resources hastaken place. For example, in a single intermediary transfer chain, inresponse to receiving the prepared transfer receipt sent out by thesender-intermediary resource tracking system an intermediary mayinstruct the intermediary-receiver resource tracking system to transferresources controlled by the intermediary party to the receiving party.The intermediary may receive a transfer confirmation receipt from theintermediary-receiver resource tracking system once the transfer iscomplete. This transfer confirmation receipt may be sent to thesender-intermediary resource tracking system as evidence that adestination transfer of resources from the intermediary party has takenplace. This can fulfill the condition for releasing a hold on thesending party's resources at the sender-intermediary resource trackingsystem, allowing the sending party's resources to be transferred to theintermediary party. The intermediary may send a notification to thereceiver and the sender that the transfer (from sender to receiver) wascompleted.

In some cases, there may be more than one intermediary, and thecondition for the resource tracking system allowing the transfer of heldresources may be a signed message from a trusted system. The trustedsystem may be any suitable centralized or decentralized system, such as,for example, consensus networks and simply independent signer nodes. Theprepared transfer receipt sent out by the sender-intermediary resourcetracking system may be received by the trusted system and by theintermediary. In response, the intermediary place a hold on resourcesits intermediary party controls at a resource tracking system betweenthe intermediary party and the next intermediary party in the transferchain. In a multi-intermediary transfer chain, a resource trackingsystem may be an intermediary-intermediary resource tracking system whenit is between two intermediary parties. Two intermediaries in thetransfer chain may both have access to a resource tracking system thattracks resources belonging to the intermediary party for each of theintermediaries. For example, a transfer chain may include a sender,intermediary A, intermediary B, intermediary C and a receiver. Such atransfer chain can also include intermediary A-intermediary B andintermediary B-intermediary C resource tracking systems.

When a party such as an intermediary places a hold on resources, theresource tracking system that tracks the held resources may send aprepared transfer receipt to a trusted system. The prepared transferreceipt may also be sent to the next intermediary in the transfer chain,a previous intermediary in the transfer chain, or the sender of thetransfer chain, either directly or through the trusted system. Theprepared transfer receipt can include an indication of the type andamount of resources held, the owner of the held resources, an identifiercorresponding to the transfer in connection with which the resources areheld, a time limit for the hold and/or other conditions that need to besatisfied for the hold to be released. Upon receiving the preparedtransfer receipt, the next intermediary may also place a hold onresources its intermediary party controls at a next resource trackingsystem, resulting in another prepared transfer receipt, which may againbe sent to yet another intermediary, until the last intermediary in thetransfer chain is reached. The last intermediary in the transfer chainmay place a hold on resources that its intermediary party controls at anintermediary-receiver resource tracking system between the lastintermediary party and the receiving party, and send the preparedtransfer receipt to the trusted system. The trusted system, havingreceived prepared transfer receipts indicating that the appropriateresources are held at every resource tracking system in the transferchain, may send out a signed message indicating that the transfer canproceed to all intermediaries and resource tracking systems in thetransfer chain. All intermediaries (e.g., intermediaries A and B) in thetransfer chain may then instruct the appropriate resource trackingsystems to transfer the held resources to their intended destinations.For example, the amount on hold belonging to the sending party on thesender-intermediary A resource tracking system may be transferred tointermediary party A. Likewise, an amount on hold belonging tointermediary party A on the intermediary A-intermediary B resourcetracking system may be transferred to intermediary party B. IntermediaryB may instruct the intermediary B-receiver resource tracking system,which may be last resource tracking system in the transfer chain, totransfer the held resources of intermediary party to the receivingparty. The transfers may be executed in any order, or all or in partsimultaneously, as the condition for transferring held resources at eachresource tracking system may have been fulfilled by the signed messagefrom the trusted system. The sender and receiver may also be sentnotifications that the transfer was completed from any suitablecomputing device or system involved in the transfer, including thetrusted system and any of the intermediaries.

In some implementations, each intermediary may place a hold on resourcesthat its intermediary party controls after receiving a messageinstructing that the hold be placed. The message may be, for example, asigned message from the trusted system, or a message from anotherintermediary. In such an implementation, the intermediaries may not needto receive a prepared transfer receipt before placing a hold on theirrespective intermediary party's resources.

In some situations, there may be more than one intermediary party and acondition for a resource tracking system allowing the transfer of heldresources can be receiving a receipt indicating that a destinationtransfer of resources from that party has taken place. In that case, inresponse to receiving the prepared transfer receipt sent out by thesender-intermediary resource tracking system, the intermediary may placea hold on resources its intermediary party controls at a resourcetracking system between the intermediary party and the next intermediaryparty, for example, an intermediary A-intermediary B resource trackingsystem. The hold may result in a prepared transfer receipt being sent tothe next intermediary in the transfer chain. Upon receiving the preparedtransfer receipt, the next intermediary may also place a hold onresources its intermediary party controls at a next resource trackingsystem, resulting in another prepared transfer receipt, which may againbe sent to another intermediary, until the last intermediary in thetransfer chain receives a prepared transfer receipt. The lastintermediary in the transfer chain, may receive the prepared transferreceipt indicating that the preceding intermediary has placed a hold onresources at the resource tracking system between the precedingintermediary party and the last intermediary party. In response, thelast intermediary in the transfer chain may instruct the resourcetracking system between the last intermediary party and the receivingparty, for example, a last intermediary-receiver resource trackingsystem, to transfer resources controlled by the last intermediary partyto the receiving party. The resource tracking system between theintermediary party and the receiving party may perform the transfer, asthe last intermediary party may be transferring resources that itcontrols, so no hold or other condition fulfillment of any condition maybe necessary. This may be the destination transfer for the lastintermediary party. The last intermediary may receive a transferconfirmation receipt from the last intermediary-receiver resourcetracking system once the transfer has succeeded. This transferconfirmation receipt may be sent to the resource tracking system betweenthe preceding intermediary party and the last intermediary party. Thetransfer confirmation receipt may be evidence that a destinationtransfer of resources from the last intermediary party has taken place,fulfilling the condition for allowing the source transfer of thepreceding intermediary party's held resources to the last intermediaryparty. This may result in a transfer confirmation receipt being sent tothe preceding intermediary, confirming the destination transfer for thepreceding intermediary party. The preceding intermediary may send thetransfer confirmation receipt to an appropriate resource tracking systemand instruct that resource tracking system to perform the sourcetransfer for the preceding intermediary party. The transfer confirmationreceipt may be evidence that a destination transfer of resources fromthe preceding intermediary party has taken place, fulfilling thecondition for allowing the source transfer of held resources to thepreceding intermediary party. This source transfer may be thedestination transfer for another intermediary party, and may generateanother transfer confirmation receipt, which that intermediary party maythen use as evidence to cause another resource tracking system toperform the source transfer for that intermediary party, and so on untilthe sender-intermediary resource tracking system is instructed toperform the source transfer for that intermediary party, transferringthe sending party's resources. The last intermediary may instruct bothits intermediary party's source and destination transfers, while everyother intermediary in the transfer may instruct its intermediary party'ssource transfer upon receiving a transfer confirmation receiptconfirming that intermediary party's destination transfer. The resourcetracking systems in the transfer chain may transfer held resources inseries, starting with the resource tracking system between the lastintermediary party and the receiving party, for example, thelast-intermediary-receiver resource tracking system, and ending with theresource tracking system between the sending party and an intermediaryparty, for example, the sender-intermediary resource tracking system. Insome implementations, a resource tracking system may not transfer heldresources if a resource tracking system closer in the transfer chain tothe receiving party has not yet transferred held resources. The senderand receiver may also be sent a notification that the transfer wascompleted from any suitable computing device or system involved in thetransfer, including the trusted system and any of the intermediaries. Insome implementations, each intermediary party in a transfer chain may bea subcontractor. For example, a transfer chain may be constructediteratively. The sending party may contact a first intermediary partythat may agree to be responsible for the transfer of resources to thereceiving party. The first intermediary party may then find a secondintermediary party to act as a subcontractor, agreeing to be responsiblefor the transfer of resources from the first intermediary party to thereceiving party. The second intermediary party may then find a thirdintermediary party to act as a subcontractor, and so on until anintermediary party that will directly transfer resources to thereceiving party is subcontracted, completing the construction of thetransfer chain.

In some implementations, an intermediary may instruct a resourcetracking system to perform its source transfer at any time. For example,the intermediary may send an instruction to a resource tracking systembetween the intermediary and a preceding intermediary to perform thesource transfer for the intermediary as soon as the intermediaryreceives an indication that the sender has authorized the transfer basedon the quote. The resource tracking system may cache the instruction,and may only perform the transfer once a proper hold on the resourcesfor the source transfer has been put in place, and the condition of thathold fulfilled by either the receiving of a signed message or thereceiving of evidence, such as a transfer confirmation receipt, that thedestination transfer was successful.

When resources are transferred to the receiving party, for example, onan intermediary-receiver resource tracking system, the transfer mayinclude a notification to the receiving party indicating an identity ofthe sending party and/or an identification belonging to the particulartransfer. This may allow the receiving party to determine the purpose ofthe received resources. For example, the received resources may be usedto settle a debt owed to the receiving party by the sending party. Todetermine that the debt has been fulfilled, the transfer of resourcesmay include, for example, an account number or other identifierassociated with the sending party, so that the receiving party may applythe received resources to the debt of the sending party.

The sender may be a computing device or system used by a sending party,which may be any party who wishes to send, or transfer, resources undertheir control to some other party, for example, the receiving party. Thesender may be used by, for example, any suitable person, group,organization, or computer hardware and software, and may be any suitablecomputing device or system. For example, the sender may a suitablecomputing device such as a laptop, used by person initiate a transfer ofresources. The sender may be used by, for example, a person wishing totransfer currency to another person, business, or organization. Thesender may be used by the sending party, or may be used on behalf of thesending party. For example, the sending party may be a person, and thesender may a bank computer system, which may be used to initiate atransfer of resources on behalf of the sending parting party. The sendermay also be, for example, a server system used by a server managementsystem running on the server system. The sender may be able to initiatea transfer by requesting a quote, for example, by sending communicationsover any suitable wired or wireless connection to an appropriatecomputing system or device for arranging a quote for a transfer. Theconnection may be a network connection, such as a WAN or LAN connection,or may be internal bus connection, for example, within a computingsystem. The sending party may use the sender to send out a request for aquote that may include a quantity they wish to transfer, a quantity theywish the receiver to receive, a type of resource to be transferred fromthe sending party, a type of resource to be received by the receivingparty, and what conditions may be acceptable for the transfer.

The request for a quote may specify either the quantity of a resourcethe sending party wishes to send, or the quantity of a resource thesending party wishes for the receiving party to receive. For example,the sending party may wish to transfer money to a receiving party, andmay have US dollars to transfer. The receiving party may expect toreceive Euros. The sending party, when requesting a quote, may specifythat it will send out a quantity of US dollars, and the receiving partywill then receive some quantity of Euros based on exchange ratesthroughout the transfer and any fees that may be imposed on thetransfer. The sending party may, alternatively, specify that thereceiving party should receive some quantity of Euros, and the quote mayinclude the quantity of US dollars the sending party will need to sendout to ensure that the receiving receives the specified quantity ofEuros, accounting for exchange rates and fees. As another example, asending party may be offering to provide specific computationalresources, such as processor cycles on a computing system controlled bythe sending party, to a receiving party that wishes to receive adifferent computing resource, such as computer-readable storage space ona cloud-based storage system. Such a transfer may occur, for example,via an intermediary that provides a variety of computing resources, andthus is able to make use of and/or provide both processor time or cyclesand storage space. Continuing the example, the sender may specify thequantity to be transferred either in processor operations or in anamount of storage. The quote will then provide the appropriate quantityof processor operations required from the sending party, taking intoaccount the effective conversion factor between processor operations andstorage space according to the intermediary.

Once the sender has received a quote, the sending party may accept thequote and authorize the transfer using the sender. The sender mayauthorize the transfer by, for example, sending a message to anappropriate system or computing device authorizing the placement of ahold on the resources the sending party will be transferring. Theauthorization may be sent, for example, to a trusted system or othersystem that may be responsible for coordinating the transfer, to anintermediary whose intermediary party has resources tracked by the sameresource tracking system that tracks the resources the sending partywishes to send, or to the resource tracking system directly. Once thesender has sent out the authorization of the transfer, the sender maywait to receive notification that the transfer has succeeded or failed.The sending party may also use the sender to check the resource trackingsystem to verify the transfer of the sending party's resources.

A resource tracking system may be any suitable system for trackingresources owned by various parties, and for transferring resourcesbetween parties. A resource tracking system may be any suitablecomputing device or system, with any suitable combination of hardwareand software, such as, for example, a system run by a financialinstitution, a hardware or software component of a server system orcomputing device, or a distributed system, such as, for example, acryptocurrency ledger or blockchain which may exist on a number ofdifferent computing devices and be reconciled in a collaborativefashion, or may be centralized. A resource tracking system may track theownership of resources for any number of parties. A party, such as, forexample, a sending party, intermediary party, or receiving party, mayhave a resource pool on a resource tracking system. The resource poolfor a party on a resource tracking system may include an identificationof the party and quantities of each type of resource owned or controlledby the party and tracked by the resource tracking system. A party mayhave more than one resource type tracked by an individual resourcetracking system

For example, a resource tracking system that is a blockchain for acryptocurrency may include a resource pool for each party, for example,individual or organization, which owns some quantity of thecryptocurrency. The resource pool may identify the owner of thecryptocurrency, for example, using a cryptographic public key storedwith the resource pool, rendering the cryptocurrency accessible only toa party with the corresponding private key. The resource pool may alsoinclude the quantity of cryptocurrency. A resource tracking system for afinancial institution may be a ledger, for example, hosted on a serversystem. The resource pools may be accounts owned by account holders atthe financial institution, and may track the various assets owned by theaccount holder and tracked by the financial institution. For example, aresource pool for a party may include a type and quantity of one or morecurrencies and types and quantities of other types of assets, such asstocks, bonds, certificates of deposit, and the like. Alternatively orin addition, resource pools may include or record ownership of otherresources, such as commodities or any resource that may be commoditized,finished physical goods, raw materials, computing resources, realproperty, or any other resource that may be owned by an entity andtransferred from one entity to another. The account holder may beidentified by any suitable information, and may need proof of identity,such as, for example, a username and password for the account, in orderto access the account. A resource tracking system for a server systemmay be, for example, some suitable combination of hardware and softwarefor tracking resources and ownership of those resources on the serversystem. For example, the resource tracking system for a server systemmay track computing resources such as storage space or processor timeowned by various users of the server system, where the users may bephysical individuals or organizations, or virtual users of a system,such as system accounts, or other processes running on the serversystem.

A resource tracking system may track any type of resource. For example,a resource may be a currency, cryptocurrency, financial instrument,commodity, or computational resource such as processor time, volatileand non-volatile storage space, and network bandwidth. The record ofownership and quantity of a resource by the resource tracking system mayalso be the resource itself, or may be a record of ownership of aresource that exists separately. For example, in a resource trackingsystem that is a blockchain for a cryptocurrency, the record ofownership for some quantity of the cryptocurrency may be thecryptocurrency. In a resource tracking system that tracks ownership ofcommodities, the record of ownership may correspond to physicalresources, for example, gold, oil, or other commodities, that existseparately. Such resources may be transferred by transferring ownership,though the physical instantiation of the resource may not necessarily bemoved.

A resource tracking system may be able to receive a proposed transfer.For example, when a sender requests and accepts a quote for a transfer,a resource tracking system to be involved in the transfer may receive aproposed transfer based on the quote accepted by the sender. Theproposed transfer may indicate to the resource tracking system thatcertain resources are to be transferred from one resource pool, a sourceresource pool, of the resource tracking system, to another resourcepool, a destination resource pool, of the resource tracking system. Theproposed transfer may also indicate the type and quantity of resourcesto be transferred, as well as the conditions on which a hold on theresources to be transferred may be released and the transfer ofresources may be effected. When a proposed transfer has been received,the resource tracking system may determine if an authorization to holdthe resources being transferred is also present. If such a holdauthorization is present, the resource tracking system may place thehold on the resources and send out a prepared transfer receipt.Otherwise, the resource tracking system may send out a proposed transferreceipt, and wait to receive the proper hold authorization for thetransfer before sending out a prepared transfer receipt. Proposed andprepared transfer receipts may be sent to any suitable computing deviceor system, such as, for example, a trusted system, a coordinator of thetransfer, or an intermediary for an intermediary party that may be theowner of the destination resource pool on the resource tracking system.

A resource tracking system may be able to place a hold on a resource.For example, a resource tracking system may receive authorization fromthe party that owns the resources tracked by the resource trackingsystem to place a hold on a specified quantity of a specified type ofresource in connection with a transfer. The hold authorization may besent along with a proposed transfer, or may arrive later, and mayspecify the proposed transfer to which it is connected. The resourcetracking system may place a hold on the specified quantity of thespecified type of resource in the resource pool owned by the party thatsent the hold authorization. The hold may prevent the transfer of thespecified quantity of resources and/or a specific resources whosequantity is equal to the specified quantity unless and until theconditions of the hold are satisfied. For example, a hold may be placedon $20 of an account having a $100 balance. The hold may prevent $20 ofthe balance from being transferred until a message is receivedindicating that the condition of the hold has been fulfilled, ensuringthat the account will always have at least $20 in it while the hold isin place. Similarly, for resources that may be distinct, such as whereaccess to specific blocks of memory is to be transferred, the hold mayprevent other transfers or uses of the particular resources unless anduntil the conditions of the hold are fulfilled. The hold may last for acertain time period. The time period may be any suitable time period,including seconds or fractions thereof, minutes, hours, or days. Theresource tracking system may be able to release the hold on the resourcewhen the time period expires. A hold may specify one or more conditionsthat must be satisfied to be released. For example, a hold may specifythat a message be received from a third party indicating a level oftrust associated with one or more counterparties before the hold can bereleased. Likewise, a hold may specify that a message be received from athird party indicating that the proposed transfer is compliant withrelevant laws, regulations and/or rules.

A resource tracking system may automatically effect the transfer (i.e.,cause the transfer to occur) of held resources from a source resourcepool to a destination resource pool upon fulfillment of conditionsassociated with the hold, and the receiving of an instruction to executethe transfer. The conditions may be, for example, the receiving of asigned message from trusted system indicating that the transfer canproceed. For example, a resource tracking system may receive a signedmessage from a trusted system, in connection with a prepared transferfor which resources have been held. Upon receiving the signed messagefrom the trusted system and an execute instruction sent out, forexample, from a computing device, by the party which owns thedestination resource pool for the prepared transfer, the resourcetracking system may automatically transfer the held resources from thesource resource pool to the destination resource pool. The conditionsmay be, for example, the receiving of a receipt that may be evidencethat the destination transfer for the transfer, which may be a sourcetransfer, has taken place on another resource tracking system. Forexample, a resource tracking system may receive a transfer confirmationreceipt, which may be cryptographically signed, which may indicate thatthe party which owns the destination resource pool has had resourcesthey own on another resource tracking system transferred on thatresource tracking system to another party in the transfer chain. Thismay be evidence that the destination transfer for the source transferhas been completed. Upon receiving the transfer confirmation receipt andan execute instruction sent by a computing device used by the partywhich owns the destination resource pool for the prepared transfer, theresource tracking system may automatically transfer the held resourcesfrom the source resource pool to the destination resource pool. Theconditions may be, for example, evidence that a smart contract is beingexecuted. For example, the transfer chain may be set up in connectionwith a smart contract, and may be transferred upon execution of thesmart contract. A signed message, for example, from the system executingthe smart contract, may be received by a resource tracking system. Uponreceiving the signed message indicating that the smart contract is beingexecuted, the resource tracking system may automatically transfer theheld resources from the source resource pool to the destination resourcepool. The conditions may also be, for example, a digital signatureconfirming the occurrence of an event, such as the delivery of aphysical package or goods by a delivery service.

When a transfer is completed, the resource tracking system may be ableto send out a transfer confirmation receipt, indicating that thetransfer of resources was successful. The transfer confirmation receiptmay be sent to any suitable computing device or system, including, forexample, a trusted system, a coordinator of the transfer, or a computingdevice or system used by any other party to the transfer, including, forexample the party who owned the source resource pool for the transfer. Atransfer confirmation receipt from a resource tracking system may beevidence that the destination transfer for a source transfer wascompleted, fulfilling transfer conditions at another resource trackingsystem.

A resource tracking system may effect the transfer of held resources bymodifying the quantities of resources recorded as held by the partieswho own the resource pools involved in the transfer For example, totransfer held resources from a source resource pool to destinationresource pool, the resource tracking system may, simultaneously orsequentially, decrease the quantity of the resource recorded as owned bythe party which owns the source resource pool and increase the quantityof the resource recorded as owned by the party which owns thedestination resource pool. The quantity of the resource recorded in thesource resource pool may be decreased by the same quantity that thequantity of the resource recorded in the destination resource pool isincreased. This quantity may be, for example, the quantity of theresource on which the hold was placed, or may be a different quantity,for example, higher or lower, for example to account for positive ornegative fees involved in the transfer. A resource tracking system maybe able to increase and decrease the quantity of resources that aretracked in resource pools on the resource tracking system, and may onlybe able to transfer resources between two parties who both have resourcepools on the resource tracking system. When held resources aretransferred, the resource transfer system may transfer specificresources that were held, or may transfer an appropriate quantity ofresources, which may or not include any specific resources that may havebeen held. For example, if a hold is place on 20 US dollars in anaccount with 100 US dollars, the hold may be placed on any 20 USdollars, or on specific US dollars, for example, US dollars 1-20. Whenthe held US dollars are transferred, the resource tracking system maytransfer specifically held dollars, for example, US dollars 1-20, or maytransfer any 20 US dollars, for example, US dollars 11-30, or US dollars81-100, or US dollars 51-60 and 75-84.

In some implementations, a resource tracking system may be able totransfer specific resources between resources tracking pools. Forexample, when transferring commodities, a resource tracking system maybe able to transfer commodities held at a specific location betweenresource pools. The resource quantities for a resource with a physicalinstantiation may also indicate where the physical intention is located.For example, gold may be held at specific storage facility. The resourcetracking system may transfer such resources by decrementing andincrementing in both resource pools a quantity of resource located in aparticular location. For example, a resource pool may include goldstored at a storage facility and a storage facility B. The resourcetracking system may transfer, to another resource pool, only gold fromstorage facility A. The resource tracking system may decrement theamount of gold recorded as stored at storage facility A in the sourceresource pool, and increase the amount of gold recorded as stored instorage facility A in the destination resource pool. Specific resourcestransferred by the resource tracking system may also include, forexample, physical items of which there may be one or few copies, suchas, for example, artwork including painting, sculptures, and prints,artifacts, collector's items such as sports memorabilia and comic books,jewelry, precious stones, and any other such item, or mass marketedgoods, such as smartphones, foodstuffs, and so on.

The transfer of held resources from a source resource pool to adestination resource pool by the resource tracking system may bedeterministic upon the fulfillment of the conditions associated with thehold and the receiving of an instruction to execute the transfer. Theresource tracking system, as a computing device or system with anysuitable combination of hardware and software, may always automaticallyeffect the transfer of held resources on fulfillment of the conditionsand the receiving of an instruction to execute the transfer, without theability to interrupt or halt the transfer once the conditions arefulfilled and the instruction received. This may eliminate the risk thatheld resources will not be transferred even after the conditionsassociated with the hold are fulfilled and the instruction to transferhas been received, as the transfer may take place without interventionfrom outside parties, human or otherwise. This may ensure that any partythat has resources transferred from it in a destination transfer and hasreceived a transfer confirmation receipt may have resources transferredto it in a source transfer by sending transfer execute instruction andtransfer confirmation receipt.

An intermediary may be a computing device or system used by anyintermediary party who agrees to participate in a transfer, as part ofthe transfer chain between the sending party and the receiving party.The intermediary may be used by, for example, any suitable person,group, organization, or computer hardware and software, such as aprogram or process, and may be any suitable computing device or system.For example, the intermediary may be a person using a suitable computingdevice to participate in transfers, a computing system belonging to anexchange, financial institution, or trader, or may be, for example, partof a server management system running on a server system. Theintermediary may be able to receive requests for quotes, and respondwith quotes, for example, by sending communications over any suitablewired or wireless connection to an appropriate computing system ordevice that may be responsible for arranging the transfer chain from thesending party to the receiving party. The connection may be a networkconnection, such as a WAN or LAN connection, or may be internal busconnection, for example, within a computing system. The intermediaryparty use the intermediary to respond to quote requests with quotes thatmay include, for example, any limits on the quantity of resources theintermediary party may be able to transfer, and any exchange rate theintermediary party may use, and any fees that the intermediary party mayextract during the transfer.

The intermediary may be able to receive proposed transfers. When a quotesent out by the intermediary has been accepted, for example, by thesending party using the sender, the intermediary may be added to thetransfer chain between the sending party and the receiving party. Theproposed transfer received by the intermediary may indicate only theportion of the overall transfer in which the intermediary willparticipate, including the resource tracking system on which theintermediary party will receive resources from another party, and theresource tracking system on which the intermediary party will transferresources. The proposed transfer may also include identify the party towhich the intermediary party will transfer resources, and the party theintermediary party will receive resources from. The proposed transfermay also include the conditions associated with the holds on resourcesthat will be placed during the transfer. The intermediary may verifythat that the conditions on the holds are either the receiving of asigned message from a computing device or system trusted by all of theparties participating in the transfer indicating that the transfer canproceed or that a source transfer of resources to a party may proceedupon receiving a receipt that may be evidence that a destinationtransfer of resources from that party has taken place. If the proposedtransfer does not include either of these conditions on the holds, theintermediary may refuse to participate in the transfer.

The intermediary may be able to place a hold on resources controlled bythe intermediary party at a resource tracking system. For example, ifthere is a trusted system, the intermediary may send an authorization tohold the intermediary party's resources to the resource tracking systemthat will transfer the intermediary's party resources once the proposedtransfer has been received and verified. If there is no trusted system,the intermediary may send the authorization to hold the intermediaryparty's resources to the resource tracking system that will transfer theintermediary's party resources after receiving a prepared transferreceipt indicating that the resources that will be transferred to theintermediary party have been held at the resource tracking system thatwill transfer the resources to the intermediary party. This may allowthe intermediary party to ensure that the resources for its sourcetransfer are held and ready to be transferred before the intermediaryparty authorizes a hold on the resources for its destination transfer.

The intermediary party may be able to receive signed message from atrusted system and send execute instructions to resource trackingsystems based on the receiving of the signed message. For example, thetrusted system may send a signed message to all computing devices andsystems in a transfer chain once it has received prepared transferreceipts from all resource tracking systems in the transfer chain. Uponreceiving the signed message, the intermediary may send executionsinstructions to resource tracking systems. For example, the intermediarymay send an execute instruction to resource tracking system on which theintermediary party and a party which has held resources to transfer tothe intermediary party, have resource pools, causing the resources to betransferred to the intermediary party's resource pool. If there is alsoa resource tracking system at which the intermediary party and thereceiving party have resource pools, the intermediary may send anexecute instruction to that resource tracking system to transferresources from the intermediary party to the receiving party. Theresource tracking systems may perform the transfers automatically, asthe signed message from the trusted system may have fulfilled theconditions for transferring any held resource and the executeinstruction from the intermediary may have been received.

The intermediary may be able to send execute instruction to a resourcetracking system based on the receiving of a prepared transfer receipt.For example, if there is no trusted system and the intermediary is thelast intermediary in the transfer chain, the intermediary may sendinstructions to a resource tracking system between the intermediaryparty and the receiving party to execute a transfer of the intermediaryparty's resources to the receiving party upon receiving a preparedtransfer receipt indicating that resources to be transferred to theintermediary party have been held at another resource tracking system.This may ensure that the intermediary only sends an instruction totransfer the intermediary party's resources to the receiving party, asthe destination transfer for the intermediary party, when the resourcesthat will be transferred to the receiving party, as the source transferfor the intermediary party, have been held.

The intermediary may be able to receive a transfer confirmation receiptfrom a resource tracking system and send the received transferconfirmation receipt to another resource tracking system. For example,if there is a trusted system, the intermediary may receive a transferconfirmation receipt for any transfers performed by resource trackingsystems on instruction from the intermediary. If there is no trustedsystem, the intermediary may receive a transfer confirmation receiptfrom a resource tracking system on which a destination transfer for theintermediary party occurred, transferring resources from theintermediary party to another party, such as another intermediary partyor the receiving party. The intermediary may then send the transferconfirmation receipt to a resource tracking system on which resources tobe transferred to the intermediary party, from, for example, anotherintermediary party or the sending party, have been held, as the sourcetransfer for the intermediary party. The intermediary may also send aninstruction to execute the transfer to the resource tracking systemalong with the transfer confirmation receipt. The transfer confirmationreceipt may fulfill the condition of the hold on the resources to betransferred to the intermediary party, so the instruction to execute thetransfer may cause the resource tracking system to automaticallytransfer the held resources to the intermediary party.

The trusted system may be any suitable computing device or system thatmay be trusted by all of the parties and systems involved in a transferchain between the sending party and the receiving party. For example,the trusted system may be associated with a financial institution or anexchange, a computing resource trading system, an energy exchange systemor may be trusted process on a server system. The trusted system may beany computing device or system in the transfer chain, for example, oneof the intermediaries, or may be a computing device or system outside ofthe transfer chain. The trusted system may also be a network, forexample, an exchange network, which may include several intermediariesfor several intermediary parties, all of which are trusted by thetrusted by the trusted system. The trusted system may also be adecentralized consensus network. The trusted system may also be a groupof independent servers that may verify the fulfillment of non-holdconditions, such as conditions related to smart contracts, and mayprovide signed messages to fulfill hold conditions on various resourcetracking systems in the transfer chain.

The trusted system may be selected by, for example, the sending party,and may also be used by the sending party to receive a quote based onquotes from the intermediary parties and to coordinate the transferacross all of the parties and computing devices and systems in thetransfer chain. The trusted system may be able to communicate with allcomputing devices and systems involved in the transfer chain in anysuitable manner, such as through a network connection, although thetrusted system may not need to be able to communicate with the receiver.The trusted system may receive proposed transfer receipts and preparedtransfer receipts, and may be able to verify when all of the resourcetracking systems in the transfer chain have sent prepared transferreceipts. Once all the prepared transfer receipts have received, thetrusted system may signed a signed message, which may be, for example,cryptographically signed, to the intermediaries and resource trackingsystems in the transfer chain. The signed message from the trustedsystem may fulfill the condition of the holds on resources at theresource tracking systems, and may cause the intermediary parties tosend transfer execute instructions to the resource tracking systems,resulting in the resource tracking systems automatically transferringthe held resources, completing the transfer across the transfer chain.

For example, a sending party may have an account at a financialinstitution that includes a quantity of US dollars. The sending partymay accept a quote to send 100 US dollars to a receiving party, who mayexpect to receive Euros, involving a transfer chain with an intermediaryparty that has an account at the same financial institution as thesending party, and has an account at another financial institution wherethe receiving party also has an account. The sender, used by the sendingparty, may send a hold authorization to the resource tracking system, orledger, of the financial institution at which the sending party has anaccount. The resource tracking system of the financial institution mayalso receive the proposed transfer, indicating that the resourcetracking system should transfer 100 US dollars from the account of thesending party to the account of the intermediary party. The holdauthorization sent by the sender may indicate that 100 US dollars are tobe held in the sending party's account. The resource tracking system ofthe financial institution may place a hold on 100 US dollars in theaccount of the sending party, and may send out a prepared transferreceipt indicating the hold has been placed. The prepared transferreceipt may be sent to a trusted system, which may then send theprepared transfer receipt to the intermediary, or may be sent to acoordinator of the transfer and then to the intermediary, or directly tothe intermediary.

If there is a trusted system, the condition of the hold of the 100 USdollars in the sending party's account may be the receiving of a signedmessage from the trusted system indicating that the transfer canproceed. The trusted system may receive the prepared transfer receiptfrom the resource tracking system of the financial institution where thesending party and intermediary party have accounts. The trusted systemmay then wait to receive another prepared transfer receipt from theresource tracking system of the financial institution at which theintermediary party and receiving party have accounts. Upon receiving theprepared transfer receipt indicating that the hold has been placed onthe 100 US dollars in the sending party's account, the intermediary maysend out an authorization of a hold on a quantity of Euros in theintermediary party's account at the resource tracking system of thefinancial institution where the intermediary party and receiving partyhave accounts. The hold may be for a quantity of Euros of equal value to100 US dollars, depending on the exchange rate used by the intermediary,and adjusted for any fees. For example, if the intermediary uses anexchange rate of 1.10 US dollars to 1 Euro and a fee of 0.5%, theintermediary may place a hold on 90.46 Euros, with the condition of thehold being the receiving of the signed message from the trusted systemindicating that the transfer can proceed. The resource tracking system,after receiving the authorization to hold the 90.46 Euros in theintermediary party's account, may send a prepared transfer receipt tothe trusted system indicating that the 90.46 Euros have been held at theintermediary party's account. The trusted system may then send a signedmessage to the computing devices or system for all of the parties in thetransfer chain, including the resource tracking systems and theintermediary, indicating that the transfer may proceed. In someimplementations, the trusted system may not send the signed message tothe sender and receiver. The intermediary may send an instruction toexecute transfers to both resources tracking systems in the transferchain, which, combined with the signed message from the trusted system,may fulfill the conditions of the holds on both the 100 US dollars andthe 90.46 Euros. The resource tracking system at the financialinstitution at which the sending party and intermediary party haveaccounts may automatically transfer the held 100 US dollars from thesending party's account to the intermediary party's account, forexample, decreasing the sending party's account by 100 US dollars andincreasing the intermediary party's account by 100 US dollars. Theresource tracking system at the financial institution at which theintermediary party and receiving party have accounts may automaticallytransfer the held 90.46 Euros from the intermediary party's account tothe sending party's account, for example, decreasing the intermediaryparty's account by 90.46 Euros and increasing the receiving party'saccount by 90.46 US dollars. The receiver may receive transferconfirmation receipts from both resource tracking systems, andnotification of the completion of the transfer may be sent to the senderand to the receiver.

If there is no trusted system, the condition of the hold of the 100 USdollars in the sending party's account may be the receiving of evidencethat a destination transfer has occurred at another resource trackingsystem, for which the transfer of the 100 US dollars from the sendingparty to the intermediary party may serve as the source transfer. Thedestination transfer may be, for example, the transfer of Euros from theintermediary party to the receiving party by the resource trackingsystem at the financial institution at which both the intermediary partyand receiving party have accounts. Upon receiving the prepared transferreceipt indicating that the 100 US dollars have been held, theintermediary may send an instruction to the resource tracking system atthe financial institution where both the intermediary party andreceiving party have accounts to transfer Euros from the account of theintermediary party to the account of the receiving party. Because nohold has been placed on the Euros, no condition may need to be met fortheir transfer so long as their owner, the intermediary party, hasinstructed the transfer. The instruction sent by the intermediary mayindicate that 90.46 Euros should be transferred from the intermediaryparty's account to the receiving party's account. The resource trackingsystem that receives the instruction may complete the transfer, forexample, decreasing the intermediary party's account by 90.46 Euros, andincreasing the receiving party's account by 90.46 Euros. The receivermay be notified of the transfer. Completion of the transfer of the 90.46Euros may result in a transfer confirmation receipt being sent to theintermediary. The intermediary may then send the transfer confirmationreceipt to the resource tracking system of the financial institution atwhich the sending party and the intermediary party have accounts. Thetransfer confirmation receipt may be evidence that the destinationtransfer, the transfer of the 90.46 Euros, for the source transfer, thetransfer of the 100 US dollars, has been completed. The resourcetracking system may, upon receiving an instruction from the intermediaryto transfer the 100 US dollars, determine that the conditions on thehold of the 100 US dollars have been fulfilled, and may automaticallytransfer the 100 US dollars, for example, decreasing the sending party'saccount by 100 US dollars, and increasing the intermediary party'saccount by 100 US dollars. The intermediary may receive a transferconfirmation receipt, and the sender may be notified that the transferwas completed.

For example, a sending party may have an account at a first bank thatincludes a quantity of US dollars. The account may be recorded on thefirst bank's ledger. The sending party may owe a receiving party 100Euros. The sending party may send out a request for a quote. The requestmay specify that the sending party will be transferring US dollars, andthat the receiving party will need to receive 100 Euros. The quoterequest may be sent to various traders to obtain quotes, and a transferchain and may be assembled from their quotes. The sending party mayreceive a quote which may be assembled from the quotes of the tradersthat are part of the transfer chain, and may specify how many US dollarsthe sending party will have to transfer, and the trader to whom the USdollars will be transferred, in order for the receiving party to receive100 Euros. For example, if total transfer costs across the transferchain are 1.5% of the amount to be received by the receiving party, andthe exchange rate is 1.10 US dollars per 1 Euro, the sending party mayneed to transfer out 111.65 US dollars for the receiving party toreceive 100 Euros. During the transfer, 1.65 US dollars, or 1.5% of the110 US dollars needed to ensure the receiving party receives 100 Euros,may be kept by the first trader and the second trader in total astransfer costs.

The transfer chain may include a first trader, which may have an accountin US dollars at the first bank and a cryptocurrency account ondecentralized ledger and a second trader, which may have acryptocurrency account on the decentralized ledger and an account inEuros at a second bank, recorded on the second bank's ledger. Thereceiving party may also have an account in Euros in the second bank.The cryptocurrency may be converted into dollars at an exchange rate of1000 units per 1 US dollar.

The first trader, second trader, first bank, decentralized ledger, andsecond bank may each receive a separate proposed transfer. The proposedtransfers may be received before, after, or in conjunction with a holdauthorization sent by the sending party to the first bank, indicatingthat the send party has accepted the quote and initiated the transferacross the transfer chain. The proposed transfers may include theconditions on any holds placed by the first bank, decentralized ledger,and second bank. The hold conditions may be either the receiving of asigned message from a trusted system, or the receiving of evidence thata destination transfer was completed.

The proposed transfer received by the first bank may indicate that thefirst bank will receive a hold on 111.65 US dollars in the sendingparty's account, place the hold once authorization is received from thesending party, and transfer the 116.50 US dollars to the first trader'saccount when the hold condition is fulfilled and instructions arereceived from the first trader.

The proposed transfer received by the first trader may indicate that thefirst trader will receive 111.65 US dollars into its account at thefirst bank, as a source transfer, and will authorize a hold on 110,770units of cryptocurrency in its account on the decentralized ledger to betransferred to the second trader, as a destination transfer, accountingfor a transfer cost of 0.08% of 110 US dollars.

The proposed transfer received by the decentralized ledger may indicatethat the decentralized ledger will receive a hold on 110,770 units ofcryptocurrency in the first trader's account, place the hold onceauthorization is received from the first trader, and transfer the110,770 units to the second trader's account when the hold condition isfulfilled and instructions are received from the first trader.

The proposed transfer received by the second trader may indicate thatthe second trader will receive 110,770 units of cryptocurrency from thefirst trader, as a source transfer, and will either authorize a hold on100 Euros in it account at the second bank to be sent to the receivingparty or instruct the second bank to transfer 100 Euros from its accountto the receiving party's account without a hold, as a destinationtransfer, in both cases accounting for a transaction cost of 0.07% of110 US dollars.

The proposed transfer received by the second bank may indicate that thesecond bank will either receive a hold on 100 Euros in the secondtrader's account, place the hold once authorization is received from thesecond trader, and transfer the 100 Euros to the receiving party'saccount when the hold condition is fulfilled and instructions arereceived from the first trader, or will transfer 100 Euros from thesecond trader's account to the receiving party's account wheninstructions are received from the second trader without placing anyhold.

The sending party may send a hold authorization to the first bank'sledger, authorizing the first bank to place a hold on 111.65 US dollarsin the sending party's account in conjunction with the proposedtransfer. The hold authorization may be a cryptographically signedmessage from the sending party. The first bank's ledger, upon receivingthe hold authorization, may place the hold on 111.65 US dollars in thesending party's account on the first bank's ledger, and may send out aprepared transfer receipt indicating that the hold has been placed on111.65 US dollars in the sender's account at the first bank.

The first trader may receive the prepared transfer receipt that was sentout by the first bank's ledger. This may indicate to the first traderthat the 111.65 US dollars that will be transferred to it have been heldin the sending party's account at the first bank. The first trader maysend a hold authorization to the decentralized ledger, authorizing thedecentralized ledger to place a hold on 110,770 units of cryptocurrencyin the first trader's account in conjunction with the proposed transfer.The decentralized ledger, upon receiving the hold authorization, mayplace the hold on 110,770 units of cryptocurrency in the first trader'saccount, and may send out a prepared transfer receipt indicating thatthe hold has been placed on 110,770 units of cryptocurrency in firsttrader's account at the decentralized ledger.

The second trader may receive the prepared transfer receipt that wassent out by the decentralized ledger. This may indicate to the secondtrader that the 110,770 units of cryptocurrency that will be transferredto it have been held in the first trader's account at the decentralizedledger.

If there is a trusted system, and the condition of the holds asindicated in the proposed transfers is the receiving of a signed messagefrom the trusted system, the second trader may send a hold authorizationto the second bank's ledger, authorizing the second bank to place a holdon 100 Euros in the second trader's account in conjunction with theproposed transfer. The second bank's ledger, upon receiving the holdauthorization, may place the hold on 100 Euros in the second trader'saccount, and may send out a prepared transfer receipt indicating thatthe hold has been placed on 100 Euros in the second trader's account atthe second bank.

The trusted system may receive the prepared transfer receipts from thefirst bank's ledger, the decentralized ledger, and the second bank'sledger. The trusted system may confirm that the proper quantities of theproper asset types have been held at each ledger in the transfer chain.The trusted system may then send the signed message to the first bank'sledger, the first trader, the decentralized ledger, the second trader,and the second bank's ledger.

The signed message may fulfill the conditions on each of the holds ateach of the ledgers, and may cause the first trader to send an executeinstruction to the first bank's ledger and the second trader to send anexecute instruction to the decentralized ledger and to the second bank'sledger. The first bank's ledger, upon receiving the signed message fromthe trusted system and execute instruction from the first trader, mayrelease the hold on 111.65 US dollars in the sending party's account andtransfer 111.65 US dollars out of the sending party's account and intothe first trader's account. The decentralized ledger, upon receiving thesigned message from the trusted system and the execute instruction fromthe second trader, may release the hold on 110,770 units ofcryptocurrency in the first trader's account and transfer 110,770 unitsof cryptocurrency out of the first trader's account and into the secondtrader's account. The second bank's ledger, upon receiving the signedmessage from the trusted system and execute instruction from the secondtrader, may release the hold on 100 Euros in the second trader's accountand transfer 100 Euros out of the sending party's account and into thereceiving party's account. Each ledger may send out a transferconfirmation receipt, which may be used to confirm a successfultransfer.

If there is no trusted system, and the condition of the holds asindicated in the proposed transfers is the receiving of a evidence thatdestination transfer was completed, the second trader may, uponreceiving the prepared transfer receipt from the decentralized ledger,send an execute instruction to the second bank's ledger to cause 100Euros to be transferred from the second trader's account to thereceiving party's account. The second bank's ledger, upon receiving theexecute instruction from the second trader, may execute the transfer,taking 100 Euros from the second trader's account and adding 100 Eurosto the receiving party's account. The second bank's ledger may send outa transfer confirmation receipt, which may indicate the success of thetransfer of the 100 Euros from the second trader to the receiving party.

The second trader may receive the transfer confirmation receipt, and maysend the transfer confirmation receipt and an execute instruction to thedecentralized ledger. The transfer confirmation receipt may indicate tothe decentralized ledger that the destination transfer of 100 Euros fromthe second trader to the receiving party was completed successfully,fulfilling the hold on 110,770 units of cryptocurrency in the firsttrader's account. The decentralized ledger may release the hold on110,770 units of cryptocurrency in the first trader's account, and maytransfer 110,770 units of cryptocurrency out of the first trader'saccount and into the second trader's account. The decentralized ledgermay send out a transfer confirmation receipt, which may indicate thesuccess of the transfer of the 110,770 units of cryptocurrency from thefirst trader to the second trader.

The first trader may receive the transfer confirmation receipt, and maysend the transfer confirmation receipt and an execute instruction to thefirst bank's ledger. The transfer confirmation receipt may indicate tothe first bank's ledger that the destination transfer of 110,770 unitsof cryptocurrency from the first trader to the second trader wascompleted successfully, fulfilling the hold on 111.65 US dollars in thesending party's account. The first bank's ledger may release the hold on111.65 US dollars in the sending party's account, and may transfer111.65 US dollars out of the sending party's account and into the firsttrader's account. The first bank's ledger may send out a transferconfirmation receipt, which may indicate the success of the transfer ofthe 111.65 US dollars from the sending party to the first trader.

In this way, the sending party may send out 111.65 US dollars, and thereceiving party may receive 100 Euros. The first trader may keep atransfer fee of 0.88 US dollars, as it may receive 111.65 US dollars,and may transfer out 110,770 units of cryptocurrency, worth 110.77 USdollars. The second trader may keep a transfer fee of 0.77 US dollars inthe form of 770 units of cryptocurrency, as it may receive 110,770 unitsof cryptocurrency, worth 110.77 US dollars, and may transfer out 100Euros, worth 110 US dollars.

Each intermediary party may, as part of the quote sent from itsintermediary, request a guaranteed minimum transfer. The guaranteedminimum transfer may indicate some minimum quantity of resources thatwill be transferred to the intermediary party in the event that thetransfer fails. The guaranteed minimum may be based on, for example, howtrustworthy the requester of the quote, or sending party, is to theintermediary party, what percent of the intermediary party's resourcesmay need to have a hold placed on them during the transfer, and a locktimeout the intermediary is requesting for the transfer. The guaranteedminimum transfer may ensure that, if the transfer fails, for example,due to malicious action by the sending party, the intermediary party maybe compensate for having placed a hold its resources and therefore beingunable to use them for the period of time before the transfer failed.Each intermediary party in a transfer chain may have a smallerguaranteed minimum transfer than the preceding intermediary party, aseach intermediary party may request a shorter lock timeout than thepreceding intermediary party, and each intermediary party may need tocover the minimum guaranteed transfer that may be required by allsubsequent intermediary parties in the transfer chain.

A guaranteed minimum transfer may occur when a transfer fails and holdson resources are rolled back. For example, the sending party may, usingthe sender, request and approve a quote, setting up a transfer. Afterplacing a hold on the sending party's resources at a sender-intermediaryresource tracking system, in preparation for transferring the resourcesto an intermediary party, the sender may send a cancellation message tothe resource tracking system, cancelling the transfer and removing thehold on the sending party's resources. The resource tracking system maybe aware of the guaranteed minimum transfer, and may release the hold onthe portion of the sending party's resources that are not covered by theguaranteed minimum. In this way, the intermediary may still send anexecute instruction to the resource tracking system to have theguaranteed minimum of the sending party's resources transferred to theintermediary party. Similarly, if there are other intermediary partiesinvolved in the transfer, those parties may claim a guaranteed minimumtransfer from the held resources of a preceding intermediary party. Theguaranteed minimum transfer for an intermediary party may cover both theresources the intermediary party wishes to claim as a guaranteedminimum, and the resources that succeeding intermediary parties willclaim as a guaranteed minimum. In this way, all intermediary parties ina transfer may claim some resources from the sending party when thetransfer fails, preventing a malicious sending party from purposefullysetting up multiple failed transfers to tie up resources belonging tothe intermediary parties.

As used herein a hold (or “lock”) timeout refers to a specified amountof time that an intermediary will agree to have its resource held at aresource tracking system. If the transfer from the sending party to thereceiving party does not complete before a lock timeout expires, thehold on the resources may be released, and the transfer may fail. Thelock timeout may be short when there is no trusted system, which mayprevent a malicious actor from tying up resources held by intermediaryparties for long periods of time. When there is a trusted system, thelock timeout may be long, for example, days, or unlimited, as allparties may trust the trusted system and therefore be less worried aboutthe risk posed by malicious actors. The lock timeouts in a transferchain may be specified by the requestor of the quote, for example, thesending party or by a coordinator of the transfer. Intermediaries mayalso advertise their acceptable lock timeouts for transfers on variousresource tracking systems.

Any number of resource types may be used between the sending party andthe receiving party. For example, a transfer may involve threeintermediaries for three intermediary parties. The sending party maytransfer US dollars to the first intermediary party on a first resourcetracking system at which the sending party and first intermediary partyhave resource pools. The first intermediary party may transfer acryptocurrency to the second intermediary party on a second resourcetracking system at which the first intermediary party and the secondintermediary party have resource pools. The second intermediary partymay transfer a commodity, for example, oil, to the third intermediaryparty on a third resource tracking system on which both the secondintermediary party and the third intermediary party have resource pools.The third intermediary party may transfer Euros to the receiving partyon a fourth resource tracking system on which both the thirdintermediary party and the receiving party have resource pools. In thisway, the sending party may use US dollars to send Euros to the receivingparty.

For each transfer, the value of the resource transferred by a party, inthe destination transfer for the party, may be different from than thevalue of the resource that was transferred to that party, in the sourcetransfer for the party. For example, the value of cryptocurrencytransferred from the first intermediary party to the second intermediaryparty may be less than the value of the US dollars transferred to thefirst intermediary party from the sending party. The difference in valuemay be, for example, a transfer cost or fee imposed by the intermediaryparty on the transfer. Likewise, the value of the oil transferred by thesecond intermediary party to the third intermediary party may be lessthan the value of the cryptocurrency transferred to the secondintermediary party by the first intermediary party. The quotes providedby intermediary parties may include any fees or transfer costs, and thesending party may determine the quantity of its resources that will beheld based on these fees or transfer cost and the value of the resourcesthe sending party intends for the receiving party to receive. Thetransfer costs or fees may be zero, or may be negative, for example,resulting in a party transferring resources of greater value than theresources the party has transferred to it.

A transfer may be initiated by parties other than the sending party. Forexample, the receiving party may use the receiver to initiate a pulltransfer. In a pull transfer, the receiver may request, receive, andaccept a quote, and may then obtain the sending party's authorization tohold the sending parties resources to initiate the transfer. The sendingparty may be obligated to authorize the hold on its resources, and thehold authorization may be automatically sent from the sender uponrequest from the receiver. A transfer may also be initiated by a partythat is not the sending party or receiving party. For example, thesending party and receiving party may have agreed to a smart contract,which may be a computer-based contract that uses any suitablecombination of hardware and software to determine when contractconditions have been met and execute the terms of the contract. Forexample, the smart contract may specify that when a condition is met,the sending party will transfer 100 US dollars in Euros to the receivingparty. Upon detecting that the condition has been met, the computingdevice or system on which the smart contract is hosted may request,receive, and accept a quote for a transfer of 100 US dollars in Eurosfrom the sending party to the receiving party. The smart contract'scomputing device may be able to place a hold on the sending party'sresources, the 100 US dollars, to initiate the transfer, or mayotherwise be able to compel the sender to automatically send out such ahold authorization.

A transfer chain may include parallel paths. For example, a sendingparty may wish to transfer a large quantity of resources to thereceiving party. There may be no suitable intermediary party that, byitself, controls enough resources on a resource tracking system on whichthe receiving party has a resource pool to make the transfer to thereceiving party. The transfer chain may be set up with parallel paths,so that the sending party transfers resources to more than oneintermediary party, and the receiving party receives resources from morethan one more intermediary. The sending party may transfer resources tointermediary parties on the same resources tracking system, on which allparties have a resource pool, or on separate resource tracking systems.Likewise, the receiving party may receive resources on a resourcetracking system on which the receiving party, and all partiestransferring resources to the resource pool of the receiving party, havea resource pool, or on separate resource tracking systems. Because thepaths may be parallel, it may be possible for the transfer across one ofthe paths to fail while the transfer on other paths succeeds.

For example, a sending party may wish to transfer 1,000,000 US dollars,in Euros, to a receiving party. No single intermediary party may haveenough Euros in a resource pool on a resource tracking system on whichthe receiving party has a resource pool to complete this transfer.Parallel paths may be set up in the transfer chain, for example, with afirst path through a first intermediary for a first intermediary partythat has 600,000 US dollars' worth of Euros in a resource pool on theresource tracking system between the first intermediary party and thereceiving party, and a second path through a second intermediary for asecond intermediary party that has 400,000 US dollars' worth of Euros ina resource pool on the same resource tracking system. Transfers alongwith the first and second path may execute in parallel. For example, thesender may send a hold authorization for 1,000,000 US dollars to aresource tracking system on which the sending party, first intermediaryparty, and second intermediary party all have resource pools. The holdauthorization may indicate that 600,000 US dollars are being held forthe first intermediary party, and 400,000 US dollars are being held forthe second intermediary party. Prepared transfer receipts may be sent tothe first intermediary and the second intermediary. Upon receipt of theprepared transfer receipts, the first intermediary may send an executeinstruction to the resource tracking system on which the firstintermediary party has 600,000 US dollars' worth of Euros, transferringthose Euros to the receiving party's resource pool, and the secondintermediary may send an execute instruction to the same resourcetracking system, transferring 400,000 US dollars' worth of Euros to thereceiving party's resource pool. Both the first intermediary and secondintermediary may receive transfer confirmation receipts, which they maysend to the resource tracking system at which the sending party's1,000,000 US dollars are on hold, along with execute instructions. Thetransfer confirmation receipts may fulfill the condition of the hold ofthe 1,000,000 US dollars', and the execute instruction may result in theresource tracking system transferring 600,000 US dollars to the firstintermediary party's resource pool, and 400,000 US dollars' to thesecond intermediary party's resource pool, completing the transfer. Ifone of the parallel paths fails, for example, the second intermediarydoes not execute the transfer to the receiving party, the other path maystill succeed, for example, the first intermediary may still execute thetransfer to the receiving party, receive a transfer confirmationreceipt, and use the transfer confirmation receipt to fulfill thecondition of the hold of 600,000 of the 1,000,000 US dollars controlledby the sending party, resulting in the transfer of 600,000 US dollars tothe resource pool of the first intermediary.

The resources involved in a transfer may be computational resources,such as, for example, processing time on CPUs, GPUs, cryptographicprocessors, or other general or specialized processor types, storage,either permanent or on a rental basis, including non-volatile storagesuch as magnetic platter based HDD's, Solid State Disks, and other formsof non-volatile flash memory, and volatile memory such as caches andRAM, and bandwidth, including, for example, total amount of incoming andoutgoing network traffic and maximum speeds for incoming and outgoingnetwork traffic. For example, a sending party may have an account on aserver system that includes a quantity of processor time the sendingparty may be entitled to use on the server system. The sending party maybe, for example, a user or organization with an account on the serversystem, or may be a process or program running on the server system,which may or not have its own user account on the server system, but mayhave separately tracked resources which it may use on the server system.The sending party may accept a quote to send 12 months of 1 Terabyte ofSSD storage to a receiving party, who may expect to receive CPUprocessing time, involving a transfer chain with an intermediary partythat has an account on the same server system as the sending party, andhas an account at another server system where the receiving party alsohas an account. The sender, used by the sending party, may send a holdauthorization to the resource tracking system of the server system atwhich the sending party has an account. The resource tracking system ofthe server system may also receive the proposed transfer, indicatingthat the resource tracking system should transfer 12 months of 1 TB ofSSD storage from the account of the sending party to the account of theintermediary party. The hold authorization sent by the sender mayindicate that 12 months of 1 TB of SSD storage are to be held in thesending party's account. The resource tracking system of the serversystem may place a hold on the 12 months of 1 TB of SSD storage in theaccount of the sending party, and may send out a prepared transferreceipt indicating the hold has been placed. The prepared transferreceipt may be sent to a trusted system, which may then send theprepared transfer receipt to the intermediary, or may be sent to acoordinator of the transfer and then to the intermediary, or directly tothe intermediary.

If there is a trusted system, the condition of the hold of the 12 monthsof 1 TB of SSD storage in the sending party's account may be thereceiving of a signed message from the trusted system indicating thatthe transfer can proceed. The trusted system may receive the preparedtransfer receipt from the resource tracking system of the financialinstitution where the sending party and intermediary party haveaccounts. The trusted system may then wait to receive another preparedtransfer receipt from the resource tracking system of the financialinstitution at which the intermediary party and receiving party haveaccounts. Upon receiving the prepared transfer receipt indicating thatthe hold has been placed on the 12 months of 1 TB of SSD storage in thesending party's account, the intermediary may send out an authorizationof a hold on a quantity of CPU processing time in the intermediaryparty's account at the resource tracking system of the financialinstitution where the intermediary party and receiving party haveaccounts. The hold may be for a quantity of CPU processing of equalvalue to 12 months of 1 TB of SSD storage, depending on the exchangerate used by the intermediary, and adjusted for any fees. For example,if the intermediary uses an exchange rate of 1 TB/month of SSD storagefor 600 hours of CPU processing time, and a fee of 0.5%, theintermediary may place a hold on 7164 hours of CPU processing time, withthe condition of the hold being the receiving of the signed message fromthe trusted system indicating that the transfer can proceed. Theresource tracking system, after receiving the authorization to hold the7164 hours of CPU processing time in the intermediary party's account,may send a prepared transfer receipt to the trusted system indicatingthat the 7164 hours of CPU processing time have been held at theintermediary party's account. The trusted system may then send a signedmessage to the computing devices or system for all of the parties in thetransfer chain, including the resource tracking systems and theintermediary, indicating that the transfer may proceed. In someimplementations, the trusted system may not send the signed message tothe sender and receiver. The intermediary may send an instruction toexecute transfers to both resources tracking systems in the transferchain, which, combined with the signed message from the trusted system,may fulfill the conditions of the holds on both the 12 months of 1 TB ofSSD storage and the 7164 hours of CPU processing time. The resourcetracking system at the server system at which the sending party andintermediary party have accounts may automatically transfer the held 12months of 1 TB of SSD storage from the sending party's account to theintermediary party's account, for example, decreasing the sendingparty's account by 12 months of 1 TB of SSD storage and increasing theintermediary party's account by 12 months of 1 TB of SSD storage. Theresource tracking system at the server system at which the intermediaryparty and receiving party have accounts may automatically transfer theheld 7164 hours of CPU processing time from the intermediary party'saccount to the sending party's account, for example, decreasing theintermediary party's account by 7164 hours of CPU processing time andincreasing the receiving party's account by 7164 hours of CPU processingtime. The receiver may receive transfer confirmation receipts from bothresource tracking systems, and notification of the completion of thetransfer may be sent to the sender and to the receiver.

If there is no trusted system, the condition of the hold of the 12months of 1 TB of SSD storage in the sending party's account may be thereceiving of evidence that a destination transfer has occurred atanother resource tracking system, for which the transfer of the 12months of 1 TB of SSD storage from the sending party to the intermediaryparty may serve as the source transfer. The destination transfer may be,for example, the transfer of CPU processing time from the intermediaryparty to the receiving party by the resource tracking system at theserver system at which both the intermediary party and receiving partyhave accounts. Upon receiving the prepared transfer receipt indicatingthat the 12 months of 1 TB of SSD storage have been held, theintermediary may send an instruction to the resource tracking system atthe server system where both the intermediary party and receiving partyhave accounts to transfer CPU processing time from the account of theintermediary party to the account of the receiving party. Because nohold has been placed on the CPU processing time, no condition may needto be met for their transfer so long as their owner, the intermediaryparty, has instructed the transfer. The instruction sent by theintermediary may indicate that 7164 hours of CPU processing time shouldbe transferred from the intermediary party's account to the receivingparty's account. The resource tracking system that receives theinstruction may complete the transfer, for example, decreasing theintermediary party's account by 7164 hours of CPU processing time, andincreasing the receiving party's account by 7164 hours of CPU processingtime. The receiver may be notified of the transfer. Completion of thetransfer of the 7164 hours of CPU processing time may result in atransfer confirmation receipt being sent to the intermediary. Theintermediary may then send the transfer confirmation receipt to theresource tracking system of the server system at which the sending partyand the intermediary party have accounts. The transfer confirmationreceipt may be evidence that the destination transfer, the transfer ofthe 7164 hours of CPU processing time, for the source transfer, thetransfer of the 12 months of 1 TB of SSD storage, has been completed.The resource tracking system may, upon receiving an instruction from theintermediary to transfer the 12 months of 1 TB of SSD storage, determinethat the conditions on the hold of the 100 US dollars have beenfulfilled, and may automatically transfer the 12 months of 1 TB of SSDstorage, for example, decreasing the sending party's account by 12months of 1 TB of SSD storage, and increasing the intermediary party'saccount by 12 months of 1 TB of SSD storage. The intermediary mayreceive a transfer confirmation receipt, and the sender may be notifiedthat the transfer was completed.

The transfer of computational resources across accounts on differentserver systems may allow, for example, the trading of ownedcomputational resources between parties that use different cloudcomputing platforms. It may also allow a party that has accounts onseparate cloud computing platforms to use computational resources itcontrols on the server system of one of the cloud computing platforms toobtain computational resources for its account on a server system for adifferent cloud computing platform. In this case, the same party may beboth the sending party and receiving party, as it may control bothaccounts at both server systems, and may be using the intermediary tofacilitate the obtaining of computational resources on one server systemusing computational resources on another server system.

The resources in a transfer may also be, for example, of computationalresources from any computational device connected to a network such asthe Internet, outputs from small scale manufacturing and 3D printingdevices, shares of time on smart devices, such as, for example,vehicles, and shipped physical goods. Shipped physical goods may be, forexample, physical gold, or other real commodities or items. A hold onshipped physical goods may be enforced by, for example, a deliveryservice that effects the delivery of the physical goods.

Communication between the computing devices and systems for the partiesmay occur directly, for example, between any of the sender, theintermediaries, the receiver and the resource tracking systems, or maybe routed in any suitable manner. For example, communications may berouted through a trusted system, or through a transfer coordinator whichmay not be a trusted system, but may coordinate the transfer process.The transfer coordinator may be any suitable computing device or systemthat may be part of the transfer chain, such as, for example, anintermediary, or may be outside of the transfer chain. Communicationsmay occur directly using any suitable communications protocols, such as,for example, HTTPS. In some implementations, instead of messages beingsent by one computing device or system to another, a computing device orsystem may check for a message on another computing device or system.For example, if there is a trusted system for a transfer chain, theother computing devices and systems in the transfer chain may be able tocheck the trusted system for messages, such as, for example, the signedmessage indicating that a transfer may proceed, rather than waiting forthe trusted system to send out the message.

All communication between the computing devices and systems for theparties, including proposed transfers, execute instructions fortransfers, signed messages from trusted systems, proposed and preparedtransfer receipts, and transfer confirmation receipts, may becryptographically signed. For example, a communication may becryptographically signed with a private key held by a party sending thecommunication, and verified with a corresponding public key held by aparty receiving the communication, in order to confirm that thecommunication is valid. This may ensure that only parties involved in atransfer chain are able to communicate, preventing a malicious partyfrom inserting communications into the transfer chain. Communicationsmay also use symmetric encryption, or a shared secret or token betweenthe communicating computing devices and systems.

FIG. 1 shows an example system suitable for a resource transfer systemaccording to an implementation of the disclosed subject matter. Anintermediary computing device 100 may include an executor 110, a quotegenerator 120, and a storage 140. The intermediary computing device 100may be any suitable computing device, such as, for example, a computer20 as described in FIG. 21 , or component thereof, for implementing theexecutor 110, the quote generator 120, and the storage 140. Theintermediary computing device 100 may be a single computing device, ormay include multiple connected computing devices, and may be, forexample, a laptop, a desktop, an individual server, a server farm, or adistributed server system, or may be a virtual computing device orsystem. The intermediary computing device 100 may be part of a computingsystem and network infrastructure, or may be otherwise connected to thecomputing system and network infrastructure. The executor 110 may be anysuitable combination of hardware and software on the intermediarycomputing device 100 for verifying the conditions on a proposedtransfer, sending out a hold authorization allowing resources owned bythe intermediary party to be held, and determining when an executeinstruction may be issued to effect a transfer, based on receipts andmessages in the storage 140, and for sending out the executeinstruction. The quote generator 120 may be any suitable combination ofhardware and software on the intermediary computing device 100 forreceiving a quote request, and generating and sending out a quote inresponse to the quote request. The storage 140 may store receipts andother messages, such as a proposed transfer message 142, a preparedtransfer receipt 144, a transfer confirmation receipt 146, or a signedmessage 148 from a trusted system, in any suitable manner. Theintermediary computing device 100 may be an intermediary used by anintermediary party, such as, for example, a trader, exchange, or user ofa server system.

The executor 110 may be any suitable combination of hardware andsoftware for verifying conditions on a proposed transfer 142, sendingout a hold authorization allowing resources owned by the intermediaryparty to be held based on a prepared transfer receipt 144, determiningwhen an execute instruction may be issued to effect a transfer based ona prepare transfer receipt 144, a transfer confirmation receipt 146 orsigned message 148, and for sending out the execute instruction, forexample, to a resource tracking system. The executor 110 may be able toreceive a proposed transfer 142 from the storage 140. The proposedtransfer 142 may include an indication of a source transfer anddestination transfer involving resources owned by the intermediary partythat uses the intermediary computing device 100, for example, as part ofa quote sent out by the intermediary party and accepted by a sendingparty. The executor 110 may be able to determine if the conditions onthe hold for resources for a source transfer and destination transfer inthe proposed transfer 142 are the same, for example, the receiving of asigned message 148 from a trusted system, or if the source transfer isconditioned on receiving a transfer confirmation receipt 146 indicatingthe destination transfer has succeeded. If either is determined to betrue, the executor 110 may be able to accept the proposed transfer 142.The executor 110 may also be able to determine if a proposed transferincludes the transfer costs or fees, guaranteed minimum transfer, andlock timeouts sent out by the intermediary computing device 100 inresponse to the quote request, and reject the proposed transfer if anyof them are not included. The executor 110 may be able to receive theprepared transfer receipt 144 from the storage 140, where it may havebeen stored after being received from another computing device orsystem. The executor 110 may be able to authorize a hold on resourceowned by the intermediary party at a resource tracking system based onthe prepared transfer receipt 144, or may issue an execute instructionto effect a transfer on a resource tracking system based on the preparedtransfer receipt 144. The executor 110 may be able to receive either thetransfer confirmation receipt 146 or the signed message 148 from thestorage 140, where they may have been stored after being received at theintermediary computing device 100 from another computing device orsystem. The executor 110 may be able to send an execute instruction toeffect a transfer on a resource tracking system upon receiving thesigned message 148, and may be able to send the transfer confirmationreceipt 146 and the execute instruction to effect a transfer on aresource tracking system upon receiving the transfer confirmationreceipt 146. The execute instruction may, for example, effect a transferof resources into a resource pool owned by the intermediary party or outof a resource pool owned by the intermediary party.

The quote generator 120 may be able to receive a request for a quote,for example, from a trusted system, transfer coordinator, or othercomputing device or system. The request for a quote may include a sourcetransfer and destination transfer that the quote requestor wants theintermediary party to make using the intermediary computing device 100,including the type and quantity of resources and identities of theparties involved in both the source and destination transfer. The quoterequest may also identify the resource tracking systems on which thesource and destination transfers should take place. The quote generator120 may be able to generate a quote in response to the request for aquote. The quote may include any transfer costs or fee, guaranteedtransfer minimums, and lock timeouts that the intermediary party maywish to make a condition of its acceptance of a proposed transfer basedon the quote request.

FIG. 2 shows an example system suitable for a resource transfer systemaccording to an implementation of the disclosed subject matter. Aresource tracking computing device 200 may include a resource manager210, a receipt generator 220, and a storage 240. The resource trackingcomputing device 200 may be any suitable computing device, such as, forexample, a computer 20 as described in FIG. 21 , or component thereof,for implementing the resource manager 210, the receipt generator 220,and the storage 240. The resource tracking computing device 200 may be asingle computing device, or may include multiple connected computingdevices, and may be, for example, a laptop, a desktop, an individualserver, a server farm, or a distributed server system, or may be avirtual computing device or system. The resource tracking computingdevice 200 may be part of a computing system and network infrastructure,or may be otherwise connected to the computing system and networkinfrastructure. The resource manager 210 may be any suitable combinationof hardware and software on the resource tracking computing device 200for managing resources belonging to various parties and tracked by theresource tracking computing device 200. The resources may be tracked inresource pools, such as, for example, the resource pools 242 and 244 inthe storage 140. The receipt generator 220 may be any suitablecombination of hardware and software for generating receipts, such asthe prepared transfer receipt 144 and transfer confirmation receipt 146,based on the actions of the resource manager 210. The storage 240 maystore pending transfer 246, along with the resource pools, such as theresource pools 242 and 244, for the various parties with resourcetracked by the resource tracking computing device 200. The storage 240may also store receipts, such as the transfer confirmation receipt 248,or the signed message 250. The resource pools 242 and 244 may be recordsof resources owned by parties and tracked by the resource trackingcomputing device 200, including the types and quantities of theresources, and an identification of the party that owns or controls theresources in the resource pool. The resource tracking computing device200 may be a resource tracking system, which may or may not beaffiliated or belong to a particular person or organization, or may be acomponent of a server system.

The resource manager 210 may be any suitable combination of hardware andsoftware on the resource tracking computing device 200 for managingresources belonging to various parties and tracked by the resourcetracking computing device 200. The resource manager 210 may be able toreceive a proposed transfer, which may indicate that resource tracked bythe resource tracking computing device 200 are to be transferred fromone resource pool on the resource tracking computing device 200 toanother resource pool on the resource tracking computing device 200, andconditions to associated with any hold on resources placed in connectionwith the proposed transfer. The resource manager 210 may be able todetermine if a hold authorization for the resources to be transferred bythe proposed transfer has also been received from the party whichcontrols the resources to be transferred. When the hold authorizationhas not yet been received, the resource manager 210 may generate thepending transfer 246, which may be stored in the storage 240, and mayindicate that the proposed transfer is still awaiting a holdauthorization.

When the hold authorization has been received, the resource manager 210may be able to place a hold on the type and quantity of resources in theappropriate resource pool, as was indicated by the propose transfer. Forexample, the resource manager 210 may place a hold on resources recordedin the resource pool 242 when the proposed transfer indicates thatresources are to be transferred from the resource pool 242 to theresource pool 244, and a hold authorization from the party that owns theresource pool 242 has been received. A hold placed by the resourcemanager 210 may tie up the resources on which the hold has been placed,so that the resources cannot be moved or transferred except inconjunction with the proposed transfer which resulted in the hold. Thehold may tie up specific resources, or some quantity of a resource. Thehold may include a lock timeout, which may be a time period after whichthe resource manager 210 may release the hold without transferring theresources. The lock timeout may be indicated in the proposed transferreceived by the resource tracking computing device 200.

The resource manager 210 may be able to verify when the conditions on ahold placed on resources has been fulfilled. For example, if a hold isconditional on receiving of evidence that a destination transfer hasoccurred, the resource manager 210 may be able to determine whether thetransfer confirmation receipt 250, confirming the destination transferat another resource tracking computing device, has been received. If thehold is conditional on receiving a signed message from a trusted system,the resource manager 210 may be able to determine whether the signedmessage 250, indicating that the trusted system has instructed thetransfer to proceed, has been received. Upon determining that theconditions on the hold have been fulfilled, the resource manager 210 maybe able to receive an execute instruction from the appropriateintermediary computing device 100, and execute the transfer of resource.The resource manager 210 may be deterministic, so that the fulfillmentof the condition of a hold on resources, and receiving of theinstruction to execute a transfer of those resource, may always resultin the automatic transfer of those resources.

The resource manager 210 may be able to transfer resources betweenresource pools, such as the resource pool 242 and the resource pool 244,by decrementing the quantity of the resources in one resource pool andincrementing the quantity of the resources in the other resource pool bythe same quantity. For example, the resource manager 210 may transfer100 US dollars from the resource pool 242 to the resource pool 244 bydecrementing the quantity of US dollars recorded by the resource pool242 by 100, and incrementing the quantity of US dollars recorded by theresource pool 244 by 100.

The receipt generator 220 may be any suitable combination of hardwareand software for generating receipts, such as the prepared transferreceipt 144 and transfer confirmation receipt 146, based on the actionsof the resource manager 210. The receipt generator 220 may be able todetermine when the resource manager 210 has placed a hold on resourcesin a resource pool in connection with a proposed transfer, and may beable to generate a prepared transfer receipt, such as the preparedtransfer receipt 144, indicating that the resources needed for thetransfer have been held. The prepared transfer receipt may include, forexample, an indication of the resources that have been held, includingtype and quantity, the party who owns the held resources, the conditionof the hold on the resources, and any lock timeout on the hold on theresources. The prepared transfer receipt generated by the receiptgenerator 220 may be sent to any suitable computing device or system,such as, for example, to a trusted system or transfer coordinator, or toan intermediary party computing device 100. The receipt generator 220may be able to determine when the resource manager 210 has executed atransfer of resources from one resource pool to another on the resourcetracking computing device 200, and may be able to generate a transferconfirmation receipt, such as the transfer confirmation receipt 146,indicating that the transfer was executed. The transfer confirmationreceipt may include, for example, an indication of the resources thatwere transferred, including type and quantity, the party which owns ofthe resource pool the resources were transferred from, the party whichowns the resource pool the resources were transferred to, the conditionof the hold on the resources that were transferred, and an indication ofthe evidence that fulfilled the condition of the hold allowing thetransfer to occur. The transfer confirmation receipt generated by thereceipt generator 220 may be sent to any suitable computing device orsystem, such as, for example, to a trusted system or transfercoordinator, or to an intermediary party computing device 100.

FIG. 3 shows an example system suitable for a resource transfer systemaccording to an implementation of the disclosed subject matter. A sendercomputing device 300 may include an authorizer 310, a quote requestor320, and a storage 340. The sender computing device 300 may be anysuitable computing device, such as, for example, a computer 20 asdescribed in FIG. 21 , or component thereof, for implementing theauthorizer 310, the quote requestor 320, and the storage 240. Theresource tracking computing device 200 may be a single computing device,or may include multiple connected computing devices, and may be, forexample, a laptop, a desktop, an individual server, a server farm, or adistributed server system, or may be a virtual computing device orsystem. The sender computing device 300 may be part of a computingsystem and network infrastructure, or may be otherwise connected to thecomputing system and network infrastructure. The authorizer 310 may beany suitable combination of hardware and software on the sendercomputing device 300 for verifying the hold conditions on source anddestination transfers included in a quote for a transfer, and forsending an authorization to hold resources owned by a sending party on aresource tracking computing device 200 in connection with a transfer,such as the transfer in the quote or a proposed transfer received by thesender computing device 300. The quote requestor 320 may be any suitablecombination of hardware and software for requesting a quote for atransfer of resources that a sending party wishes to make to a receivingparty using the sender computing device 300. The storage 340 may store aquote 342 or a proposed transfer 344 in any suitable manner. The sendercomputing device 300 may be a sender used by a sending party, which maybe any suitable party that may wish to transfer resources to a receivingparty. The sending party may be the same party as another party in thetransfer chain, or may be a separate party. For example the sendingparty and receiving party may be the same party, for example, anorganization with multiple branches that uses resource held at onebranch to obtain resources of another type for a another branch.

The authorizer 310 may be any suitable combination of hardware andsoftware on the sender computing device 300 for verifying the holdconditions on source and destination transfers, and for sending anauthorization to hold resources owned by a sending party on a resourcetracking computing device 200 in connection with a transfer. Theauthorizer 310 may be able to verify hold conditions on source anddestination transfers that may be part of quote for a transfer, such asthe quote 342, or a proposed transfer, such as the proposed transfer344, received by the sender computing device 300, and which the sendingparty wishes to participate in to send resources to a receiving party.The authorizer 310 may be able to determine whether the condition on ahold of resources owned by the sending party for a source transfer iseither the receiving of evidence that a destination transfer hasoccurred or the receiving of a signed message from a trusted system. Ifeither is true, the authorizer 310 may be able to send a holdauthorization for the resources to the resource tracking computingdevice 200 on which the resources are tracked. This may be a resourcetracking computing device 200 on which the sending party has a resourcepool, such as the resource pool 242.

The quote requestor 320 may be any suitable combination of hardware andsoftware for requesting a quote for a transfer of resources that asending party wishes to make to a receiving party using the sendercomputing device 300. The quote requestor 320 may be able to receiveparameters for the transfer, for example, from the sending partyinputting the parameters into the sender computing device 300, or fromthe storage 340 of the sender computing device. The parameters of thequote request may include, for example, an indication of the receivingparty for the transfer, the type of resource the sending party willtransfer out, the type of resource the receiving party expects toreceive, and either the quantity of resources that that the sendingparty will transfer out or the quantity of the resources that thesending party wishes to arrive at the receiving party. For example, thequote may indicate the sending party will transfer out 100 US dollars,and that the receiving party will receive some quantity of Euros basedon the exchange rate and the value of the resources deducted from the100 US dollars by, for example, the intermediary parties, or the quotemay indicate the receiving party will receive 100 Euros, and thequantity of US dollars transferred out by the sending party may bedetermined so as to sure that the receiving party will receive 100 Eurosaccounting for the exchange rate and any deducted resources. The quoterequest may also include a transfer chain, including the identity of theintermediary computing devices and resource tracking computing devicesthat the sending party wants to be used in the transfer chain, theidentities of the parties in the transfer chain, the amounts to betransferred from each party and to each party, and other appropriatedetails about the transfer and transfer chain.

The quote request generated by the quote requestor 320 may be sent toany suitable computing device or system. For example, the quote requestmay be sent to various possible intermediary computing devices 100,which may evaluate the quote request and respond with a quote for theirparticipation in the transfer in the transfer chain to the receivingparty. The quote request may be sent to a trusted system, or a transfercoordinator, or other computing device that may perform pathfinding toget quotes from various possible intermediary computing devices 100 toset up a transfer chain between the sending party and the receivingparty. No pathfinding may be necessary, if, for example, the quoterequest includes a transfer path specified by the sending party, or thecomputing device or system that receives the quote request has liquidityinformation regarding various intermediary computing devices andresource tracking computing devices pre-indexed.

FIG. 4 shows an example system suitable for a resource transfer systemaccording to an implementation of the disclosed subject matter. Acoordinator 400 may include a transfer chain generator 410, a quoterequestor 420, and a storage 440. The coordinator 400 may be anysuitable computing device, such as, for example, a computer 20 asdescribed in FIG. 21 , or component thereof, for implementing thetransfer chain generator 410, the quote requestor 420, and the storage440. The coordinator 400 may be a single computing device, or mayinclude multiple connected computing devices, and may be, for example, alaptop, a desktop, an individual server, a server farm, or a distributedserver system, or may be a virtual computing device or system, or may bedistributed among the various computing devices and systems in thetransfer chain, such as, for example, the intermediary computing devices100 and sender computing device 200. The coordinator 400 may be part ofa computing system and network infrastructure, or may be otherwiseconnected to the computing system and network infrastructure. Thetransfer chain generator 410 may be any suitable combination of hardwarefor generating a transfer chain from a sending party to a receivingparty, for example, assembling the chain from various quotes collectedfrom various intermediary parties as received from various intermediarycomputing devices 100. The quote requestor 420 may be any suitablecombination of hardware and software for requesting a quote for atransfer of resources that a sending party wishes to make to a receivingparty using the sender computing device 300. The storage 440 may storeprepared transfer receipts, such as the prepared transfer receipts 442,and transfer confirmation receipts, such as the transfer confirmationreceipt 444, in any suitable manner. The coordinator 400 may be acomputing device or system, or may be a component thereof, and may haveits functionality distributed among a number of computing devices orsystems. The coordinator 400 may be, for example, a trusted system, ormay be a transfer coordinator for the transfer from the sending party tothe receiving party. The coordinator 400 may be, or be part of, anintermediary computing device 100 in the transfer chain between thesending party and the receiving party.

The coordinator 400 may be able to set up the transfer chain for atransfer, for example, using transfer chain generator 410 and the quoterequester 420. For example, the coordinator 400 may be able to receive aquote request from the sender computing device 300, may be able todetermine intermediary computing devices 300 that may be part of thetransfer chain to satisfy the quote, may generate quote requests thatmay be sent to these intermediary computing devices 100, and may, usingthe transfer chain generator 410, be able to use the quotes receivedfrom the intermediary computing devices 100 to construct a transferchain between the sending party, which requested the quote, and thereceiving party indicating in the original quote request. Thecoordinator 400 may also include, in the storage 400, an index ofliquidity information for various intermediary computing devices andresource tracking computing devices, which may be used instead of thequote requestor 420 to construct a transfer chain.

The coordinator 400 may be able to coordinate communication and messagepassing among the various computing devices and systems in the transferchain. For example, the coordinator 400 may receive various receipts,such as the prepared transfer receipt 442 and the transfer confirmationreceipt 444, and send them to appropriate computing devices and systems,such as the intermediary computing devices 100 and resource trackingcomputing devices 200 in the transfer chain.

The coordinator 400 may be a trusted system. When the coordinator 400 isa trusted system, the condition on all holds placed on resources onresource tracking computing devices 200 in the transfer chain may be thereceiving of a signed message from the coordinator 400. The coordinator400 may be able to determine when all resource tracking computingdevices 200 in the transfer chain have sent prepared transfer receiptsto the coordinator 400, indicating all the resources being transferredin the transfer chain have been held, and may be able to generate thesigned message and distribute the signed message to all of theintermediary computing devices 100 and resources tracking computingdevices 200 in the transfer chain to cause the transfer to proceed. Thesigned message may also be able to cancel the transfer, if necessary.

FIG. 5 shows an example system suitable for a resource transfer systemaccording to an implementation of the disclosed subject matter. Theresource pool 242 on the resource tracking computing device 200 mayinclude a resource owner identifier 510, and resource records 520 and530. The resource owner identifier 510 may be any suitableidentification of the party that owns the resources recorded in theresource pool 242. For example, the resource owner identifier may be aname of a person, organization, or user or process on a server system,an arbitrary name, a username and password combination, a passphrase orpasscode, a unique number, or a cryptographic public key. The resourcerecords 520 and 530 may include resource types 522 and 532, and resourcequantities 524 and 534. The resource types 522 and 532 may indicate thetype of resource that is recorded in the resource records 520 and 530.The resource types 522 and 532 may be any suitable resource of asset,such as, for example, currency, cryptocurrency, commodities, financialinstruments, or computational resources. The resource quantities 522 and524 may indicate the quantity of the resource types 522 and 532 owned bythe party identified by the resource owner identifier 510 and tracked inthe resource pool 242. The resource quantities 522 and 524 may be storedin, for example, registers or memory cells on the resource trackingcomputing device 200.

The resource tracking computing device 200 may track resources in anysuitable manner. For example, the resource tracking computing device 200may pool resources by type, with each resource pool, such as theresource pool 242, tracking a particular resource type, such as theresource type 522. The resource pool 242 may then include the resourcequantity 524 of the resource type 522 held by each party that owns anyamount of the resource type 522, using resource owner identifiers suchas the resource owner identifier 510.

FIGS. 6A-D shows example arrangements suitable for a resource transfersystem according to an implementation of the disclosed subject matter.In FIG. 6A, a sender computing device 200 may send out a request for aquote. The quote may indicate a receiving party to which a sending partywishes to transfer resources using the sender computing device 300. Therequest for quote may be received by, for example, the coordinator 400,which may distribute the request for quote to various intermediarycomputing devices. The intermediary computing device 100 may respondwith a quote, which may be sent back to the sending computing device300.

In FIG. 6B, the sending computing device 300 may send an acceptance ofthe quote, for example, back to the coordinator 400. For example, thesending party may accept the quote from the intermediary computingdevice 100, including any transfer costs, guaranteed minimum transfers,and lock timeouts requested in the quote. The coordinator 400 may send aproposed transfer to the intermediary computing device 100, and to theresource tracking computing device 200, which may act as asender-intermediary resource tracking system, between the sendingcomputing device 300 and the intermediary computing device 100, and theresource tracking computing device 600, which may act as anintermediary-receiver resource tracking system, which may be between theintermediary computing device 100 and the receiver, as the receivingparty may have a resource pool on the resource tracking computing device600. The resource tracking computing devices 200 and 600 may verify theconditions on the proposed transfers, and may return proposed transferreceipts to the coordinator 400. The proposed transfers may indicate tothe resource tracking systems 200 and 600 what type and quantity ofresources are to be moved, and between which resource pools, to effectthe transfer desired by the sending party.

In FIG. 6C, the sender computing device 300 may send a holdauthorization to the resource tracking computing device 200, on whichthe sending party may have a resource pool. The hold authorization maybe sent through the coordinator 400. Upon receiving the holdauthorization, the resource tracking computing device 200 may place ahold on the resources owned by the sending party that are to be used inthe transfer, and may send a prepared transfer receipt, for example, theintermediary computing device 100, for example, through the coordinator400.

In FIG. 6D, the intermediary computing device 100, upon receiving theprepared transfer receipt, may send an execute instruction, or anauthorization for the transfer, to the resource tracking computingdevice 600. The execute instruction may cause the resource trackingcomputing device 600 to transfer resources from the resource pool 644,which may be owned by the intermediary party that uses the intermediarycomputing device 100, to the resource pool 642, which may be owned bythe receiving party, in accordance with the proposed transfer that wassent to the resource tracking computing device 600 and the intermediarycomputing device 100. This may be the destination transfer for theintermediary party that uses the intermediary computing device 100. Ifthe intermediary computing device 100 sends out an authorization for thetransfer, the resource tracking computing device 600 may transferresources from the resource pool 644 to the resource pool 642 uponreceiving a suitable message from the coordinator 400.

The resource tracking computing device 600 may send a transferconfirmation receipt of the destination transfer, which may reach theresource tracking computing device 200, for example, through theintermediary computing device 100, the coordinator 400, or both. Theintermediary computing device 100 may also send an execute instructionto the resource tracking computing device 200. The transfer confirmationreceipt may fulfill the condition of the hold that was placed on thesending party's resource on the resource tracking computing device 200.The resource tracking computing device 200, upon receiving the executeinstruction, may automatically transfer the held resources from theresource pool 242, which may be owned by the sending party, to theresource pool 244, which may be owned by the intermediary party thatuses the intermediary computing device 100.

FIGS. 7A-C shows example arrangements suitable for a resource transfersystem according to an implementation of the disclosed subject matter.In FIG. 7A, the sender computing device 300 may have requested,received, and agreed to a quote for a transfer from the sending party toa receiving party. The coordinator 400 may send proposed transfers tothe resource tracking computing devices 200, 600, and 720, and theintermediary computing devices 100 and 710, in the transfer chain. Theresource tracking computing devices 200, 600, and 720 may send outproposed transfer receipts, for example, to the coordinator 400,indicating that they have verified the conditions on the proposedtransfers and are waiting for authorization to hold the resourcesindicated by the proposed transfers.

In FIG. 7B, the sender computing device 300 may send a holdauthorization to the resource tracking computing device 200, on whichthe sending party may have a resource pool. The hold authorization maybe sent through the coordinator 400. Upon receiving the holdauthorization, the resource tracking computing device 200 may place ahold on the resources owned by the sending party that are to be used inthe transfer, and may send a prepared transfer receipt, for example, tothe intermediary computing device 100, for example, through thecoordinator 400.

In FIG. 7C, the intermediary computing device 100 may send a holdauthorization to the resource tracking computing device 600, which mayact as an intermediary-intermediary resource tracking system, on whichthe intermediary party that uses the intermediary computing device 100may have a resource pool. The hold authorization may be sent through thecoordinator 400. Upon receiving the hold authorization, the resourcetracking computing device 600 may place a hold on the resources owned bythe intermediary party that uses the intermediary computing device 100that are to be used in the transfer, and may send a prepared transferreceipt, for example, to the intermediary computing device 710, forexample, through the coordinator 400.

FIGS. 8A-C shows example arrangements suitable for a resource transfersystem according to an implementation of the disclosed subject matter.If the transfer does not include a trusted system, the intermediarycomputing device 710 may, upon receiving the prepared transferconfirmation receipt as in FIG. 7A, send an execute instruction to theresource tracking computing device 720, which may act as anintermediary-receiver resource tracking system. The execute instructionmay cause the resource tracking computing device 720 to transferresources from the resource pool 742, which may be owned by theintermediary party that uses the intermediary computing device 710, tothe resource pool 744, which may be owned by the receiving party. Thetype and quantity of resources transferred may be as indicated in theproposed transfer sent to the intermediary computing device 710 andresource tracking computing system 720. The resource tracking computingdevice 720 may send out a transfer confirmation receipt, which may goto, for example, the intermediary computing device 710. The transferconfirmation receipt, or some other notification of the transfer, mayalso be sent to the sender computing device 300, to notify the sendingparty that the receiving party successfully received the resources.

In FIG. 8B, the intermediary computing device 710 may send the transferconfirmation receipt received from the resource tracking computingdevice 700 to the resource tracking computing device 600, for example,through the coordinator 400. The intermediary computing device 710 mayalso send an execute instruction to the resource tracking computingdevice 600 to effect a transfer of the resources owned by theintermediary party that uses the intermediary computing device 100 andheld at the resource tracking computing device 600 in the resource pool644 to the resource pool 642 owned intermediary party using theintermediary computing device 720. This may be the source transfer forthe intermediary party that uses the intermediary computing device 720.The transfer confirmation receipt may fulfill the condition of the holdon the resources owned by the intermediary party that uses theintermediary computing device 100, as it may be evidence that thedestination transfer of resources from intermediary party using theintermediary computing device 600 was completed. The resource trackingcomputing device 600 may transfer the held resources automatically fromthe resource pool 644 to the resource pool 642 upon receiving theexecute instruction from the intermediary computing device 600. Theresource tracking computing device 600 may send out a transferconfirmation receipt, which may go to, for example, the intermediarycomputing device 100.

In FIG. 8C, the intermediary computing device 100 may send the transferconfirmation receipt received from the resource tracking computingdevice 600 to the resource tracking computing device 200, for example,through the coordinator 400. The intermediary computing device 100 mayalso send an execute instruction to the resource tracking computingdevice 200 to effect a transfer of the resources owned by the sendingparty that uses the sender computing device 300 and held at the resourcetracking computing device 200 in the resource pool 242 to the resourcepool 244 owned intermediary party using the intermediary computingdevice 100. This may be the source transfer for the intermediary partythat uses the intermediary computing device 100. The transferconfirmation receipt may fulfill the condition of the hold on theresources owned by the sending party that uses sender computing device300, as it may be evidence that the destination transfer of resourcesfrom intermediary party using the intermediary computing device 100 wascompleted. The resource tracking computing device 200 may transfer theheld resources automatically from the resource pool 242 to the resourcepool 244 upon receiving the execute instruction from the intermediarycomputing device 100. This may complete the transfer, as the receivingparty may have received resources, the sending party may have sentresources, and the intermediary parties may have both sent and receivedresources to facilitate the transfer chain.

FIGS. 9A-C shows example arrangements suitable for a resource transfersystem according to an implementation of the disclosed subject matter.In FIG. 9A, if the transfer does include a trusted system, for example,the coordinator 400, the intermediary computing device 710 may, uponreceiving the prepared transfer confirmation receipt as in FIG. 7A, senda hold authorization to the resource tracking computing device 720. Uponreceiving the hold authorization, the resource tracking computing device720 may place a hold on the resources owned by the intermediary partythat uses the intermediary computing device 720 that are to betransferred to the receiving party, and may send a prepared transferreceipt, for example, to the coordinator 400. In some implementations,when there is a trusted system, such as the coordinator 400, the sendercomputing device 300, intermediary computing device 100, andintermediary computing device 710 may send their respective holdauthorizations at the same time, for example, upon receiving a messagefrom the coordinator 400 indicating that the transfer is to proceed.

In FIG. 9B, the coordinator 400 may send a signed message to, or store asigned message that may be retrieved by, the resource tracking computingdevices 200, 600, and 720, and the intermediary computing devices 100and 710. For example, the coordinator 400 may have received preparedtransfer receipts from the resource tracking computing devices 200, 600,and 720, indicating the all of the resources to be transferred in thetransfer chain have been held. The coordinator 400 may determine thatthe transfer can proceeds, and send out the signed message, which maybe, for example, a message signed with a private cryptographic key heldby the coordinator 400, and verifiable with a corresponding public keywhich the resource tracking computing devices 200, 600, and 720, and theintermediary computing devices 100 and 710 have a copy of.

In FIG. 9C, the intermediary computing device 710 may send executeinstructions to the resource tracking computing devices 600 and 720, forits source and destination transfers, respectively. The signed messagereceived by the resource tracking computing devices 600 and 720 may havefulfilled the condition of the holds on the resources in the resourcepools 644 and 742. The resource tracking computing device 720 may, uponreceiving the execute instruction, automatically transfer the heldresources from the resource pool 742, owned by the intermediary partythat uses the intermediary computing device 710, to the resource pool744, owned by the receiving party. The resource tracking computingdevice 720 may generate a transfer confirmation receipt or othernotification, for example, to be sent to the sender computing device 300to notify the sender that the receiving party has received theresources. The resource tracking computing device 600 may, uponreceiving the execute instruction, automatically transfer the heldresources from the resource pool 644, owned by the intermediary partythat uses the intermediary computing device 100, to the resource pool642, owned by the intermediary party that uses the intermediarycomputing device 710.

The intermediary computing device 100 may send an execute instruction tothe resource tracking computing device 200 for its source. The signedmessage received by the resource tracking computing devices 200 may havefulfilled the condition of the hold on the resources in the resourcepool 242. The resource tracking computing device 200 may, upon receivingthe execute instruction, automatically transfer the held resources fromthe resource pool 242, owned by sending party using the sendingcomputing device 300, to the resource pool 244, owned by theintermediary party that uses the intermediary computing device 100.

FIG. 10 shows an example arrangement suitable for a resource transfersystem according to an implementation of the disclosed subject matter.To effect a transfer of held resources on the resource trackingcomputing device 200 from the resource pool 242 to the resource pool244, the condition of the hold on the resources must be fulfilled. Thecondition may be fulfilled by, for example, the sending of a transferconfirmation receipt 1090 from the intermediary computing device 100 tothe resource tracking computing device 200, where the transferconfirmation receipt 1090 indicates that the destination transfer forthe source transfer of resources from the resource pool 242 to theresource pool 244 has been completed. Alternatively, a trusted systemmay send a signed message to the resource tracking computing device 200.

The intermediary computing device 100 may send an execute instruction tothe resource tracking computing device 200. The execute instruction maybe received by the resource manager 210, which may verify that thecondition of the hold on the resources has been fulfilled. The resourcemanager 210 may then decrement the resource quantity 524, in theresource pool 242, by the quantity of held resources, and increment theresource quantity 1024, in the resource pool 244, by that same quantity.The resource types 522 and 1022 may be the same. This may result in theresource pool 244 recording that the party identified by the resourceowner identifier 1010, which may be, for example, the intermediary partythat uses the intermediary computing device 100, owns an increasedquantity of the resource type 1022. The resource pool 242 may recordthat the party identified by the resource owner identifier 510, forexample, a sending party or other intermediary party, now owns adecreased quantity of the resource type 522. The total quantity of theresource type 522 or 1022 tracked by the resource tracking computingdevice 200 may not have changed, only the quantities of the resourceowned by the parties who own the resource pools 242 and 244 may change.

The resource quantities 524 and 1024 may be counters stored in registersor memory cells. When the resource quantity 524 is decremented, thequantity recorded by the counter may be decreased by the quantity ofheld resources, although the actual resources identified as held may notbe the resources removed when the resource quantity 524 is decremented.For example, the resource quantity 524 may be 1000, for a resource type522 of US dollars. A hold may be placed on 100 of the US dollars. Whenthe hold condition is fulfilled and the transfer occurs, the resourcequantity 524 may be decremented by 100, but this may represent theremoval of any set of 100 US dollars from the resource record 520. Thehold ensures that there will be at least 100 US dollars to transfer, butif there are more than 100, any of the US dollars may be transferred.The resource quantities 524 and 1024 may also include locations or otheridentifiers for specific resources, such as those with physicalinstantiations such as commodities or block of memory, or financialinstruments or other resources that may be individually distinguishable.This may allow the transfer of specific resources, such as specificcommodities stored at specific locations, specific shares of stock,specific bonds, specific contracts such as, for example optionscontracts, and so on.

FIG. 11 shows an example sequence suitable for a resource transfersystem according to an implementation of the disclosed subject matter. Atransfer chain may have one intermediary computing device, theintermediary computing device 100, which may also be a trusted systemfor the transfer chain. At time 1110, the sender computing device 300may send a hold authorization to the intermediary computing device 100.At time 1120, the intermediary computing device 100 may instruct theresource tracking computing device 200, which may act as asender-intermediary resource tracking system, to put a hold on resourcesowned by the sending party. The instruction may include the holdauthorization from the sender computing device 300. The intermediarycomputing device 100 may instruct the resource tracking computing device600, which may act as an intermediary-receiver resource tracking system,to put a hold on resources owned by the intermediary party that uses theintermediary computing device 100. At time 1130, the intermediarycomputing device 100 may receive prepared transfer receipts from theresource tracking computing devices 200 and 600, indicating that holdshave been placed on the sending party's resource and the intermediaryparty's resources. At time 1140, the intermediary computing device 100may send both the signed message and execute instructions to both theresource tracking computing devices 200 and 600. At time 1150, theresource tracking computing devices 200 and 600, which may have executedtheir respective transfers on receiving the signed message and executeinstruction from the intermediary computing device 100, may sendtransfer confirmation receipts to the intermediary computing device 100.The resource tracking computing device 600 may also send a notificationthat the transfer of resources was completed to a receiver computingdevice 1100, which may be any suitable computing device used by thereceiving party. At time 1160, the intermediary computing device 100 maynotify the sender computing device 300 that the transfer is complete.

FIG. 12 shows an example sequence suitable for a resource transfersystem according to an implementation of the disclosed subject matter. Atransfer chain may have one intermediary computing device, theintermediary computing device 100, and may have no trusted system. Attime 1210, the sender computing device 300 may send a hold authorizationto the resource tracking computing device 200, which may act as asender-intermediary resource tracking system. At time 1220, theintermediary computing device 100 may instruct may instruct the resourcetracking computing device 200 to put a hold on resources owned by thesending party, as authorized by the hold authorization. At time 1230,the intermediary computing device 100 may receive a prepared transferreceipt from the resource tracking computing device 200, indicating thatthe sending party's resource have been held. At time 1240, theintermediary computing device 100 may send an execute instruction to theresource tracking computing device 600, which may act as anintermediary-receiver resource tracking system. At time 1250, theresource tracking computing device 600, which may have executed thetransfer of resources from the intermediary party to the receiving partyupon receiving the execute instruction from the intermediary computingdevice 100, may send a transfer confirmation receipt to the intermediarycomputing device 100. The resource tracking computing device 600 mayalso send a notification that the transfer of resources was completed tothe receiver computing device 1100. At time 1260, the intermediarycomputing device 100 send an execute instruction and the transferconfirmation receipt from the resource tracking computing device 600 tothe resource tracking computing device 200. At time 1270, the resourcetracking computing device 200, which may have executed the transfer ofresources from the sending party to the receiving party upon receivingthe execute instruction from the intermediary computing device 100 andthe transfer confirmation receipt to fulfill the condition of the holdon the sending party's resources, may send a transfer confirmationreceipt to the intermediary computing device 100 confirming the transferof resources to the intermediary party. At time 1280 the intermediarycomputing device 100 may notify the sender computing device 300 that thetransfer is complete.

FIG. 13 shows an example sequence suitable for a resource transfersystem according to an implementation of the disclosed subject matter. Atransfer chain may have two intermediary computing devices, theintermediary computing devices 100, which may also be a trusted systemfor the transfer chain, and the intermediary computing device 710. Attime 1310, the sender computing device 300 may send a hold authorizationto the intermediary computing device 100. At time 1315, the intermediarycomputing device 100 may instruct the resource tracking computing device200, which may act as a sender-intermediary resource tracking system, toput a hold on resources owned by the sending party. The instruction mayinclude the hold authorization from the sender computing device 300. Attime 1320, the intermediary computing device 100 may receive a preparedtransfer receipt from the resource tracking computing device 200,indicating that the sending party's resource have been held. At time1325, the intermediary computing device 100 may instruct the resourcetracking computing device 600, which may act as anintermediary-intermediary resource tracking system, to put a hold onresources owned by the intermediary party that uses the intermediarycomputing device 100. At time 1330, the resource tracking computingdevice 200 may send a prepared transfer receipt to the intermediarycomputing device 100. The prepared transfer receipt may also be sent tothe intermediary computing device 710, by, for example, the intermediarycomputing device 100, or by the resource tracking computing device 200.At 1335, the intermediary computing device 710 may instruct the resourcetracking computing device 720, which may act as an intermediary-receiverresource tracking system to put a hold on resources owned by theintermediary party that uses the intermediary computing device 710. Attime 1340, the resource tracking computing device 720 may send aprepared transfer receipt to the intermediary computing device 710, andto the intermediary computing device 100. At time 1345, the intermediarycomputing device 100, which may be the trusted system in, or involvedwith, the transfer chain, may determine from the prepared transferreceipts that all the resources to be transferred have been held, andmay send the signed message to the resource tracking systems 200, 600,and 720, and to the intermediary computing device 710. At 1350, theintermediary computing device 710 may send execute instructions to boththe resource tracking computing devices 600 and 720, and theintermediary computing device 100 may send an execute instruction to theresource tracking computing device 200. The resource tracking computingdevices 100, 600, and 720, may execute their respective transfers, withthe resource tracking computing device 720 transferring held resourcesto the receiving party from the intermediary party that uses theintermediary computing device 710, the resource tracking computingdevice 600 transferring held resources to the intermediary party thatuses the intermediary computing device 710 from the intermediary partythat uses the intermediary computing device 100, and the resourcetracking computing device 200 transferring held resources to theintermediary party that uses the intermediary computing device 100 fromthe sending party. At 1355, the resource tracking computing device 720may send a notification that the transfer of resources was completed toa receiver computing device 1100. At time 1360 the intermediarycomputing device 100 may notify the sender computing device 300 that thetransfer is complete.

FIG. 14 shows an example arrangement suitable for a resource transfersystem according to an implementation of the disclosed subject matter. Atransfer chain may have two intermediary computing devices, theintermediary computing devices 100 and the intermediary computing device710, and may have no trusted system. At time 1410 the sender computingdevice 300 may send a hold authorization to the resource trackingcomputing device 200. At time 1415, the intermediary computing device100 may instruct may instruct the resource tracking computing device200, which may act as a sender-intermediary resource tracking system, toput a hold on resources owned by the sending party, as authorized by thehold authorization. At time 1420, the intermediary computing device 100may receive a prepared transfer receipt from the resource trackingcomputing device 200, indicating that the sending party's resource havebeen held. At time 1425, the intermediary computing device 100 mayinstruct the resource tracking computing device 600, which may act as anintermediary-intermediary resource tracking system, to put a hold onresources owned by the intermediary party that uses the intermediarycomputing device 100. At time 1430, the resource tracking computingdevice 200 may send a prepared transfer receipt to the intermediarycomputing device 100. The prepared transfer receipt may also be sent tothe intermediary computing device 710, by, for example, the intermediarycomputing device 100, or by the resource tracking computing device 200.At time 1435, the intermediary computing device 710 may send an executeinstruction to the resource tracking computing device 720, which may actas an intermediary-receiver resource tracking system. At time 1440, theresource tracking computing device 720, which may have executed thetransfer of resources from the intermediary party that uses theintermediary computing device 710 to the receiving party upon receivingthe execute instruction from the intermediary computing device 710, maysend a transfer confirmation receipt to the intermediary computingdevice 710. The transfer confirmation receipt may also be sent to theresource tracking computing device 600. The resource tracking computingdevice 720 may also send a notification that the transfer of resourceswas completed to the receiver computing device 1100. At time 1445, theintermediary computing device 710 may send an execute instruction to theresource tracking computing device 600. At time 1450, the resourcetracking computing device 600, which may have transferred held resourcesfrom the intermediary party that uses the intermediary computing device100 to the intermediary party that uses the intermediary computingdevice 710, may send a transfer confirmation receipt to the intermediarycomputing device 100. The transfer confirmation receipt may also be sentto the resource tracking computing device 200 At time 1455, theintermediary computing device 100 may send an execute instruction to theresource tracking computing device 200. At time 1460, the resourcetracking computing device 200, which may have transferred held resourcesfrom the sending party to the intermediary party that uses theintermediary computing device 100, may send a transfer confirmationreceipt to the intermediary computing device 100. At time 1465 theintermediary computing device 100 may notify the sender computing device300 that the transfer is complete.

FIG. 15 shows an example arrangement suitable for a resource transfersystem according to an implementation of the disclosed subject matter. Atransfer chain may include more than two intermediary computing devices,and no trusted system. For example, the transfer chain may include anintermediary computing device 1500. At time 1510, the intermediarycomputing device 1500 may instruct the resource tracking computingdevice 200, which may act as an intermediary-intermediary resourcetracking system, to put a hold on resources owned by the intermediaryparty that uses the intermediary computing device 1500. The intermediarycomputing device 1500 may instruct the hold after receiving, forexample, a prepared transfer receipt from another resource trackingsystem, which may have placed a hold on resources owned by the sendingparty, or by another intermediary party using an intermediary computingdevice that is immediately prior to the intermediary computing device1500 in the transfer chain. At time 1515, the resource trackingcomputing device 200 may send a prepared transfer receipt to theintermediary computing device 100, either directly, or through theintermediary computing device 1500, or through a system that may act asthe coordinator 400. For example, if the intermediary computing device100 is the coordinator 400 for the transfer chain, the intermediarycomputing device 100 may receive the prepared transfer receipt directlyfrom the resource tracking computing device 200. At time 1520, theintermediary computing device 100 may instruct the resource trackingcomputing device 600, which may act as an intermediary-intermediaryresource tracking system, to put a hold on resources owned by theintermediary party that uses the intermediary computing device 600. Attime 1525, the resource tracking computing device 600 may send aprepared transfer receipt to the intermediary computing device 710,either directly, or through the intermediary computing device 100, orthrough a system that may act as the coordinator 400. At time 1530, theintermediary computing device 710 may send an execute instruction to theresource tracking computing device 720, which may act as anintermediary-receiver resource tracking system. At time 1535, theresource tracking computing device 720, which may have executed thetransfer of resources from the intermediary party that uses theintermediary computing device 710 to the receiving party upon receivingthe execute instruction from the intermediary computing device 710, maysend a transfer confirmation receipt to the intermediary computingdevice 710, directly or through a system that may act as the coordinator400. The transfer confirmation receipt may also be sent to the resourcetracking computing device 600. The resource tracking computing device720 may also send a notification that the transfer of resources wascompleted to the receiver computing device 1100. At time 1540, theintermediary computing device 710 may send an execute instruction to theresource tracking computing device 600. At time 1545, the resourcetracking computing device 600, which may have transferred held resourcesfrom the intermediary party that uses the intermediary computing device100 to the intermediary party that uses the intermediary computingdevice 710, may send a transfer confirmation receipt to the intermediarycomputing device 100, directly or through a system that may act as thecoordinator 400. The transfer confirmation receipt may also be sent tothe resource tracking computing device 200. At time 1550, theintermediary computing device 100 may send an execute instruction to theresource tracking computing device 200. At time 1555, the resourcetracking computing device 200, which may have transferred held resourcesfrom the intermediary party that uses the intermediary computing device1500 to the intermediary party that uses the intermediary computingdevice 100, may send a transfer confirmation receipt to the intermediarycomputing device 1500, directly or through intermediary computing device100, or through a system that may act as the coordinator 400. At time1560 the intermediary computing device 1500 may send an executeinstruction to a resource tracking computing device between theintermediary computing device 1500 and sender computing device 300 orother intermediary computing device prior to the intermediary computingdevice 1500 in the transfer chain. This may result in a transfer ofresources to the intermediary party that uses the intermediary computingdevice 1500. If the sender computing device 300 is immediately prior tothe intermediary computing device 1500 in the transfer chain, thetransfer may be complete. Otherwise, the immediately prior intermediatecomputing device may receive a transfer confirmation receipt, which maythen be sent to another resource tracking system, and so on until thetransfer is complete.

FIG. 16 shows an example arrangement suitable for a resource transfersystem according to an implementation of the disclosed subject matter. Atransfer chain may include guaranteed minimum transfers and locktimeouts on holds placed on resources. For example, the guaranteedminimum transfer 1610 may be a transfer of resources from the sendingparty to the intermediary party that uses the intermediary computingsystem 100 which occurs when transfer from the sending party to thereceiving party fails. The guaranteed minimum transfer 1610 may behigher than the guaranteed minimum transfer 1620, which may be atransfer of resources from the intermediary party that uses theintermediary computing system 100 to the intermediary party that usesthe intermediary computing system 710 that occurs when the transfer fromthe sending party to the receiving party fails. In this way, both theintermediary parties may receive compensation for the time theirresources were held if the transfer ultimately fails, discouraging amalicious sending party from purposefully initiating transfers that willfail, as the sending party will still transfer out some resources in afailed transfer.

The lock timeout 1625 may be a time period for which the resourcetracking computing device 200 will hold the resources owned by theintermediary party that uses the intermediary computing device 100,before releasing them without transferring them. The lock timeout 1625for the intermediary party that uses the intermediary computing device100 may be longer than the lock timeout 1635 for the intermediary partythat uses the intermediary computing device 710. This may ensure that amalicious sending party cannot lock up resources owned by intermediaryparties indefinitely, as the transfer will fail if a lock timeoutexpires and held resources will be released. The expiration of a locktimeout may also result in a guaranteed minimum transfer being made.

FIG. 17 shows an example arrangement suitable for a resource transfersystem according to an implementation of the disclosed subject matter.The transfer chain between the receiving party and the sending party mayinclude parallel paths. For example, a transfer chain may involve afirst path that includes the intermediary computing device 100, theresource tracking system 600, and the intermediary computing device 710,and a second path includes the intermediary computing device 1700, theresource tracking system 1720, and the intermediary computing device1740. The total value of the resources that are transferred to thereceiving party may be divided among the paths in any suitable manner,so long as the value of the resources transferred from the party thatuses the intermediary computing device 710 and from the party that usesthe intermediary computing device 1740 sum to the total value thatsending party intends for the receiving party to receive.

FIG. 18 shows an example procedure suitable for a resource transfersystem according to an implementation of the disclosed subject matter.At 1800, a quote request may be sent. For example, the sending party,using the sender computing device 300, may send out a request for aquote that may include an indication of a transfer of resources thesending party would like to make to a receiving party. The quote requestmay include, for example, the type and quantity of resources the sendingparty would like to send out, the type and quantity of resources thereceiver should receive, the identity of resource tracking computingdevices 200 on which the sending party has a resource pool with theresource type it would like to send out, the identity of resourcetracking computing devices 200 on which the receiving party has aresource pool that can receive the type of resource that will betransferred to the receiving party, and any other suitable parameters,including, for example, a maximum level for minimum guaranteedtransfers, lock timeouts, and transfer costs or fees that the sendingparty will accept in a quote. The quote request may be sent to anysuitable computing device or system for obtaining quotes and setting upa transfer chain for the sending party's transfer.

At 1802, a quote may be received. For example, the sender computingdevice 300 may receive a quote that may indicate the costs of a transferchain that may be used to effect the transfer for which the sendingparty requested a quote. The quote may indicate, for example, anytransfer costs or fees, guaranteed minimum transfers, and lock timeoutsassociated with any of the intermediary computing devices 100 that havereturned a quote for their participation in the transfer chain. Thequote may or may not indicate the identities of the intermediarycomputing devices 100 and their associated intermediary parties, and mayor may not indicate the types and quantities of resources that may betransferred between intermediary parties in the transfer chain. If thesending party's request for a quote indicating a specific quantity of aresource, or value of the quantity of the resources, that the receivingparty will receive, the quote may indicate the quantity of resources thesending party must transfer out. The quote may include a proposedtransfer from the sending party to a first intermediary party in thetransfer chain,

At 1804, whether the conditions on the proposed transfer from thesending party to a first intermediary party in the quote is either thereceipt of a signed message or the completion of the destinationtransfer may be verified. For example, the sender computing device 300may analyze the quote to determine the conditions that will be placed ona hold the sending party may authorize on the resources it owns thatwill be transferred out. If the condition of the hold that must befulfilled before the held resources are transferred is either thereceiving, by the resource tracking computing device 200 on which theresources are held, of a signed message from a trusted system orevidence, such as transfer confirmation receipt, that a destinationtransfer has occurred on another resource tracking computing device,such as the resource tracking computing device 600, then the sendercomputing device 300 may verify the conditions and flow may proceed to1806. Otherwise, flow may proceed to 1810, where the quote may berejected.

At 1806, a hold authorization may be sent. For example, the sendercomputing device 300 may send a hold authorization to the resourcetracking computing device 200. The hold authorization may act as anauthorization of the transfer through the transfer chain provided in thequote received by the sender computing device 300. The holdauthorization may allow the resource tracking computing device 200 toplace a hold on resources in a resource pool owned by the sending party,for example, the resource pool. The type and quantity of resources to beheld may be specified in the hold authorization, along with the party towhich the resources are to be transferred when the hold conditions arefilled. The resource tracking computing device 200 may also have areceived a proposed transfer indicating that type and quantity ofresources, the conditions on the transfer of the held resources, and theparty to which the resources are to be transferred, and the holdauthorization may only indicate the proposed transfer for which theresources may be held.

At 1808, a notification that the transfer was made to the receivingparty may be received. For example, the sender computing device 300 mayreceive a notification in any suitable form indicating that resourceshave been transferred to the receiving party, as requested by thesending party in the quote request. The sender computing device 300 mayreceive, for example, a transfer confirmation receipt that was generatedwhen the last resource tracking computing device in a transfer chain,for example, the resource tracking computing device 720, has effected atransfer of resource form the last intermediary party to the receivingparty

At 1810, the quote may be rejected. For example, the sender computingdevice 300 may determine that the condition of the hold that must befulfilled before the held resources are transferred are neither thereceiving, by the resource tracking computing device 200 on which theresources are held, of a signed message from a trusted system orevidence, such as transfer confirmation receipt, that a destinationtransfer has occurred on another resource tracking computing device, forexample, the resource tracking computing system 600. This may indicatethat the sending party's resources may be transferred with no assurancethat the receiving party has received, or will receive, the resourcesthe sending party wishes to be transferred to the receiving party,making the transfer chain in the quote risky and unreliable. The sendingparty may reject the quote.

FIG. 19 shows an example procedure suitable for a resource transfersystem according to an implementation of the disclosed subject matter.At 1900, a proposed transfer may be received. For example, the resourcetracking computing device 200 may receive a proposed transfer from anysuitable computing device or system, such as the coordinator 400. Theproposed transfer may indicate the type and quantity of resources in aresource pool, for example, the resource pool 242, to be held, thecondition of the hold, and the resource pool, for example, the resourcepool 244, to which the resources are to be transferred when the holdconditions are fulfilled and an execute instruction is received.

At 1902, whether a hold authorization is present may be determined. Forexample, the resource tracking computing device 200 may determine if ahold authorization has been received from the sending party, which mayown the resources tracked by the resource pool 242 on which the proposedtransfer indicates a hold should be placed. If the hold authorization ispresent, flow may proceed to 1910. Otherwise, if the hold authorizationis not present, flow may proceed to 1904.

At 1904, the transfer may be stored. For example, without the presenceof a hold authorization, the resource tracking computing device 200 maybe unable to place a hold on the resources in the resource pool 242, asindicated in the proposed transfer. The resource tracking computingdevice 200 may store the proposed transfer, for example, as pendingtransfer 246 in the storage 240, while awaiting the hold authorization.

At 1906, a proposed transfer receipt may be sent. For example, theresource tracking computing device 200 may send, to any suitablecomputing device or system, such as the coordinator 400, a proposedtransfer receipt. The proposed transfer receipt may indicate that theresource tracking computing device 200 has received the proposedtransfer, but does not have the proper hold authorization yet and hasstored the proposed transfer as the pending transfer 246 while awaitingthe hold authorization. The proposed transfer receipt may be used by,for example, the coordinator 400 to indicate to the sender computingdevice 300 that a hold authorization is still needed before the transfercan proceed.

At 1908, a hold authorization may be received. For example, the resourcetracking computing device 200 may receive the hold authorization for thepending transfer 246 from the sender computing device 300. The holdauthorization may be an indication that the resource tracking computingdevice 200 can place a hold on resources tracked by the resource pool242, owned by the sending party.

At 1910, a hold may be placed on the resources to be transferred. Forexample, the resource tracking computing device 200, having received ahold authorization from the sender computing device 300, may place ahold on resources owned by the sending party in the resource pool 242.The type and quantity resources on which the hold is placed and thecondition of the hold may be based on the proposed transfer that wasreceived by the resource tracking computing device 200. The hold mayalso be subject to a lock timeout, for example, if the hold is placed onresources in a resource pool such as the resource pool 644 that tracksresources owned by an intermediary party. The hold may also includeindications of other parameters associated with the hold, such as, forexample, the resource pool into which the resources will be transferredand the computing device or system from whom an execute instruction toeffect the transfer of the resources may be received. The hold mayprevent the held resources from being transferred or moved until thehold condition is fulfilled, a lock timeout expires, or the transferfails or is cancelled, for example, by the sending party. In the eventof a lock timeout expiring or other transfer failure, the hold may bereleased, although some of the resources may remain under hold and betransferred as part of a guaranteed minimum transfer to an intermediaryparty.

At 1912, a prepared transfer receipt may be sent. For example, theresource tracking computing device 200 may send a prepared transferreceipt to any suitable computing device or system, such as thecoordinator 400 or the intermediary computing device 100, indicatingthat a hold has been placed on the resources in the resource pool 242.The prepared transfer receipt may serve as evidence that the hold hasbeen placed, and may include an indication of, for example, the type andquantity of resources that have been held, the party to whom the heldresources belong, the party to whom the resources are to be transferred,the proposed transfer the resources are being held in connection with,and any other suitable information about the prepared transfer on theresource tracking computing device 200. The prepared transfer receiptmay be used by, for example, the intermediary computing device 100 as anindication that the intermediary computing device 100 can place a holdon resources at the resource tracking system 600, or execute a transferof resources to the receiving party at the resource tracking system 600.The prepare transfer receipt may assure the intermediary computingdevice 100 that the resources needed for its source transfer are heldand available, so that it can make its destination transfer.

At 1914, a message may be received that satisfies the hold condition.For example, if there is a trusted system in, or involved in, thetransfer chain, the condition on the held resources in the resource pool242 at the resource tracking computing device 200 may be receiving asigned message from the trusted system. The resource tracking computingdevice 200 may receive the signed message from the trusted system, whichmay be, for example, the coordinator 400, or any other computing deviceor system in the transfer chain, and determine that the condition on theheld resources has been fulfilled. If there is no trusted system, thecondition on the held resources in the resource pool 242 may bereceiving evidence that a destination transfer, for which the transferof held resources will be the source transfer, has occurred. Theresource tracking computing device 200 may receive, for example, atransfer confirmation receipt that was generated by the resourcetracking computing device 600 upon completion of a transfer of resourcesthat may be the destination transfer for the source transfer ofresources from the resource pool 242. For example, the resource trackingcomputing device 600 may have transferred resources owned by theintermediary party to the receiving party, or to a second intermediaryparty.

At 1916, an execute instruction may be received. For example, theresource tracking computing device 200 may receive an instructionindicating that the resource tracking computing device 200 should effectthe transfer of held resources from the resource pool 242 to theresource pool 244. The execute instruction may be received from acomputing device or system that is used by either the party to which theheld resources will be transferred, or from which the held resourceswill be transferred. For example, the resource tracking computing device200 may receive an execute instruction from the intermediary computingdevice 100, to effect a transfer of resources to the intermediary partythe uses the intermediary computing device 100. The resources trackingcomputing device 720 may receive an execute instruction from theintermediary computing device 710, to effect a transfer of resourcesfrom the intermediary party that uses the intermediary computing device710 to the receiving party.

At 1918, resources may be transferred. For example, the resourcetracking computing device 200, having received a message that fulfillsthe condition on the held resources and the execute instruction from acomputing device of either the party that will send the resource or theparty that will receive the resources, may automatically transfer theheld resources according to the proposed transfer. For example, theresource tracking computing device 200 may decrement the resourcequantity 524 for the resource pool 242 by the quantity of resources thatwere held, and may increment the resource quantity 1024 for the resourcepool 244 by that same quantity. This may transfer ownership of the heldquantity of resources from the sending party to the intermediary party.The transfer of held resources by the resource tracking computing device200 may be deterministic, based on receiving the message that fulfillsthe condition on the held resources and the execute instruction from acomputing device of either the party that will send the resource or theparty that will receive the resources. Once the message and executeinstruction are received, the resource tracking computing device 200 mayeffect the transfer, without any opportunity for interruption orcancellation. This may assure all of the parties in the transfer chainthat, once the hold conditions on resources to be transferred to themare met, there will be little to no risk that the resources won't betransferred to them due to malicious action by some other party in thetransfer chain.

In some instances, a resource tracking computing device may transferresources that have not been held. For example, the resource trackingcomputing device 720 may transfer resources form the intermediary partythat uses the intermediary computing device 710 to the receiving party.The intermediary computing device 710 may not send a hold authorizationto the resource tracking computing device 720, and may send an executeinstruction for the transfer after receiving a prepared transfer receiptfrom the resource tracking computing device 600. The prepared transferreceipt may indicate that the source transfer on the resource trackingcomputing device 600 for the destination transfer on the resourcetracking computing device 720 has been prepared. Since the transfer onthe resource tracking computing device 720 is the last transfer in thechain, it may have no source transfer of its own, and therefore mayproceed when instructed by the intermediary computing device 710.

At 1920, a transfer confirmation receipt may be sent. For example, theresource tracking computing device 720 may send a transfer confirmationreceipt to any suitable computing device or system in the transferchain, including, for example, the intermediary computing device 710.The transfer confirmation receipt may confirm that a transfer ofresources occurred successfully. The transfer confirmation receipt maybe used by its recipient as evidence that a destination was completed,fulfilling the condition on a hold on resources at another resourcetracking computing device. For example, the intermediary computingdevice 710 may receive a transfer confirmation receipt that confirmsthat resources were transferred from the intermediary party that usesthe intermediary computing device 710 to the receiving party on theresource tracking computing device 720. This transfer confirmationreceipt may be used by the intermediary computing device 710 to fulfillthe condition of a hold on resources belonging the intermediary partythat uses the intermediary computing device 100 at the resource trackingcomputing device 600. By sending the transfer confirmation receipt andan execution instruction to the resource tracking computing device 600,the intermediary computing device 710 may cause the transfer of the heldresources to its intermediary party, reimbursing the intermediary partyfor the resources it transferred to the receiving party.

FIG. 20 shows an example procedure suitable for a resource transfersystem according to an implementation of the disclosed subject matter.At 2000, a quote request may be received. For example, the intermediarycomputing device 100 may receive request for a quote that may have beensent directly from the sender computing device 300 or distributed by,for example, the coordinator 400. The quote request may indicate theparty to which the intermediary party the uses the intermediarycomputing device 100 would transfer resources, the party from which theintermediary party the uses the intermediary computing device 100 wouldreceive resources, the resource tracking computing device on which thetransfer would take place, the type and value of the resources that needto be involved in both transfers, and any parameters on the transfer,such as maximum acceptable values for guaranteed minimum transfers,transfer fees or costs, and lock timeouts. The quote request may onlyinclude information regarding the parties adjacent to the intermediarycomputing device 100 in the transfer chain, and may not necessarilyinclude information about the sending party, receiving party, or otherintermediary parties that the intermediary party that uses theintermediary computing device 100 will not transfer resources to orreceive resources from.

At 2002, a quote may be sent. For example, the intermediary computingdevice 100 may send a quote to the computing devices or system fromwhich the request for a quote was received. The quote may include, forexample, the terms or parameters under which the intermediary computingdevice 100 will participate in the transfer chain. The terms orparameters may be, for example, transfer costs or fees, minimumguarantee transfers, and lock timeouts that the intermediary computingdevice 100 requires in exchange for its participation in the transferchain. The transfer costs or fees may be indicated in any suitablemanner, for example, as a percentage of the value of the resources beingtransferred to the intermediary party or as a fixed quantity of anyresource type.

At 2004, a proposed transfer may be received. For example, theintermediary computing device 100 may, after having its quote accepted,receive a proposed transfer from any suitable computing device orsystem, such as the coordinator 400. The proposed transfer may indicatethe party to which the intermediary party that uses the intermediarycomputing device 100 will transfer resources, as a destination transferfor the proposed transfer, and the party which they will receiveresource from, as a source transfer for the proposed transfer, the typeand quantity of resources in each transfer, the resource trackingcomputing devices on which the transfers will take place, and theconditions of any holds placed on resources held for the transfers.

At 2006, whether the condition of the hold on resources for a sourcetransfer in the proposed transfer is the same as the condition of thehold on resources for the destination transfer may be determined. Forexample, the intermediary computing device 100 may determine thatproposed transfer indicates that the condition of the hold on resourcesfor both the source and destination transfer is the receiving of asigned message from a trusted system, and thus the source transfer anddestination transfer hold conditions are the same. If the source anddestination transfers have the same hold conditions, flow may proceed to2016. Otherwise, flow may proceed to 2008.

At 2008, whether the condition of the hold on resources for a sourcetransfer in the proposed transfer is evidence of completion of thedestination transfer may be determined. For example, the intermediarycomputing device 100 may determine that the proposed transfer indicatesthat the condition of a hold on resources for the source transfer is thereceiving of evidence that the destination transfer was completed in theform a transfer confirmation receipt from the resource trackingcomputing device 600. The resource tracking computing device 600 may beresponsible for the destination transfer of resources from theintermediary party that uses the intermediary computing device 100 toanother intermediary party or to a receiving party. If the condition ofthe hold for the source transfer is the receiving of evidence of thecompletion of the destination transfer, flow may proceed to 2010.Otherwise, flow may proceed to 1922, where the proposed transfer may berejected.

At 2010, a transfer confirmation receipt may be received. For example,the intermediary computing device 100 may receive a transferconfirmation receipt from the resource tracking computing device 600.The transfer confirmation receipt may be evidence of the completion of adestination transfer, with resources transferred from, for example, theresource pool 644, owned by the intermediary party that uses theintermediary computing device 100, to the resource pool 642, owned by,for example, the receiving party, or by another intermediary party. Theintermediary computing device 100 may have sent an execution instructionto the resource tracking computing device 600, for example, to effect atransfer of resources to the receiving party, or the resource trackingcomputing device 600 may have received the execute instruction from theintermediary computing device 710.

At 2012, the transfer confirmation receipt may be sent. For example, theintermediary computing device 100 may send the transfer confirmationreceipt received from the resource tracking computing device 600 to theresource tracking computing device 200. The transfer confirmationreceipt may fulfill the condition of the hold on the resources beingheld at the resource tracking computing device 200, for example, in theresource pool 242 owned by the sending party.

At 2014, an execute instruction may be sent. For example, theintermediary computing device 100 may send an execute instruction to theresource tracking computing device 200. The execute instruction maycause the resource tracking computing device 200 to effect the sourcetransfer for the intermediary computing device 100, transferring heldresources from the resource pool 242, owned by the sending party, to theresource pool 244, owned by the intermediary party the uses theintermediary computing device 100. This may transfer ownership of theheld resources from the sending party to the intermediary party. Theresource tracking computing device 200 may perform the transferautomatically upon receiving the execute instruction, as the conditionof the hold on the resources in the resource pool 242 may have beenfulfilled by the receiving of the transfer confirmation receipt sent bythe intermediary computing device 100.

At 2016, a hold authorization may be sent. For example, the intermediarycomputing device 100 may send a hold authorization to the resourcetracking computing device 600. The hold authorization may authorize theresource tracking computing device 600 to put a hold on resourcestracked in the resource pool 644, owned by the intermediary party thatuses the intermediary computing device 100. The type and quantity ofresources to be held, and the condition of the hold, and the party towhom the resources will be transferred once the hold condition isfulfilled, may be indicated in hold authorization, or may have beenindicated to the resource tracking computing device 600 in a proposedtransfer. The condition of the hold on the resources may be thereceiving a signed message from trusted system. The held resources maybe intended for transfer to the receiving party, or to anotherintermediary party, as the destination transfer for the intermediarycomputing device 100.

At 2018, a signed message from a trusted system may be received. Forexample, the intermediary computing device 100 may receive a signedmessage from a trusted system that may be in, or involved with, thetransfer chain, such as, for example, coordinator 400. The signedmessage may be signed with cryptographic private key, which theintermediary computing device 100 may verify with a corresponding publickey. The trusted system may send out the signed message when, forexample, it has received prepared transfer receipts from all resourcetracking computing devices in the transfer chain.

At 2020, an execute instruction may be sent. For example, theintermediary computing device 100 may send an execute instruction to theresource tracking computing device 200. The execute instruction maycause the resource tracking computing device 200 to effect the sourcetransfer for the intermediary computing device 100, transferring heldresources from the resource pool 242, owned by the sending party, to theresource pool 244, owned by the intermediary party the uses theintermediary computing device 100. This may transfer ownership of theheld resources from the sending party to the intermediary party. Theresource tracking computing device 200 may perform the transferautomatically upon receiving the execute instruction, as the conditionof the hold on the resources in the resource pool 242 may have beenfulfilled by the receiving of a signed message from the trusted system.The resource tracking computing device 200 may receive the signedmessage at the same time as the intermediary computing device 100, orthe intermediary computing device 100 may forward the signed message tothe resource tracking computing device 200.

At 2022, the transfer may be rejected. For example, if the condition ofthe hold on the resources for the source transfer is neither thereceiving of a signed message from a trusted system, nor the receivingof evidence that a destination transfer was completed, the intermediarycomputing device 100 may reject the transfer.

Embodiments of the presently disclosed subject matter may be implementedin and used with a variety of component and network architectures. FIG.21 is an example computer system 20 suitable for implementingembodiments of the presently disclosed subject matter. The computer 20includes a bus 21 which interconnects major components of the computer20, such as one or more processors 24, memory 27 such as RAM, ROM, flashRAM, or the like, an input/output controller 28, and fixed storage 23such as a hard drive, flash storage, SAN device, or the like. It will beunderstood that other components may or may not be included, such as auser display such as a display screen via a display adapter, user inputinterfaces such as controllers and associated user input devices such asa keyboard, mouse, touchscreen, or the like, and other components knownin the art to use in or in conjunction with general-purpose computingsystems.

The bus 21 allows data communication between the central processor 24and the memory 27. The RAM is generally the main memory into which theoperating system and application programs are loaded. The ROM or flashmemory can contain, among other code, the Basic Input-Output system(BIOS) which controls basic hardware operation such as the interactionwith peripheral components. Applications resident with the computer 20are generally stored on and accessed via a computer readable medium,such as the fixed storage 23 and/or the memory 27, an optical drive,external storage mechanism, or the like.

Each component shown may be integral with the computer 20 or may beseparate and accessed through other interfaces. Other interfaces, suchas a network interface 29, may provide a connection to remote systemsand devices via a telephone link, wired or wireless local- or wide-areanetwork connection, proprietary network connections, or the like. Forexample, the network interface 29 may allow the computer to communicatewith other computers via one or more local, wide-area, or othernetworks, as shown in FIG. 22 .

Many other devices or components (not shown) may be connected in asimilar manner, such as document scanners, digital cameras, auxiliary,supplemental, or backup systems, or the like. Conversely, all of thecomponents shown in FIG. 21 need not be present to practice the presentdisclosure. The components can be interconnected in different ways fromthat shown. The operation of a computer such as that shown in FIG. 21 isreadily known in the art and is not discussed in detail in thisapplication. Code to implement the present disclosure can be stored incomputer-readable storage media such as one or more of the memory 27,fixed storage 23, remote storage locations, or any other storagemechanism known in the art.

FIG. 22 shows an example arrangement according to an embodiment of thedisclosed subject matter. One or more clients 10, 11, such as localcomputers, smart phones, tablet computing devices, remote services, andthe like may connect to other devices via one or more networks 7. Thenetwork may be a local network, wide-area network, the Internet, or anyother suitable communication network or networks, and may be implementedon any suitable platform including wired and/or wireless networks. Theclients 10, 11 may communicate with one or more computer systems, suchas processing units 14, databases 15, and user interface systems 13. Insome cases, clients 10, 11 may communicate with a user interface system13, which may provide access to one or more other systems such as adatabase 15, a processing unit 14, or the like. For example, the userinterface 13 may be a user-accessible web page that provides data fromone or more other computer systems. The user interface 13 may providedifferent interfaces to different clients, such as where ahuman-readable web page is provided to web browser clients 10, and acomputer-readable API or other interface is provided to remote serviceclients 11. The user interface 13, database 15, and processing units 14may be part of an integral system, or may include multiple computersystems communicating via a private network, the Internet, or any othersuitable network. Processing units 14 may be, for example, part of adistributed system such as a cloud-based computing system, searchengine, content delivery system, or the like, which may also include orcommunicate with a database 15 and/or user interface 13. In somearrangements, an analysis system 5 may provide back-end processing, suchas where stored or acquired data is pre-processed by the analysis system5 before delivery to the processing unit 14, database 15, and/or userinterface 13. For example, a machine learning system 5 may providevarious prediction models, data analysis, or the like to one or moreother systems 13, 14, 15.

The foregoing description, for purpose of explanation, has beendescribed with reference to specific embodiments. However, theillustrative discussions above are not intended to be exhaustive or tolimit embodiments of the disclosed subject matter to the precise formsdisclosed. Many modifications and variations are possible in view of theabove teachings. The embodiments were chosen and described in order toexplain the principles of embodiments of the disclosed subject matterand their practical applications, to thereby enable others skilled inthe art to utilize those embodiments as well as various embodiments withvarious modifications as may be suited to the particular usecontemplated.

1. A computer-implemented method performed on a data processingapparatus comprising: receiving a message at a first computing devicecomprising a proposed transfer, wherein the proposed transfer comprisesa source transfer of a first quantity of a first resource type from afirst resource pool comprising a first register to a second resourcepool comprising a second register and a destination transfer of a secondquantity of a second resource type from a third resource pool comprisinga third register to a fourth resource pool comprising a fourth register,wherein the first register and the second register are stored on asecond computing device and the third register and the fourth registerare stored on a fourth computing device; receiving a message at thefirst computing device from the second computing device indicating thata hold has been placed on a third quantity of the first resource type inthe first resource pool; sending by the first computing device at leastone message associated with the performance of the destination transfer;receiving a message at the first computing device from the thirdcomputing device indicating that a condition on the hold of the thirdquantity of the first resource type in the first resource pool has beenfulfilled; verifying, by the first computing device, the message fromthe third computing device using a cryptographic public key of the thirdcomputing device to determine that the message from the third computingdevice comprises a cryptographic signature created with a cryptographicprivate key of the third computing device; and in response tosuccessfully verifying that message from the third computing device,sending an instruction from the first computing device to the secondcomputing device to execute the source transfer of the first quantity ofthe first resource type from the first resource pool to the secondresource pool by decrementing a first register in the first resourcepool quantity and incrementing a second register in a second resourcepool.
 2. The method of claim 1, wherein the condition of the hold on thethird quantity of the first resource type in the first resource pool isthe receiving of a message that is a signed message from a trustedsystem.
 3. The method of claim 1, wherein the condition of the hold onthe third quantity of the first resource type in the first resource poolis the receiving of a message that is a transfer confirmation receiptindicating that a first register that is in the third resource pool andis associated with the second resource type was decremented by thesecond quantity, and a second register that is in the fourth resourcepool and is associated with the second resource type was incremented bythe second quantity.
 4. The method of claim 1, wherein sending the atleast one message associated with performance of the destinationtransfer further comprises one or more of: sending an authorizationallowing the placement of a hold on a fourth quantity of the secondresource type in the third resource pool; and sending an instruction toexecute the destination transfer of the second quantity of the secondresource type from the third resource pool to the fourth resource pool5. The method of claim 1, wherein the second resource pool and the thirdresource pool track resources controlled by a first party.
 6. The methodof claim 1, wherein a value of the first quantity of the first resourcetype is greater than a value of the second quantity of the secondresource type.
 7. The method of claim 1, wherein the message that a holdhas been placed comprises a prepared transfer receipt signed with aprivate cryptographic key, and further comprising verifying the preparedtransfer receipt with public cryptographic key.
 8. The method of claim1, wherein the resource type comprises a currency, cryptocurrency,financial instrument, commodity, or computational resource.
 9. Acomputer-implemented method performed on a data processing apparatuscomprising: receiving at a first computing device a prepared transferreceipt from each of a plurality of resource tracking systems in atransfer chain, each resource tracking system comprising a respectivecomputing device, wherein the prepared transfer receipt indicates thateach of the resource tracking systems has placed a hold on a respectivequantity of a respective resource type in respective resource pools; andsending by the first computing device a signed message to each of theplurality of resource tracking systems and each of a plurality ofintermediaries, wherein the signed message is signed with acryptographic private key of the first computing device and fulfills acondition on each of the holds placed by each of the resource trackingsystems and causes each of the plurality of intermediaries to send atleast one instruction to at least one resource tracking system toexecute a transfer by decrementing a respective register in therespective resource pool of the at least one resource tracking systemand incrementing at least one other register on the at least oneresource tracking system to at least one of the plurality of resourcetracking systems.
 10. The computer-implemented method of claim 19,further comprising signing the signed message with private cryptographickey before sending the signed message to each of the plurality ofresource tracking systems and each of the plurality of intermediaries.