. . . "This interaction between the nodes and the transaction processor 210 is controlled using, for example, authorization for access such as password-protected authorization and others." .