US20140006244A1 - Method and System for Aggregating and Managing Data from Disparate Sources in Consolidated Storage - Google Patents
Method and System for Aggregating and Managing Data from Disparate Sources in Consolidated Storage Download PDFInfo
- Publication number
- US20140006244A1 US20140006244A1 US13/719,949 US201213719949A US2014006244A1 US 20140006244 A1 US20140006244 A1 US 20140006244A1 US 201213719949 A US201213719949 A US 201213719949A US 2014006244 A1 US2014006244 A1 US 2014006244A1
- Authority
- US
- United States
- Prior art keywords
- data
- financial data
- private
- private financial
- cloud computing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Abstract
Non-limiting example embodiments include methods and systems for acquiring private financial data from multiple disparate sources. The private financial data is normalized, aggregated, preferably enhanced, and stored in secure storage. Entitled entities may retrieve selected private financial data from that secure storage efficiently, flexibility, and rapidly. Examples of financial private data include non-liquidity destination related sources of private data as well as liquidity destination related sources. A non-limiting example of a computer-implemented, consolidated, private financial data service is based on a secure, permission-based, aggregated and consolidated data cloud, which enables provision/distribution to one or more authorized parties with legitimate interests selected portions of the consolidated, private financial data.
Description
- This application claims priority and incorporates by reference U.S. provisional patent application Ser. No. 61/577,188, filed on Dec. 19, 2011.
- The technology aggregates, stores, and preferably selectively processes private data, e.g., private financial data, from disparate sources to provide enhanced management, storage, and directed delivery of such data for users.
- Changes in market dynamics, such as the increasing speed at which trading occurs and the resulting speed in which “bad things” can happen, (e.g., a 1,000 point plunge in the Dow Jones Industrial Average—about 9%—in less than 10 minutes only to recover those losses within minutes), require that data be collected and available for analysis within an ever decreasing period of time and to a wider array of parties who have a legitimate interest in the data. What used to be acceptable to do the next day, at the end of the current day, or even at regular intervals throughout the day must be completed in real-time throughout the day and made available to an expanded group of people who have a legitimate interest in different elements or combinations of financial trading related data from a large number of disparate sources of such data—all within a very brief period of time. These disparate sources employ different data formats and protocols making centralized and effective use difficult. As a result, pre-existing methods of storing, accessing, managing different elements or combinations of financial trading related data from a large number of disparate sources of such data, and delivering appropriate data to specified recipients, who may be within and/or outside of a designated organization and entitled to see different elements and/or combinations of such data, are quite slow and often ineffective.
- Non-limiting example embodiments include methods and systems for acquiring and aggregating private financial data from multiple disparate sources. The private financial data is normalized, aggregated, preferably enhanced, and stored in secure storage. Entitled entities may retrieve selected private financial data from that secure storage efficiently, flexibly, and rapidly. Examples of financial private data include non-liquidity destination related sources of private data as well as liquidity destination related sources. A non-limiting example of a computer-implemented, consolidated, private financial data service is based on a secure, permission-based, aggregated and consolidated data cloud, which enables provision/distribution to one or more authorized parties with legitimate interests selected portions of the consolidated, private financial data.
- An information processing system having multiple processors receives from multiple data sources private financial data related to financial articles of trade that are tradable on one or more financial markets. Private financial data is exclusively accessible by only a set of entitled entities associated with the private financial data or transactions involving the private financial data. The received private financial data from the multiple data sources includes multiple different data formats. The information processing system normalizes the private financial data in multiple different data formats received from the multiple data sources into a normalized data format and stores the normalized private financial data in storage associated with the information processing system. The normalized private financial data is processing using public financial data to provide enhanced private financial data, which is stored. In a preferred but example embodiment, the normalized private financial data is encrypted before storage. The information processing system distributes selected portions of the enhanced private financial data to entitled entities with legitimate rights to the selected portions of the enhanced private financial data. As a non-limiting example, the distributing step includes distributing selected portions of the enhanced private financial data to one or more financial regulatory entities.
- Examples of the private financial data includes one or more of: transactional data, margin requirements or calls, trading position information, ownership information, or a status of third parties as guarantors of, or providers of credit for, specified transactions. Examples of public financial data include one or more of: trading market data, trading reference data, an identity of regulators with a legal right to private financial data as authorized by owners of the private financial data, or guarantors or creditors of transactions giving rise to private financial data. Examples of multiple data sources include multiple public trading exchanges and one or more dark pools, and wherein the private financial data is provided in drop copy files associated with the multiple public trading exchanges and the one or more dark pools.
- In example embodiments, the normalized private financial data is processed with other, more static private financial data that includes one or more of: custom haircuts, allocation relationships, mappings between clearing and trading accounts, overnight positions, posted collateral, or margin. In example embodiments, the normalized private financial data is processed with public trading market and trading reference data to calculate profit and loss based on underlying market prices or to calculate margin requirements. The normalized private financial data is preferably associated to entitled entities.
- In example embodiments, the information processing system is a scalable cloud computing and storage system that supports multiple participant accounts which are entitled to receive selected portions of the enhanced private financial data. One of the participant accounts provides selected portions of the enhanced private financial data to one or more recipients external to the scalable cloud computing and storage system. In example implementations, the scalable cloud computing and storage system supports multiple participant accounts which are entitled to receive selected portions of the enhanced private financial data. It also supports multiple vendor accounts. One of the participant accounts provides selected portions of the enhanced private financial data to one of the vendor accounts for further processing after which the one vendor account performs the distributing step.
- In another example embodiment, a real time query is received from an entitled entity and enhanced private financial data is provided in real time responsive to the real time query to the entitled entity.
- In another example embodiment, private financial data is automatically removed from the storage associated with the information processing system at a predetermined expiration time.
- Another aspect of the technology includes a financial information processing system that includes one or more data processors coupled to one or more participant interfaces, a cloud computing and storage platform, one or more communications networks providing data communication for the one or more data processors and the cloud computing and storage platform. The one or more data processors are configured to:
-
- receive, via the one or more communication networks, from multiple data sources private financial data related to financial articles of trade that are tradable on one or more financial markets, where private financial data is exclusively accessible by only a set of entitled entities associated with the private financial data or transactions involving the private financial data, and where the received private financial data from the multiple data sources includes multiple different data formats;
- normalize the private financial data in multiple different data formats received from the multiple data sources into a normalized data format;
- store the normalized private financial data in the cloud computing and storage platform (e.g., in a secure, regulated data storage in encrypted format); and
- process or direct the cloud computing and storage platform to process the normalized private financial data with public financial data to provide enhanced private financial data and thereafter store the enhanced private financial data in the cloud computing and storage platform,
- wherein the cloud computing and storage platform is configured store the normalized private financial data and to distribute selected portions of the enhanced private financial data to entitled entities with legitimate rights to the selected portions of the enhanced private financial data.
-
FIG. 1 illustrates an example embodiment of a system for receiving, aggregating, normalizing, storing, and managing private data from multiple disparate private data sources. -
FIG. 2 depicts an example computer system for receiving, aggregating, normalizing, storing, and managing private data from multiple disparate private data sources. -
FIG. 3 illustrates a flow chart illustrating example procedures for receiving, aggregating, normalizing, storing, and managing private data from multiple disparate private data sources. -
FIG. 4 illustrates conceptually an example cloud computing system. -
FIG. 5 illustrates an example embodiment of a system for receiving, aggregating, normalizing, storing, and managing private data from multiple disparate private financial data sources. -
FIGS. 6-8 are function block diagrams illustrating non-limiting example embodiments of the technology applied to different security trading related services scenarios drawing information from multiple disparate security trading data sources. - This application discloses computer-implemented arrangements and methods. In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular architectures, interfaces, techniques, etc., in order to provide a thorough understanding of the present invention. Those skilled in the art will appreciate that the functions of those blocks may be implemented using individual hardware circuits, using software programs and data in conjunction with one and typically multiple suitably programmed microprocessor or general purpose computers that may also include application specific integrated circuitry (ASIC) and/or digital signal processors (DSPs). Software program instructions and data are stored on computer-readable storage, and when the instructions are executed by a computer or other suitable processor control, the computer or processor performs the functions. Databases and database query technology may be used to storage and access data, e.g., as tables, relational databases, object-based models, and/or distributed databases as well as other formats. Although process steps, algorithms or the like may be described or claimed in a particular sequential order, such processes may be configured to work in different orders. In other words, any sequence or order of steps that may be explicitly described or claimed does not necessarily indicate a requirement that the steps be performed in that order. The steps of processes described herein may be performed in any order possible. Further, some steps may be performed simultaneously despite being described or implied as occurring non-simultaneously (e.g., because one step is described after the other step). Moreover, the illustration of a process by its depiction in a drawing does not imply that the illustrated process is exclusive of other variations and modifications thereto, does not imply that the illustrated process or any of its steps are necessary to the invention(s), and does not imply that the illustrated process is preferred. A description of a process is a description of an apparatus for performing the process. The apparatus that performs the process may include, e.g., one or more data processors and those input devices and output devices that are appropriate to perform the process.
- Also, various forms of computer readable media may be involved in carrying data (e.g., sequences of instructions) to a processor. For example, data may be (i) delivered from RAM to a processor; (ii) carried over any type of transmission medium (e.g., wire, wireless, optical, etc.); (iii) formatted and/or transmitted according to numerous formats, standards or protocols, such as Ethernet (or IEEE 802.3), SAP, ATP, Bluetooth, and TCP/IP, TDMA, CDMA, 3G, etc.; and/or (iv) encrypted to ensure privacy or prevent fraud in any of a variety of ways well known in the art.
- Many business transactions around the world are executed using digital representations of financial articles of trade residing in computer systems maintained by financial services corporations, and example non-limiting embodiments described below are directed to financial articles of trade to facilitate description, where each represents a financial interest/asset or the right to acquire a financial interest/asset. A financial article of trade is fungible in nature (i.e., equally recognizable and accepted at a variety of places and/or by a variety of parties) and delivered (or communicated/represented) electronically such that there is no (or very minimal) cost or degradation in value from transfer from one physical or logical location to another. Example financial articles of trade include, but are not limited to, rights related to cash, credit, equity securities, debt securities, commodities, futures, options, swaps, foreign exchange values, balances, rates, etc. Financial articles of trade are traded on various complex financial markets with increasingly diverse, numerous, and non-integrated sources of private and non-private data associated with large numbers of disparate trading inputs, processes, and various outputs.
- Public data is accessible to anyone and that access may be free or require a fee for access. Non-limiting examples of public financial data includes generalized, market-wide trading data or trading reference data. Private data is data that is not public or accessible to market participants generally through commercial or non-commercial arrangements, but rather, is accessible only by the owners of, or third parties who have been authorized to receive access to, such data. In contrast, market data, for example, can be commercially acquired by anyone.
- Private data includes confidential and proprietary data specific to individuals associated with the data and does not need to be disclosed publicly for regulatory, compliance, or other reasons. Private financial data, such as transactional data, margin requirements or calls, trading position information, etc., is exclusively accessible by only a set of entitled entities throughout the trade process. Private data is useful for a wide variety of diverse purposes such as trading/hedging, credit, risk management, internal reporting/analysis/compliance, external regulatory reporting/analysis compliance, display, and viewing. Entities are entitled to access or receive private data only through association with the data or the transactions associated with the data. Such an association may include origination of the data, ownership of the data, serving as the guarantor of transactions associated with the data or authorized regulator of transactions associated with the data, or any other legal or structural association with the data that entitles a party to access the data, e.g., if the owner of the data assigns certain rights to an entity which requires, and is thus entitled, to access the data.
- Private financial data from disparate sources are usually formatted differently and may be accessed and/or transmitted using different protocols. Thus, there is a need for technology that can aggregate and normalize private financial data from disparate sources as compared to a private data base comprised of data generated by a common originator(s)/owner(s) of data and accessible by the common originator(s)/owner(s). Plus, there is also a need for technology to securely store, provide access, and distribute selected portions of aggregated, normalized, and preferably enhanced private financial data using computer communication network(s) in a way that ensures only authorized entities are granted access, use, etc., e.g., based on authorization rights attributable to each party. Entitled entities are for instance entitled through association including origination of data, owner of data, any guarantor of transactions associated with the data, any oversight body over the transactions associated with the data. Non-limiting examples of authorized entities in the securities trading applications example, also called participants, include trading firms, brokers, trading members, regulators, investment banks, clearing firms, Central Clearing Parties (CCPs), General Clearing Members (GCMs), an end client, and others.
- Example embodiments enable computer-implemented collection and aggregation of private information from a variety of disparate sources, normalization of the collected data, protected storage, and management of the stored data to permit retrieval by and/or distribution to with analysis and/or enhancement of selected portions of the private data either by itself or in combination with other data (public or private) to facilitate controlled access to the different entities involved.
-
FIG. 1 shows one non-limiting example embodiment system configured to collect or receive private data from many disparate and non-disparate sources of private data represented in simplified fashion as 14 a (including information designated A) and 14 b (including information designated B). Examples of private data include, but are not limited to, drop copy services at exchanges, margin requirements services at CCPs, other brokers and clearing firms with give up trades, etc. Furthermore, the private data may be collected, or received, in any kind of formatted data format, typically as standard data messages, data feeds, or in any other for the purpose suitable format. - The aggregated private data is consolidated in an
elastic data mart 10 shown as a data cloud. An elastic data mart is a database, or a collection of databases, designed to help users make strategic decisions. One or more computers may enrich the private data with public data 12 (including information designated C) such as market data, initial margin data, etc. and with static private data 13 (including information designated D) such as reference data, mappings, custom haircuts, etc. Only entitled entities 11 a-d may be recipients of the private data or enriched private data. Entitled recipients then receive the consolidated and enriched private data for the purpose of trading/hedging, credit management, risk, internal reporting/analysis/compliance, external regulatory reporting/analysis compliance, and viewing/display. The technology in this application advantageously distributes and/or allows retrieval of certain portions of stored information to different recipients based on the specific portions that each recipient is authorized to receive. In the example shown inFIG. 1 ,Internal Recipient 1 is authorized to receive information elements A, B, C, and D, whereasInternal Recipient 2 is authorized to receive information elements A, B, and C,External Recipient 1 is authorized to receive information elements A and D, andExternal Recipient 2 is authorized to receive information elements B and C. -
FIG. 2 illustrates an example embodiment of a financial data aggregation andmanagement computer system 20 including one ormore processors 22, one ormore memories 23, one or more inputs/outputs (“I/O(s)”) 24, one or more network interfaces 25, and one ormore storage devices 26, all of which operate collectively to execute computer program instructions. One of ordinary skill in the art will recognize that a computer-implemented, financial private data aggregation, storage, and processing system may contain additional components and thatFIG. 2 is a high level representation of some of the components and processes of such a computer system for illustrative purposes. -
FIG. 3 illustrates a flow chart illustrating example computer-implemented procedures for receiving, aggregating, normalizing, storing, retrieving, enhancing, and providing private enhanced data from multiple disparate private data sources. In step S1, a computer-implemented data storage and processing system gathers, aggregates, and normalizes private financial data from multiple disparate or heterogeneous sources that may use different protocols and formats. Example private data may be received over electronic interfaces from different sources such as for example trading exchanges, dark pools (trading volume or liquidity that is not openly available to the public), and clearing firm/broker/trader logs, clearing houses, etc. - The data may be received in a variety of forms including via a communications network (wired or wireless), computer-readable storage media, operator input, live or batch data feeds, etc. The format of the data received typically varies. Examples include financial industry protocols like the FIX protocol, clients streaming private data via proprietary protocols, through messaging middleware, or other formats. The variously formatted received data is normalized before storage so that it can be aggregated and processed efficiently. As an example, stock for the same company may be purchased and sold at different liquidity destinations using different stock symbols. Statistics for these different stock symbols such as asking price and number of shares are normalized into a comparable and consistent format and then aggregated together. Normalization ensures the private data is converted into comparable and consistent formats and that the data fields contain valid values (data validation). Detailed normalization examples are provided below. The normalized private data is stored in a central or distributed database. One example is a real-time flexible datamart database or collection of databases designed to help managers make strategic decisions about their business. Another example is a data warehouse which combines databases across an entire enterprise. In a preferred example embodiment, the datamart is scalable (by being able to dynamically add more machines to the data cloud/cluster) to a very large size in a cloud storage infrastructure with no degradation of performance.
- Once the information is gathered and normalized into a comparable and consistent format, it is then aggregated or grouped together based on common characteristics and information elements. Aggregation of the private data may be performed via an internal, third party, or “entitled entity” provided network infrastructure. The aggregation is handled across multiple machines connected on the network.
- In step S2, the computer-implemented system processes the normalized data to provide some enrichment or enhancement of some or all of the normalized and aggregated private data. For example, selected portions of normalized financial data may be processed with certain public financial data (market data and reference data) to allow for example calculation of intra-day profit and loss based on underlying market prices or of margin requirements based on exchange-provided initial margin factors on a per financial article of trade basis. Enrichment of the private financial data provides relevant and useful associations between private data to be made which may be used later by entitled entities to deliver data services based on the stored private data. Associations may for example identify relationships between trade transactions and/or parties associated with the transactions. Other examples of enhancement data includes financial reference data, additional financial instrument identifiers/symbologies, “greek” values often used in options and derivatives trading at the time an order was placed, etc. This step may also include enrichment of private financial data with static private financial data example of which include custom haircuts, allocation relationships, mappings between clearing and trading accounts, overnight positions, posted collateral or margin, etc. One example of leveraging static private data to provide a more detailed analysis of relationships between disparate data elements and associated factors is categorizing trade transactions by the venues they relate to or within the electronic/logical market segments they belong to for that venue.
- In step S3, the computer-implemented system maps and analyzes private financial data across multiple assets, multi-markets, clearing houses, currencies, multi-trading systems, global scope and/or regions. Step S2 adds information into the financial data aggregation and management system so as to facilitate potential analysis. Step S3 performs analysis using elements of such additional data. Analyze private data and further enrich with public data for better analysis. For example, enriching the message with public market data of what the related instruments were trading/quoting at when the transaction was submitted.
- The security of the private data is maintained, e.g., via encryption by the computer-implemented system, (step S4), while consolidating the data in the system, which again may be a consolidated elastic or scalable datamart.
- Step S5 includes optional real-time querying of the datamart by a user or participant for a particular portion of the aggregated and possibly enhanced private financial data for which such party is expressly authorized. For example, a bank that has agreed to extend credit to finance trades submitted by a client may be authorized to view only those transactions consummated by such client using credit extended by the bank.
- Step S6 provides an optional ad-hoc analytics/reporting step so that parties with legitimate rights to certain private financial data in the datamart (based on permission, password, encryption key, etc.) define their own reports, have those reports delivered securely, and at what frequency they want to receive those reports (daily, monthly, just one time, etc.) For example, a regulator may be authorized to receive reports of trading activity in a certain stock which involve trading volumes and/or values within a specified time prior to a public announcement by the company that issues such stock which historically have been shown to involve illegal use of “insider information.”
- Parties with legitimate rights to private financial data in the consolidated datamart may request or subscribe to a real-time data stream of consolidated and aggregated private data for further analysis by computer program-implemented algorithms, either on their own computer system or performed by a third party computer system, or for display and viewing by the party (optional step S7). For instance via a user-defined delivery mechanism (e.g., email, ftp, sftp) may be used to define where and how to send the report to the client.
- Optional step S8 provides support for business intelligence integration. For example, computer-implemented business intelligence tools implemented by the user or by a third party may be used to query and then present to entitled entities private data received from the datamart. Examples include data services tools including query functionalities, reporting services, custom on demand analytics tools, and real-time subscription tools. This may involve several steps including an authentication step so that users may only submit queries related to their own private data, defining and submitting queries to pull out private data based on user defined criteria, and formatting the query results in a user defined report layout. A user specified encryption key may be used at the datamart to encrypt the resulting report for delivery to the client.
- The above may be executed on a cloud computing network, which is a highly-scalable, dynamic service, allowing cloud computing providers to provide resources to customers over various communication connections. The cloud infrastructure provides a layer of abstraction, such that customers do not require knowledge of the specific infrastructure within the cloud that provides the requested resources. For example, systems such as infrastructure as a service (IaaS), allow customers to rent computers on which to run their own computer applications. Such systems allow scalable deployment of resources, wherein customers create virtual machines, i.e., server instances, to run software of their choice. Customers can create, use, and destroy these virtual machines as needed, with the provider usually charging for the active servers used to seamlessly incorporate the resources allocated to a customer in the cloud network into a customer's existing private enterprise network.
-
FIG. 4 illustrates conceptually a general example of a cloud computing and storage system. Cloud computing uses computing resources (hardware and software) that are delivered as a service over a network (e.g., the Internet). Cloud computing entrusts remote services with a user's data, software, and computation, and users are provided access to application software and databases. The cloud provider manages the infrastructure and platforms on which the applications run. End users may access cloud-based applications through a web browser, a light-weight desktop, mobile application, or other computer-implemented device. Benefits of cloud computing includes agility by improving users' ability to re-provision technological infrastructure resources; application programming interface (API) accessibility to software that enables machines to interact with cloud software in the same way the user interface facilitates interaction between humans and computers; reduced cost because the infrastructure is typically provided by a third-party and does not need to be purchased for one-time or infrequent intensive computing tasks; device and location independence to enable users to access systems using a web browser regardless of their location or what device they are using (e.g., PC, mobile phone); virtualization technology allows servers and storage devices to be shared and utilization be increased and applications can be easily migrated from one physical server to another; redundancy; scalability and elasticity via dynamic provisioning of data storage and data processing resources. -
FIG. 5 illustrates an example embodiment of a cloud computing andstorage system 50 for receiving, aggregating, normalizing, enhancing, and storing private financial data from multiple disparate privatefinancial data sources 40 including NYSE drop copy, NASDAQ drop copy, BATS drop copy, dark pool drop copy, and other data sources such as custom back office data files. Financial data from the multiple disparate privatefinancial data sources 40 is received at a provider data center and temporarily stored in anelectronic inbox 42 implemented for example using buffer and/or other short term memory. The buffered financial data is then normalized and aggregated 44, possibly processed or enhanced 45, preferably compressed forstorage 46, and preferably encrypted 48 before being provided via one or more networks to a privatedata store database 52 in the cloud computing andstorage system 50. The processing stages may be performed for example using one or more computer servers associated with theprovider data center 41. The cloud computing andstorage system 50 also includespublic data storage 53 accessible to theenhancement processing stage 45 in theprovider data center 41 and to enhancement processing, such as searching and/or analytics, performed by somedata processing resources 56 of the computing andstorage system 50 allocated to process and enhance the selected (e.g., queried) portions of private financial data from theprivate data storage 52 and providing same to aparticipant account storage 58. Participant refers to an authorized/legitimate entity for which an account is established in the computing andstorage system 50 and which receives selected private financial information. - The following is a detailed non-limiting example use case where private financial data is received from multiple disparate sources. The provider data center may collect data from a broker's internal securities order management system(s), securities exchanges such as NASDAQ, NYSE, Direct Edge, BATS, dark pool providers such as Credit Suisse Cross Finder or JP Morgan's JPMX and normalizes and aggregates the data before storing it on behalf of the Participant (in the examples, a “participant” is a securities broker).
- Assume that in this non-limiting example use case that the goal for the participant is to receive a private financial data from the
private data store 52 for use in creating an ad hoc trade blotter type report for the participant staff. The reports are required for immediate review to address a participant customer question or issue. The customer's private financial data is therefore needed to produce the desired report. That private financial data includes in this example customer trades of securities via two internal participant order management systems (one for access to a participant smart order router while the other is used for routing of securities orders to a specific trader and desk at the participant) and also via direct exchange connections to NASDAQ, BATS and NYSE separate and devoid of the participants physical network and order management infrastructure. As a result, the customer's trade data is processed by a total of five separate disparate sources. The provider data center collects from the exchanges and the participant, all of the messages requiring normalization via electronic drop copies or, as an alternative, flat files. - The received financial data is normalized by electronically parsing securities transactions from electronic messages received from those disparate sources to identify the existence and placement of specific data fields in each message and build a map of these fields to a single common data structure. This common data structure is referred to as a normalized data store. More specifically in this example, received data formats are normalized into JavaScript Object Notation (JSON) objects, which are discrete pieces of data stored in JSON format. A JSON format is a lightweight data-interchange format that is easy for humans to read and write, and for machines to parse and generate. JSON is based on the object notation of the JavaScript language, but does not require JavaScript to read or write because it is a text format that is language independent. A JSON record is a complete set of data JSON objects stored in JSON format. Certain fields are required on every record such as fields used for explicit search/indexing on trade blotters. A trade blotter report includes a record of trades and details of the trades made over a period of time (e.g., one trading day). The details of a trade may include such things as the time, price, order size, and a specification of whether it was a buy or sell order. The blotter is usually created through a computer-implemented trading software program that records the trades made through a data feed. An arbitrary number of additional fields (zero or more) can be part of every record, and do not need to be the same for every record in the system. This allows participant clients to add proprietary data/fields to their records, and also accommodates for the lack of consistency across trade order entry protocols.
- The JSON objects are then partitioned into files such that all orders in a given order chain are in the same file but also in a way that any individual file does not exceed a target size. This target size is set to facilitate parallel processing across multiple data processing nodes in a cloud cluster, and also so at given point in time during a search, the memory requirements for a given node are reasonable. This allows the
cloud system 50 to scale to searching archives that could extend into the petabyte or exabyte range. - Those files of JSON records are then compressed and finally encrypted, e.g., using an AES-256 encryption key. Encryption keys are preferably rotated per client, per day, so that if a key is compromised, at most one day of one client's data is at risk. This also has the benefit of limiting how much data needs to be re-encrypted if a key revocation process must be performed. The encrypted, compressed, and normalized private financial data is then stored a regulated
private data store 52 and made available, in real time or batch methods, for use by a participant authorized to access the regulatedprivate data store 52 within thecloud system 50. An example participant might be a securities broker like Goldman Sachs. - Upon request or schedule, specific data (as defined by the participant) is moved from the regulated
private data store 52 to an environment specified by the participant which might be aparticipant account cloud 50 or a dedicated computer infrastructure. This enables the participant to use the normalized data within its own applications examples of which might be transaction cost analysis, transaction surveillance, transaction risk management, portfolio stress testing etc. - A participant logs in (authenticates) to the private data storage system, e.g., through either an online, web-delivered Graphical User Interface (GUI) or an Application Programming Interface (API), and enters a search/retrieval request for private financial data. For example, the participant requests that the provider data center deliver a file, containing specific message files (trade date (MM/DD/YYYY, side (buy, sell, sell short), ticker symbol, quantity (number of shares), price(securities transaction executed price), client identifier(account number), transaction ID, etc. That search is then performed across all JSON records in the cloud system for that client to locate all records matching the search criteria (transactions meeting the participant-defined attributes having occurred across all five of the original trading systems). Files of JSON objects are decrypted and decompressed in memory (so decrypted data is never persisted to disk), and then the JSON records are checked to see if they meet the search criteria. All matching records are copied into a result set of files, and these result set files are compressed and encrypted before delivery to the participant.
- The retrieved result set files are copied down to a delivery process, protected behind multiple layers of network security, where the files are decrypted, decompressed, and the results are merged into a single result file. That result file is then compressed, and optionally encrypted with a PGP encryption key (participants may choose to have their results encrypted or not). The result file is then delivered to wherever the participant specifies. For example, the result file may be FTP/SFTP to a participant's server, use the server-client protocol SCP to deliver the file, or the result file may be stored in the cloud storage in a storage account owned by the participant.
- The participant receives the file and conducts research based upon it. The participant may execute various processing of that private financial data, including internal processing, or making that file available to another vendor, who may provide some processing service for that data. In the examples in
FIGS. 6-8 described below, the exchange of information between cloud participants and vendors may be facilitated by provisioning and permissioning storage “buckets” or containers on the storage platform so that vendors can read participant data delivered by theprovider data center 41 to buckets designed for that purpose. In this way, theprovider data center 41 can facilitate selecting subsets of private financial data for that participant from the private data storage and make that private data readily available to vendors to provide services using that data all within the cloud platform. - In another non-limiting example use case, a participant requires a scheduled delivery of a defined set of private data from the
private data store 52 in the cloud for use in a nightly batch process, e.g., a billing file for customer invoices. The private data includes transactional records for many customers sourced from many disparate systems and stored in theprivate data store 52. The participant defines a scheduled delivery, e.g., at 8 pm, of all data for all customers fitting a defined criteria to the participant. The private data is delivered, in normalized form, to the participant at the scheduled time. This example use case may be implemented as in the earlier example use case with the addition of a recurring search/retrieval request, where the search criteria are relative to the date/time of when the recurrence pattern repeats (e.g., always select data from 8:00 am to 4:00 pm on the day the search runs). The participant specifies a recurrence pattern such as Monday through Friday, every hour on the hour, between 8:00 am and 4:00 pm. - Another feature includes automatically removing private financial data from the storage at a predetermined expiration time. This is advantageous because keeping this data in storage involves ongoing expenses which may no longer be justified given the passage of time and reduced relevance of data that is no longer considered current or timely.
-
FIGS. 6-8 are function block diagrams illustrating non-limiting example embodiments of the technology applied to different security trading related services scenarios drawing information from multiple disparate security trading data sources. In these figures, thecloud provider 50 may be for example the Amazon Web Services (AWS) cloud platform and thesecure cloud platform 51 corresponds to NASDAQ OMX's FinQloud which provides NASDAQ OMX built security, compliance and financial industry-specific functionality to enable users to realize substantial cost savings and achieve unprecedented flexibility over traditional, on-premise computing models. FinQloud is a cloud computing platform exclusively designed for the financial services industry that combines Amazon Web Services' secure, flexible, and cost-effective cloud infrastructure with NASDAQ OMX's experience in providing technology platforms and advisory services for exchanges, regulators, and broker-dealers to provide cost-effective and efficient management and storage of financial data mandated by regulation. FinQloud is a platform for efficient management and storage of financial data that helps market participants streamline operations and aids in management of regulatory compliance requirements without making costly capital expenditures for their underlying infrastructure. FinQloud provides the ability to instantly provision and release compute, storage, and networking resources as needed on a large scale to optimize cost-efficiency while maintaining high performance. For FinQloud participants, this means that resources are always available to meet an immediate business need, no matter how great or how small. - The FinQloud
secure platform 51 includes regulatedprivate data storage 52,public data storage 53, participant accounts 70 for multiple participants, and vendor accounts 82 in avendor marketplace 80. The regulatedprivate data storage 52 includesregulatory data storage 52 a that is write once, read many (WORM) type memory for storing encrypted private financial data,regular data storage 52 b for storing encrypted data, which may also be private financial data but not in WORM memory,archival storage 52 c for archiving older encrypted data, andfuture storage 52 d. Further details of one example regulated data storage are provided in commonly assigned U.S. provisional patent application 61/703,429, filed on Sep. 20, 2012, entitled “Regulatory Records Retention (R3) System and Method,” the disclosure of which is incorporated herein by reference. Eachparticipant account 70 and eachvendor account 82 has access to cloud computing, cloud storage, and other cloud services. Aprovider data center 41, hosted in this example by NASDAQ OMX, includes a participant “inbox” 60 for receiving private financial information and query requests from aparticipant GUI 62. Theinbox 60 is coupled to one ormore data processors 46, e.g., computer servers. Adatabase memory 53 storing public data may also be coupled to thedata processors 46. Thedata processors 46 process the private financial data and optionally enhance it with public data fromstorage 53 before encrypting the private financial data and sending it to the regulatedprivate data storage 52 for secure storage. - In
FIG. 6 , the Participant may request that specifically-identified private data be copied from the Regulatory Data Storage (WORM) 52 a and directed to the Participant'saccount 70 on thesecure cloud platform 51 and/or copied or withdrawn from Regular Data Storage (Encrypted, Non-WORM) 52 b,Archival Storage Medium 52 c, orother Storage 52 d, and directed to the Participant'saccount 70 for computing, data storage, or other cloud services within the overallsecure cloud platform 51. Alternatively, the Participant may choose to input information for computing, data storage, or other cloud services within the Participant'saccount 70 from theParticipant Inbox 60 and/or the Participant Graphical User Interface (GUI) 62. The Participant may also direct information from data storage or resulting from computing or other cloud services associated with the Participant'saccount 70 to avendor account 82 located within aVendor Marketplace 80 where such vendor may provide services related to data storage, computing, and/or other cloud services. The results of such vendor services may be directed from thevendor account 82 back to theParticipant account 70. Information and other resources necessary for the vendor to provide such services may originate external to thesecure cloud platform 51. -
FIG. 7 illustrates a more detailed but still non-limiting example of the scenario shown inFIG. 6 for the FinQloud platform in which private financial data is directed to self-regulating organizations (SROs) in an SROsecure zone 90. Example financial type SROs include the Securities Exchange Commission (SEC), the Financial Industry Regulatory Agency (FINRA), the Commodity Futures trading Commission (CFTC), and/or Designated Examining Authorities (DEAs), which are connected to respective data centers 92. AParticipant 70 directs that specified private data and/or private data enhanced with public data be sent to one of several SROs who have jurisdiction over the Participant's activities such as the SEC, FINRA, CFTC, or DEAs. So rather than having to develop “one-off” technical solutions to respond to regulatory initiatives/requests of each of the SEC, FINRA, CFRC, or DEAs, the secure cloud platform is used to direct specified information to such organization(s) 90 which they can in turn make use of in their own data center(s) 92. Although many of the function blocks are similar to those inFIG. 6 , theparticipant cloud inbox 60 is located within the FinQloud platform in this example to enable the Participant to input secure encrypted data into the RegulatedPrivate Data Store 52 without requiring that it be input via theProvider Data Center 41. - The configuration for the non-limiting example scenario in
FIG. 8 is similar to that for the non-limiting example scenario inFIG. 6 . However, inFIG. 8 , a Participant directs that specified private data and/or private data enhanced with public data to be sent to one ormore recipients 100 who have legitimate rights to such data but are not located within thesecure cloud platform 51. The Participant may instruct that this data be delivered to specifiedrecipients 100 directly or may enlist the assistance of avendor 82 to provide delivery. So rather than having to develop “one-off” technical solutions to meet the disparate needs ofdifferent recipients 100, a Participant leverages the capabilities of the secure cloud platform to direct specified information to eachrecipient 100 based on facts and circumstances applicable to that recipient. Non-limiting examples include directing proxy information to facilitate voting by corporate stockholder recipients or directing tax information toinvestor client recipients 100. - Various example embodiments, also related to a method of sending packets received from a private data source to an entitled destination in a cloud network. This may involve a logical client edge router in a computer system receiving a packet from a private source, querying a directory server for the destination's cloud IP address and location IP address, encapsulating the received packet when the entitled client edge router determines that the destination is within the entitled space, further encapsulating the received packet with the entitled destination's corresponding location IP header, and forwarding the received packet to the entitled destination, wherein the logical client edge router forwards the received packet through the destination location IP address to the destination cloud IP address.
- Although the description above contains many specifics, these should not be construed as limiting the scope of the claims but as merely providing illustrations of example embodiments. For example, even though many of the detailed example embodiments relate to private and public financial data, those skilled in the art will appreciate that the technology may also be applied to other types of private and public data. It will also be appreciated that the technology claimed fully encompasses other embodiments which may become apparent to those skilled in the art, and that the scope of the claims is accordingly not to be limited. Reference to an element in the singular is not intended to mean “one and only one” unless explicitly so stated, but rather “one or more.” All structural and functional equivalents to the elements of the above-described embodiments that are known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed hereby. Moreover, it is not necessary for a device or method to address each and every problem sought to be solved for it to be encompassed hereby. No element, block, or instruction used in the present application should be construed as critical or essential to the implementations described herein unless explicitly described as such. Further, the phrase “based on” is intended to mean “based, at least in part, on” unless explicitly stated otherwise. Unclaimed subject matter is not dedicated to the public and Applicant reserves all rights in unclaimed subject matter including the right to claim such subject matter in this and other applications, e.g., continuations, continuations in part, divisions, etc.
Claims (29)
1. A method implemented in an information processing system having multiple processors, the method comprising:
receiving from multiple data sources at the information processing system private financial data related to financial articles of trade that are tradable on one or more financial markets, where private financial data is exclusively accessible by only a set of entitled entities associated with the private financial data or transactions involving the private financial data, and where the received private financial data from the multiple data sources includes multiple different data formats;
normalizing, via the information processing system, the private financial data in multiple different data formats received from the multiple data sources into a normalized data format and storing the normalized private financial data in storage associated with the information processing system;
processing, via the information processing system, the normalized private financial data with public financial data to provide enhanced private financial data;
storing the enhanced private financial data; and
distributing, via the information processing system, selected portions of the enhanced private financial data to entitled entities with legitimate rights to the selected portions of the enhanced private financial data.
2. The method in claim 1 , wherein the private financial data includes one or more of: transactional data, margin requirements or calls, trading position information, ownership information, or a status of third parties as guarantors of, or providers of credit for, specified transactions.
3. The method in claim 1 , wherein the public financial data includes one or more of: trading market data, trading reference data, an identity of regulators with a legal right to private financial data as authorized by owners of the private financial data, or guarantors or creditors of transactions giving rise to private financial data.
4. The method in claim 1 , wherein the multiple data sources include multiple public trading exchanges and one or more dark pools, and wherein the private financial data is provided in drop copy files associated with the multiple public trading exchanges and the one or more dark pools.
5. The method in claim 1 , wherein the processing step further includes processing the normalized private financial data with other, more static private financial data that includes one or more of: custom haircuts, allocation relationships, mappings between clearing and trading accounts, overnight positions, posted collateral, or margin.
6. The method in claim 1 , wherein the processing step includes processing the normalized private financial data with public trading market and trading reference data to calculate profit and loss based on underlying market prices or to calculate margin requirements.
7. The method in claim 1 , wherein the processing step includes associating the normalized private financial data to entitled entities.
8. The method in claim 1 , wherein the information processing system is a scalable cloud computing and storage system.
9. The method in claim 8 , wherein the scalable cloud computing and storage system supports multiple participant accounts which are entitled to receive selected portions of the enhanced private financial data, and wherein one of the participant accounts provides selected portions of the enhanced private financial data to one or more recipients external to the scalable cloud computing and storage system.
10. The method in claim 8 , wherein the scalable cloud computing and storage system supports multiple participant accounts which are entitled to receive selected portions of the enhanced private financial data,
wherein the scalable cloud computing and storage system supports multiple vendor accounts, and
wherein one of the participant accounts provides selected portions of the enhanced private financial data to one of the vendor accounts for further processing after which the one vendor account performs the distributing step.
11. The method in claim 1 , further comprising receiving a real time query from an entitled entity and providing enhanced private financial data in real time responsive to the real time query to the entitled entity.
12. The method in claim 1 , further comprising automatically removing private financial data from the storage associated with the information processing system at a predetermined expiration time.
13. The method in claim 1 , further comprising encrypting the normalized private financial data, and wherein the storing step includes storing the encrypted normalized private financial data in secure storage.
14. The method in claim 1 , wherein the distributing step includes distributing selected portions of the enhanced private financial data to one or more financial regulatory entities.
15. An information processing system comprising:
one or more data processors in communication with a cloud computing and storage platform via a communications network, data storage coupled to the one or more processors,
wherein the one or more data processors are configured to:
receive from multiple data sources private financial data related to financial articles of trade that are tradable on one or more financial markets, where private financial data is exclusively accessible by only a set of entitled entities associated with the private financial data or transactions involving the private financial data, and where the received private financial data from the multiple data sources includes multiple different data formats;
normalize the private financial data in multiple different data formats received from the multiple data sources into a normalized data format;
store the normalized private financial data in the cloud computing and storage platform;
process or direct the cloud computing and storage platform to process the normalized private financial data with public financial data to provide enhanced private financial data and thereafter store the enhanced private financial data in the cloud computing and storage platform; and
direct the cloud computing and storage platform to distribute selected portions of the enhanced private financial data to entitled entities with legitimate rights to the selected portions of the enhanced private financial data.
16. The information processing system in claim 15 , wherein the one or more data processors are configured to encrypt the normalized private financial data before storing in the cloud computing and storage platform.
17. The information processing system in claim 15 , wherein the one or more data processors are configured to process the normalized private financial data with other, more static private financial data that includes one or more of:
custom haircuts, allocation relationships, mappings between clearing and trading accounts, overnight positions, posted collateral, or margin.
18. The information processing system in claim 15 , wherein the one or more data processors are configured to process the normalized private financial data with public trading market and trading reference data to calculate profit and loss based on underlying market prices or to calculate margin requirements.
19. The information processing system in claim 15 , wherein the one or more data processors are configured to associate the normalized private financial data to entitled entities.
20. A financial information processing system comprising:
one or more data processors coupled to one or more participant interfaces;
a cloud computing and storage platform; and
one or more communications networks providing data communication for the one or more data processors and the cloud computing and storage platform;
wherein the one or more data processors are configured to:
receive, via the one or more communication networks, from multiple data sources private financial data related to financial articles of trade that are tradable on one or more financial markets, where private financial data is exclusively accessible by only a set of entitled entities associated with the private financial data or transactions involving the private financial data, and where the received private financial data from the multiple data sources includes multiple different data formats;
normalize the private financial data in multiple different data formats received from the multiple data sources into a normalized data format;
store the normalized private financial data in the cloud computing and storage platform; and
process or direct the cloud computing and storage platform to process the normalized private financial data with public financial data to provide enhanced private financial data and thereafter store the enhanced private financial data in the cloud computing and storage platform,
wherein the cloud computing and storage platform is configured store the normalized private financial data and to distribute selected portions of the enhanced private financial data to entitled entities with legitimate rights to the selected portions of the enhanced private financial data.
21. The financial information processing system in claim 20 , wherein the cloud computing and storage platform is configured to support multiple participant accounts which are entitled to receive selected portions of the enhanced private financial data, and
wherein one of the participant accounts is configured to provide selected portions of the enhanced private financial data to one or more recipients external to the cloud computing and storage platform.
22. The financial information processing system in claim 20 , wherein the cloud computing and storage platform is configured to support multiple participant accounts which are entitled to receive selected portions of the enhanced private financial data,
wherein the cloud computing and storage platform is configured to support multiple vendor accounts, and
wherein one of the participant accounts is configured to provide selected portions of the enhanced private financial data to one of the vendor accounts for further processing after which the one vendor account performs the distributing step.
23. The financial information processing system in claim 20 , wherein the cloud computing and storage platform is configured to receive a real time query from an entitled entity and provide enhanced private financial data in real time responsive to the real time query to the entitled entity.
24. The financial information processing system in claim 20 , wherein the cloud computing and storage platform is configured to distribute selected portions of the enhanced private financial data to one or more financial regulatory entities.
25. The financial information processing system in claim 20 , wherein the cloud computing and storage platform is configured to automatically remove private financial data from storage at a predetermined expiration time.
26. The financial information processing system in claim 20 , wherein the cloud computing and storage platform includes a secure, regulated data storage and wherein the cloud computing and storage platform is configured to store encrypted normalized private financial data in the secure, regulated data storage.
27. The financial information processing system in claim 20 , wherein the private financial data includes one or more of: transactional data, margin requirements or calls, trading position information, ownership information, or a status of third parties as guarantors of, or providers of credit for, specified transactions.
28. The financial information processing system in claim 20 , wherein the public financial data includes one or more of: trading market data, trading reference data, an identity of regulators with a legal right to private financial data as authorized by owners of the private financial data, or guarantors or creditors of transactions giving rise to private financial data.
29. The financial information processing system in claim 20 , wherein the multiple data sources include multiple public trading exchanges and one or more dark pools, and wherein the private financial data is provided in drop copy files associated with the multiple public trading exchanges and the one or more dark pools.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/719,949 US20140006244A1 (en) | 2011-12-19 | 2012-12-19 | Method and System for Aggregating and Managing Data from Disparate Sources in Consolidated Storage |
US16/193,026 US10482534B2 (en) | 2011-12-19 | 2018-11-16 | Method and system for aggregating and managing data from disparate sources in consolidated storage |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161577188P | 2011-12-19 | 2011-12-19 | |
US13/719,949 US20140006244A1 (en) | 2011-12-19 | 2012-12-19 | Method and System for Aggregating and Managing Data from Disparate Sources in Consolidated Storage |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/193,026 Continuation US10482534B2 (en) | 2011-12-19 | 2018-11-16 | Method and system for aggregating and managing data from disparate sources in consolidated storage |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140006244A1 true US20140006244A1 (en) | 2014-01-02 |
Family
ID=49779148
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/719,949 Abandoned US20140006244A1 (en) | 2011-12-19 | 2012-12-19 | Method and System for Aggregating and Managing Data from Disparate Sources in Consolidated Storage |
US16/193,026 Active US10482534B2 (en) | 2011-12-19 | 2018-11-16 | Method and system for aggregating and managing data from disparate sources in consolidated storage |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/193,026 Active US10482534B2 (en) | 2011-12-19 | 2018-11-16 | Method and system for aggregating and managing data from disparate sources in consolidated storage |
Country Status (1)
Country | Link |
---|---|
US (2) | US20140006244A1 (en) |
Cited By (57)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130339321A1 (en) * | 2012-06-13 | 2013-12-19 | Infosys Limited | Method, system, and computer-readable medium for providing a scalable bio-informatics sequence search on cloud |
US20140006426A1 (en) * | 2012-06-21 | 2014-01-02 | Market76, Inc. | Engine, system and method of providing vertical social networks for client oriented service providers |
US20140101007A1 (en) * | 2012-10-04 | 2014-04-10 | Quickdash, Llc | Methods and apparatus for providing data normalization, scalability and maintainability |
US20140201294A2 (en) * | 2012-06-21 | 2014-07-17 | Market76, Inc. | Engine, system and method of providing vertical social networks for client oriented service providers |
US20140298041A1 (en) * | 2013-03-29 | 2014-10-02 | Dropbox, Inc. | Portable computing device with methodologies for client-side analytic data collection |
US20140330694A1 (en) * | 2013-05-03 | 2014-11-06 | The Royal Bank Of Scotland Group Plc | Method and system for preparation of a financial transaction |
US20150012565A1 (en) * | 2013-07-05 | 2015-01-08 | Evernote Corporation | Selective data transformation and access for secure cloud analytics |
US20150106248A1 (en) * | 2013-10-16 | 2015-04-16 | The Nasdaq Omx Group, Inc. | Customizable Macro-Based Order Entry Protocol and System |
WO2015171434A1 (en) * | 2014-05-04 | 2015-11-12 | Symantec Corporation | Systems and methods for aggregating information-asset metadata from multiple disparate data-management systems |
US9317574B1 (en) | 2012-06-11 | 2016-04-19 | Dell Software Inc. | System and method for managing and identifying subject matter experts |
US9349016B1 (en) | 2014-06-06 | 2016-05-24 | Dell Software Inc. | System and method for user-context-based data loss prevention |
US9390240B1 (en) | 2012-06-11 | 2016-07-12 | Dell Software Inc. | System and method for querying data |
US20160300311A1 (en) * | 2015-04-13 | 2016-10-13 | Bank Of America Corporation | Method and apparatus for replicating and analyzing databases |
US9501744B1 (en) | 2012-06-11 | 2016-11-22 | Dell Software Inc. | System and method for classifying data |
US9507762B1 (en) | 2015-11-19 | 2016-11-29 | International Business Machines Corporation | Converting portions of documents between structured and unstructured data formats to improve computing efficiency and schema flexibility |
US20170011105A1 (en) * | 2015-07-11 | 2017-01-12 | Thinxtream Technologies Pte. Ltd. | Computer network controlled data orchestration system and method for data aggregation, normalization, for presentation, analysis and action/decision making |
US9563782B1 (en) | 2015-04-10 | 2017-02-07 | Dell Software Inc. | Systems and methods of secure self-service access to content |
US9569626B1 (en) | 2015-04-10 | 2017-02-14 | Dell Software Inc. | Systems and methods of reporting content-exposure events |
US9578060B1 (en) | 2012-06-11 | 2017-02-21 | Dell Software Inc. | System and method for data loss prevention across heterogeneous communications platforms |
KR20170025064A (en) | 2015-08-27 | 2017-03-08 | 삼성중공업 주식회사 | Apparatus for fixation of leg in floating structure |
US9641555B1 (en) | 2015-04-10 | 2017-05-02 | Dell Software Inc. | Systems and methods of tracking content-exposure events |
US9842218B1 (en) | 2015-04-10 | 2017-12-12 | Dell Software Inc. | Systems and methods of secure self-service access to content |
US9842220B1 (en) | 2015-04-10 | 2017-12-12 | Dell Software Inc. | Systems and methods of secure self-service access to content |
CN107729394A (en) * | 2017-09-20 | 2018-02-23 | 北京京东尚科信息技术有限公司 | Data Mart management system and its application method based on Hadoop clusters |
US9928266B2 (en) | 2016-06-03 | 2018-03-27 | Workiva Inc. | Method and computing device for minimizing accesses to data storage in conjunction with maintaining a B-tree |
US20180129655A1 (en) * | 2016-11-04 | 2018-05-10 | Sap Se | Encoding and decoding files for a document store |
US9971574B2 (en) | 2014-10-31 | 2018-05-15 | Oracle International Corporation | JSON stylesheet language transformation |
US9990506B1 (en) | 2015-03-30 | 2018-06-05 | Quest Software Inc. | Systems and methods of securing network-accessible peripheral devices |
US20180260895A1 (en) * | 2017-03-09 | 2018-09-13 | Jpmorgan Chase Bank, N.A. | Method and system for performing benchmark comparisons |
US10095768B2 (en) | 2014-11-14 | 2018-10-09 | Veritas Technologies Llc | Systems and methods for aggregating information-asset classifications |
US10142391B1 (en) | 2016-03-25 | 2018-11-27 | Quest Software Inc. | Systems and methods of diagnosing down-layer performance problems via multi-stream performance patternization |
US10157358B1 (en) | 2015-10-05 | 2018-12-18 | Quest Software Inc. | Systems and methods for multi-stream performance patternization and interval-based prediction |
US20190035020A1 (en) * | 2017-07-27 | 2019-01-31 | Hcl Technologies Limited | Method for assigning a trade instruction to a trading system belonging to a financial institution |
US10218588B1 (en) | 2015-10-05 | 2019-02-26 | Quest Software Inc. | Systems and methods for multi-stream performance patternization and optimization of virtual meetings |
US10304095B2 (en) * | 2008-02-04 | 2019-05-28 | Thomson Reuters Global Resources Unlimited Company | System and method for accounting gateway |
US10326748B1 (en) | 2015-02-25 | 2019-06-18 | Quest Software Inc. | Systems and methods for event-based authentication |
US10341103B2 (en) | 2015-01-29 | 2019-07-02 | Entit Software Llc | Data analytics on encrypted data elements |
US10417613B1 (en) | 2015-03-17 | 2019-09-17 | Quest Software Inc. | Systems and methods of patternizing logged user-initiated events for scheduling functions |
US20190287005A1 (en) * | 2018-03-19 | 2019-09-19 | Ge Inspection Technologies, Lp | Diagnosing and predicting electrical pump operation |
US20190347436A1 (en) * | 2018-02-09 | 2019-11-14 | Banjo, Inc. | Detecting events from features derived from ingested signals |
US10482534B2 (en) | 2011-12-19 | 2019-11-19 | Ften Inc. | Method and system for aggregating and managing data from disparate sources in consolidated storage |
US10536352B1 (en) | 2015-08-05 | 2020-01-14 | Quest Software Inc. | Systems and methods for tuning cross-platform data collection |
US20200126050A1 (en) * | 2017-01-19 | 2020-04-23 | Nokia Technologies Oy | IoT GATEWAY AND DESTINATION CLOUD SERVER |
US10635645B1 (en) | 2014-05-04 | 2020-04-28 | Veritas Technologies Llc | Systems and methods for maintaining aggregate tables in databases |
US20210073084A1 (en) * | 2017-07-25 | 2021-03-11 | Hubstor Inc. | Methods and systems relating to network based storage |
US10970184B2 (en) | 2018-02-09 | 2021-04-06 | Banjo, Inc. | Event detection removing private information |
US20210209093A1 (en) * | 2019-01-31 | 2021-07-08 | Sap Se | Data cloud – platform for data enrichment |
US11151153B2 (en) * | 2017-11-30 | 2021-10-19 | Biliana Kirilova Aboutaam | Object generation |
US11216874B2 (en) | 2017-03-09 | 2022-01-04 | Jpmorgan Chase Bank, N.A. | Method and system for aggregating foreign exchange measures |
US11227288B1 (en) * | 2018-07-02 | 2022-01-18 | Credit Suisse Ag | Systems and methods for integration of disparate data feeds for unified data monitoring |
US11238534B2 (en) | 2017-03-09 | 2022-02-01 | Jpmorgan Chase Bank, N.A. | Method and system for commingling aggregate prices and franchise prices |
EP3887972A4 (en) * | 2018-11-29 | 2022-05-18 | Clifin Pty Ltd. | An information management system |
US11361088B2 (en) | 2019-02-25 | 2022-06-14 | Oocl (Infotech) Holdings Limited | Zero trust communication system for freight shipping organizations, and methods of use |
WO2022165437A1 (en) * | 2021-02-01 | 2022-08-04 | FairShares, Inc. | Method and system for computing hidden investment cost disclosable to purchasers and sellers of income-producing securities |
US11625662B2 (en) | 2016-09-22 | 2023-04-11 | Qvinci Software, Llc | Methods and apparatus for the manipulating and providing of anonymized data collected from a plurality of sources |
US11763011B2 (en) | 2019-02-25 | 2023-09-19 | Oocl (Infotech) Holdings Limited | Zero trust communication system for freight shipping organizations, and methods of use |
US11798072B1 (en) * | 2014-05-21 | 2023-10-24 | Plaid Inc. | System and method for programmatically accessing data |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10528700B2 (en) | 2017-04-17 | 2020-01-07 | Rockwell Automation Technologies, Inc. | Industrial automation information contextualization method and system |
US10877464B2 (en) * | 2017-06-08 | 2020-12-29 | Rockwell Automation Technologies, Inc. | Discovery of relationships in a scalable industrial analytics platform |
US11144042B2 (en) | 2018-07-09 | 2021-10-12 | Rockwell Automation Technologies, Inc. | Industrial automation information contextualization method and system |
US11403541B2 (en) | 2019-02-14 | 2022-08-02 | Rockwell Automation Technologies, Inc. | AI extensions and intelligent model validation for an industrial digital twin |
US11086298B2 (en) | 2019-04-15 | 2021-08-10 | Rockwell Automation Technologies, Inc. | Smart gateway platform for industrial internet of things |
US11435726B2 (en) | 2019-09-30 | 2022-09-06 | Rockwell Automation Technologies, Inc. | Contextualization of industrial data at the device level |
US11249462B2 (en) | 2020-01-06 | 2022-02-15 | Rockwell Automation Technologies, Inc. | Industrial data services platform |
US11316806B1 (en) * | 2020-01-28 | 2022-04-26 | Snap Inc. | Bulk message deletion |
US11726459B2 (en) | 2020-06-18 | 2023-08-15 | Rockwell Automation Technologies, Inc. | Industrial automation control program generation from computer-aided design |
CN112685507A (en) * | 2020-12-11 | 2021-04-20 | 广西大学 | Financial data service method and device based on big data, computer equipment and storage medium |
US11568065B2 (en) | 2021-01-15 | 2023-01-31 | Bank Of America Corporation | System for securing electronic data by aggregation of distributed electronic database entries |
US20220405416A1 (en) * | 2021-06-14 | 2022-12-22 | International Business Machines Corporation | Data query against an encrypted database |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020156638A1 (en) * | 2001-02-16 | 2002-10-24 | Guedri Mark G. | Process for identifying shareholders of privately owned businesses who have acquired a threshold new wealth resultant from the sale of that private business |
US20070288662A1 (en) * | 2006-06-12 | 2007-12-13 | Telepaq Technology Inc. | Distributed push-pull information service system |
US20100076888A1 (en) * | 2008-09-25 | 2010-03-25 | Ernst Mark A | System and method for provisioning a controlled secondary market for small dollar deposits and lending |
US20100106646A1 (en) * | 2008-10-23 | 2010-04-29 | Passeri Stacy M | System and method for asset identification, evaluation, and control |
US20100199042A1 (en) * | 2009-01-30 | 2010-08-05 | Twinstrata, Inc | System and method for secure and reliable multi-cloud data replication |
US20110166982A1 (en) * | 2003-10-14 | 2011-07-07 | Ften, Inc. | Intraday risk management data cloud computing system capable of controlling execution of orders |
US20120022997A1 (en) * | 2010-02-26 | 2012-01-26 | Rodman & Renshaw, Llc | Method and system for facilitating securities placements |
US20120102053A1 (en) * | 2010-10-26 | 2012-04-26 | Accenture Global Services Limited | Digital analytics system |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6850252B1 (en) * | 1999-10-05 | 2005-02-01 | Steven M. Hoffberg | Intelligent electronic appliance system and method |
US6253203B1 (en) * | 1998-10-02 | 2001-06-26 | Ncr Corporation | Privacy-enhanced database |
US6598161B1 (en) * | 1999-08-09 | 2003-07-22 | International Business Machines Corporation | Methods, systems and computer program products for multi-level encryption |
US7391865B2 (en) * | 1999-09-20 | 2008-06-24 | Security First Corporation | Secure data parser method and system |
US7130885B2 (en) * | 2000-09-05 | 2006-10-31 | Zaplet, Inc. | Methods and apparatus providing electronic messages that are linked and aggregated |
US7349987B2 (en) * | 2000-11-13 | 2008-03-25 | Digital Doors, Inc. | Data security system and method with parsing and dispersion techniques |
US7797381B2 (en) * | 2003-09-19 | 2010-09-14 | International Business Machines Corporation | Methods and apparatus for information hyperchain management for on-demand business collaboration |
JP4817153B2 (en) * | 2009-11-06 | 2011-11-16 | Necインフロンティア株式会社 | Authentication method for updating software incorporated in information terminal, system thereof and program thereof |
EP2577936A2 (en) * | 2010-05-28 | 2013-04-10 | Lawrence A. Laurich | Accelerator system for use with secure data storage |
US8799022B1 (en) * | 2011-05-04 | 2014-08-05 | Strat ID GIC, Inc. | Method and network for secure transactions |
US20140006244A1 (en) | 2011-12-19 | 2014-01-02 | Ften Inc. | Method and System for Aggregating and Managing Data from Disparate Sources in Consolidated Storage |
US8843492B2 (en) * | 2012-02-13 | 2014-09-23 | Microsoft Corporation | Record linkage based on a trained blocking scheme |
US20140164378A1 (en) * | 2012-12-11 | 2014-06-12 | International Business Machines Corporation | Source record management for master data |
-
2012
- 2012-12-19 US US13/719,949 patent/US20140006244A1/en not_active Abandoned
-
2018
- 2018-11-16 US US16/193,026 patent/US10482534B2/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020156638A1 (en) * | 2001-02-16 | 2002-10-24 | Guedri Mark G. | Process for identifying shareholders of privately owned businesses who have acquired a threshold new wealth resultant from the sale of that private business |
US20110166982A1 (en) * | 2003-10-14 | 2011-07-07 | Ften, Inc. | Intraday risk management data cloud computing system capable of controlling execution of orders |
US20070288662A1 (en) * | 2006-06-12 | 2007-12-13 | Telepaq Technology Inc. | Distributed push-pull information service system |
US20100076888A1 (en) * | 2008-09-25 | 2010-03-25 | Ernst Mark A | System and method for provisioning a controlled secondary market for small dollar deposits and lending |
US20100106646A1 (en) * | 2008-10-23 | 2010-04-29 | Passeri Stacy M | System and method for asset identification, evaluation, and control |
US20100199042A1 (en) * | 2009-01-30 | 2010-08-05 | Twinstrata, Inc | System and method for secure and reliable multi-cloud data replication |
US20120022997A1 (en) * | 2010-02-26 | 2012-01-26 | Rodman & Renshaw, Llc | Method and system for facilitating securities placements |
US20120102053A1 (en) * | 2010-10-26 | 2012-04-26 | Accenture Global Services Limited | Digital analytics system |
Cited By (84)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10304095B2 (en) * | 2008-02-04 | 2019-05-28 | Thomson Reuters Global Resources Unlimited Company | System and method for accounting gateway |
US10482534B2 (en) | 2011-12-19 | 2019-11-19 | Ften Inc. | Method and system for aggregating and managing data from disparate sources in consolidated storage |
US9779260B1 (en) * | 2012-06-11 | 2017-10-03 | Dell Software Inc. | Aggregation and classification of secure data |
US9390240B1 (en) | 2012-06-11 | 2016-07-12 | Dell Software Inc. | System and method for querying data |
US9317574B1 (en) | 2012-06-11 | 2016-04-19 | Dell Software Inc. | System and method for managing and identifying subject matter experts |
US9501744B1 (en) | 2012-06-11 | 2016-11-22 | Dell Software Inc. | System and method for classifying data |
US10146954B1 (en) | 2012-06-11 | 2018-12-04 | Quest Software Inc. | System and method for data aggregation and analysis |
US9578060B1 (en) | 2012-06-11 | 2017-02-21 | Dell Software Inc. | System and method for data loss prevention across heterogeneous communications platforms |
US20130339321A1 (en) * | 2012-06-13 | 2013-12-19 | Infosys Limited | Method, system, and computer-readable medium for providing a scalable bio-informatics sequence search on cloud |
US9201916B2 (en) * | 2012-06-13 | 2015-12-01 | Infosys Limited | Method, system, and computer-readable medium for providing a scalable bio-informatics sequence search on cloud |
US20140201294A2 (en) * | 2012-06-21 | 2014-07-17 | Market76, Inc. | Engine, system and method of providing vertical social networks for client oriented service providers |
US20140006426A1 (en) * | 2012-06-21 | 2014-01-02 | Market76, Inc. | Engine, system and method of providing vertical social networks for client oriented service providers |
US20140101007A1 (en) * | 2012-10-04 | 2014-04-10 | Quickdash, Llc | Methods and apparatus for providing data normalization, scalability and maintainability |
US9858624B2 (en) * | 2012-10-04 | 2018-01-02 | Qvinci Software, Llc | Methods and apparatus for providing data normalization, scalability and maintainability |
US8996889B2 (en) * | 2013-03-29 | 2015-03-31 | Dropbox, Inc. | Portable computing device with methodologies for client-side analytic data collection |
US20140298041A1 (en) * | 2013-03-29 | 2014-10-02 | Dropbox, Inc. | Portable computing device with methodologies for client-side analytic data collection |
US9813393B2 (en) | 2013-03-29 | 2017-11-07 | Dropbox, Inc. | System and method for client-side analytic data collection |
US20140330694A1 (en) * | 2013-05-03 | 2014-11-06 | The Royal Bank Of Scotland Group Plc | Method and system for preparation of a financial transaction |
US20150012565A1 (en) * | 2013-07-05 | 2015-01-08 | Evernote Corporation | Selective data transformation and access for secure cloud analytics |
US9454671B2 (en) * | 2013-07-05 | 2016-09-27 | Evernote Corporation | Selective data transformation and access for secure cloud analytics |
US11562427B2 (en) * | 2013-10-16 | 2023-01-24 | Nasdaq, Inc. | Customizable macro-based order entry protocol and system |
US20200193520A1 (en) * | 2013-10-16 | 2020-06-18 | Nasdaq, Inc. | Customizable Macro-Based Order Entry Protocol and System |
US20160055582A1 (en) * | 2013-10-16 | 2016-02-25 | The Nasdaq Omx Group, Inc. | Customizable Macro-Based Order Entry Protocol and System |
US9123076B2 (en) * | 2013-10-16 | 2015-09-01 | Nasdaq OMX Group, Inc. | Customizable macro-based order entry protocol and system |
US20150106248A1 (en) * | 2013-10-16 | 2015-04-16 | The Nasdaq Omx Group, Inc. | Customizable Macro-Based Order Entry Protocol and System |
US10607289B2 (en) * | 2013-10-16 | 2020-03-31 | Nasdaq, Inc. | Customizable macro-based order entry protocol and system |
US10817510B1 (en) | 2014-05-04 | 2020-10-27 | Veritas Technologies Llc | Systems and methods for navigating through a hierarchy of nodes stored in a database |
US10025804B2 (en) | 2014-05-04 | 2018-07-17 | Veritas Technologies Llc | Systems and methods for aggregating information-asset metadata from multiple disparate data-management systems |
US10078668B1 (en) | 2014-05-04 | 2018-09-18 | Veritas Technologies Llc | Systems and methods for utilizing information-asset metadata aggregated from multiple disparate data-management systems |
US10635645B1 (en) | 2014-05-04 | 2020-04-28 | Veritas Technologies Llc | Systems and methods for maintaining aggregate tables in databases |
AU2015256400B2 (en) * | 2014-05-04 | 2017-12-14 | Veritas Technologies Llc | Systems and methods for aggregating information-asset metadata from multiple disparate data-management systems |
US10073864B1 (en) | 2014-05-04 | 2018-09-11 | Veritas Technologies Llc | Systems and methods for automated aggregation of information-source metadata |
WO2015171434A1 (en) * | 2014-05-04 | 2015-11-12 | Symantec Corporation | Systems and methods for aggregating information-asset metadata from multiple disparate data-management systems |
US11798072B1 (en) * | 2014-05-21 | 2023-10-24 | Plaid Inc. | System and method for programmatically accessing data |
US9349016B1 (en) | 2014-06-06 | 2016-05-24 | Dell Software Inc. | System and method for user-context-based data loss prevention |
US9971574B2 (en) | 2014-10-31 | 2018-05-15 | Oracle International Corporation | JSON stylesheet language transformation |
US10095768B2 (en) | 2014-11-14 | 2018-10-09 | Veritas Technologies Llc | Systems and methods for aggregating information-asset classifications |
US10341103B2 (en) | 2015-01-29 | 2019-07-02 | Entit Software Llc | Data analytics on encrypted data elements |
US10326748B1 (en) | 2015-02-25 | 2019-06-18 | Quest Software Inc. | Systems and methods for event-based authentication |
US10417613B1 (en) | 2015-03-17 | 2019-09-17 | Quest Software Inc. | Systems and methods of patternizing logged user-initiated events for scheduling functions |
US9990506B1 (en) | 2015-03-30 | 2018-06-05 | Quest Software Inc. | Systems and methods of securing network-accessible peripheral devices |
US9569626B1 (en) | 2015-04-10 | 2017-02-14 | Dell Software Inc. | Systems and methods of reporting content-exposure events |
US9641555B1 (en) | 2015-04-10 | 2017-05-02 | Dell Software Inc. | Systems and methods of tracking content-exposure events |
US10140466B1 (en) | 2015-04-10 | 2018-11-27 | Quest Software Inc. | Systems and methods of secure self-service access to content |
US9563782B1 (en) | 2015-04-10 | 2017-02-07 | Dell Software Inc. | Systems and methods of secure self-service access to content |
US9842220B1 (en) | 2015-04-10 | 2017-12-12 | Dell Software Inc. | Systems and methods of secure self-service access to content |
US9842218B1 (en) | 2015-04-10 | 2017-12-12 | Dell Software Inc. | Systems and methods of secure self-service access to content |
US20160300311A1 (en) * | 2015-04-13 | 2016-10-13 | Bank Of America Corporation | Method and apparatus for replicating and analyzing databases |
US9741079B2 (en) * | 2015-04-13 | 2017-08-22 | Bank Of America Corporation | Method and apparatus for replicating and analyzing databases |
US20170011105A1 (en) * | 2015-07-11 | 2017-01-12 | Thinxtream Technologies Pte. Ltd. | Computer network controlled data orchestration system and method for data aggregation, normalization, for presentation, analysis and action/decision making |
US11604802B2 (en) * | 2015-07-11 | 2023-03-14 | Taascom, Inc. | Computer network controlled data orchestration system and method for data aggregation, normalization, for presentation, analysis and action/decision making |
US10536352B1 (en) | 2015-08-05 | 2020-01-14 | Quest Software Inc. | Systems and methods for tuning cross-platform data collection |
KR20170025064A (en) | 2015-08-27 | 2017-03-08 | 삼성중공업 주식회사 | Apparatus for fixation of leg in floating structure |
US10157358B1 (en) | 2015-10-05 | 2018-12-18 | Quest Software Inc. | Systems and methods for multi-stream performance patternization and interval-based prediction |
US10218588B1 (en) | 2015-10-05 | 2019-02-26 | Quest Software Inc. | Systems and methods for multi-stream performance patternization and optimization of virtual meetings |
US11256852B2 (en) | 2015-11-19 | 2022-02-22 | International Business Machines Corporation | Converting portions of documents between structured and unstructured data formats to improve computing efficiency and schema flexibility |
US9507762B1 (en) | 2015-11-19 | 2016-11-29 | International Business Machines Corporation | Converting portions of documents between structured and unstructured data formats to improve computing efficiency and schema flexibility |
US10142391B1 (en) | 2016-03-25 | 2018-11-27 | Quest Software Inc. | Systems and methods of diagnosing down-layer performance problems via multi-stream performance patternization |
US10733172B2 (en) | 2016-06-03 | 2020-08-04 | Workiva Inc. | Method and computing device for minimizing accesses to data storage in conjunction with maintaining a B-tree |
US9928266B2 (en) | 2016-06-03 | 2018-03-27 | Workiva Inc. | Method and computing device for minimizing accesses to data storage in conjunction with maintaining a B-tree |
US11625662B2 (en) | 2016-09-22 | 2023-04-11 | Qvinci Software, Llc | Methods and apparatus for the manipulating and providing of anonymized data collected from a plurality of sources |
US10769214B2 (en) * | 2016-11-04 | 2020-09-08 | Sap Se | Encoding and decoding files for a document store |
US20180129655A1 (en) * | 2016-11-04 | 2018-05-10 | Sap Se | Encoding and decoding files for a document store |
US20200126050A1 (en) * | 2017-01-19 | 2020-04-23 | Nokia Technologies Oy | IoT GATEWAY AND DESTINATION CLOUD SERVER |
US20180260895A1 (en) * | 2017-03-09 | 2018-09-13 | Jpmorgan Chase Bank, N.A. | Method and system for performing benchmark comparisons |
US11238534B2 (en) | 2017-03-09 | 2022-02-01 | Jpmorgan Chase Bank, N.A. | Method and system for commingling aggregate prices and franchise prices |
US11216874B2 (en) | 2017-03-09 | 2022-01-04 | Jpmorgan Chase Bank, N.A. | Method and system for aggregating foreign exchange measures |
US20210073084A1 (en) * | 2017-07-25 | 2021-03-11 | Hubstor Inc. | Methods and systems relating to network based storage |
US11789828B2 (en) * | 2017-07-25 | 2023-10-17 | Veritas Technologies Llc | Methods and systems relating to network based storage |
US20190035020A1 (en) * | 2017-07-27 | 2019-01-31 | Hcl Technologies Limited | Method for assigning a trade instruction to a trading system belonging to a financial institution |
CN107729394A (en) * | 2017-09-20 | 2018-02-23 | 北京京东尚科信息技术有限公司 | Data Mart management system and its application method based on Hadoop clusters |
US11151153B2 (en) * | 2017-11-30 | 2021-10-19 | Biliana Kirilova Aboutaam | Object generation |
US10839095B2 (en) * | 2018-02-09 | 2020-11-17 | safeXai, Inc. | Detecting events from features derived from ingested signals |
US10970184B2 (en) | 2018-02-09 | 2021-04-06 | Banjo, Inc. | Event detection removing private information |
US20190347436A1 (en) * | 2018-02-09 | 2019-11-14 | Banjo, Inc. | Detecting events from features derived from ingested signals |
US10628601B2 (en) * | 2018-02-09 | 2020-04-21 | Banjo, Inc. | Detecting events from features derived from ingested signals |
US20190287005A1 (en) * | 2018-03-19 | 2019-09-19 | Ge Inspection Technologies, Lp | Diagnosing and predicting electrical pump operation |
US11227288B1 (en) * | 2018-07-02 | 2022-01-18 | Credit Suisse Ag | Systems and methods for integration of disparate data feeds for unified data monitoring |
EP3887972A4 (en) * | 2018-11-29 | 2022-05-18 | Clifin Pty Ltd. | An information management system |
US20210209093A1 (en) * | 2019-01-31 | 2021-07-08 | Sap Se | Data cloud – platform for data enrichment |
US11636091B2 (en) * | 2019-01-31 | 2023-04-25 | Sap Se | Data cloud—platform for data enrichment |
US11361088B2 (en) | 2019-02-25 | 2022-06-14 | Oocl (Infotech) Holdings Limited | Zero trust communication system for freight shipping organizations, and methods of use |
US11763011B2 (en) | 2019-02-25 | 2023-09-19 | Oocl (Infotech) Holdings Limited | Zero trust communication system for freight shipping organizations, and methods of use |
WO2022165437A1 (en) * | 2021-02-01 | 2022-08-04 | FairShares, Inc. | Method and system for computing hidden investment cost disclosable to purchasers and sellers of income-producing securities |
Also Published As
Publication number | Publication date |
---|---|
US20190087900A1 (en) | 2019-03-21 |
US10482534B2 (en) | 2019-11-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10482534B2 (en) | Method and system for aggregating and managing data from disparate sources in consolidated storage | |
US10636091B2 (en) | Trading system products and processes | |
US8583544B2 (en) | Systems and methods for facilitating electronic securities transactions | |
JP6364132B2 (en) | Blockchain transaction recording system and method | |
US8521627B2 (en) | Systems and methods for facilitating electronic securities transactions | |
US20180189887A1 (en) | Cryptographic currency for financial data management, digital and digitalized cross-asset identification and unique digital asset identifier generation, asset valuation and financial risk management | |
US8301547B2 (en) | Trading system | |
US10979405B2 (en) | Database-centered computer network systems and computer-implemented methods for cryptographically-secured distributed data management based on entropy and having a supervisory node | |
US11601498B2 (en) | Reconciliation of data stored on permissioned database storage across independent computing nodes | |
US11663666B2 (en) | Secure deterministic tokens for encrypting electronic communications | |
US20100125526A1 (en) | Three Party Services Transaction System | |
US20200327544A1 (en) | System and method for implementing a market data hub via distributed ledger technology | |
US20210118027A1 (en) | Client specific data distribution | |
CN110249322B (en) | System and method for aggregating, filtering, and presenting streaming data | |
US20230289751A1 (en) | Systems and methods for executing real-time electronic transactions by a dynamically determined transfer execution date |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FTEN, INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CROWLEY, BRIAN;BANNERT-THURNER, VALERIE;TIMMES, JASON;SIGNING DATES FROM 20130130 TO 20130306;REEL/FRAME:030079/0368 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |