Patent application number | Description | Published |
20100280939 | FINANCIAL DATA PROCESSING SYSTEM - A method of processing financial articles of trade is provided. The method includes collecting real time data from a plurality of liquidity destinations in trading at least one of securities, commodities, options, futures and derivatives, the real time data including information on submitted transactions of financial articles of trade. The real time data collected from the plurality of liquidity destinations is aggregated. The real time data is streamed in a standardized form. User criteria are established to identify relevant portions of the streamed real time data. The streamed real time data is analyzed according to the user criteria. The analyzed real time data is consolidated into a computer data base. | 11-04-2010 |
20110161220 | Method and System for Monitoring Financial Market Trading Activity to Establish and Track Aggregate Trading Limits Based on Trading Sub-Limits Assigned by Prime Brokers for Particular Trading Entities - The present invention relates to systems and methods for monitoring market transaction activity data to determine when a trading entity has exceeded an aggregated limit consisting of one or more trading sub-limits corresponding to one or more custodial prime brokers facilitating trading for the trading entity. The method includes collecting at a centralized hub real time data related to conditions of a trading market from one or more liquidity destinations trading at least one financial article of trade. Trading activity for a trading entity is determined. An aggregate trading limit is determined that is based on one or more trading sub-limits assigned by one or more prime brokers for that trading entity. It is determined when that trading activity exceeds the aggregate trading limit. | 06-30-2011 |
20110166982 | INTRADAY RISK MANAGEMENT DATA CLOUD COMPUTING SYSTEM CAPABLE OF CONTROLLING EXECUTION OF ORDERS - In at least one embodiment, a method and system associated with financial articles of trade may include comparing relevant portions of data pertaining to an attempted transaction, wherein the transaction may pertain to one in which an entity is financially liable but unaware. At least one embodiment includes monitoring market transaction activity data to determine when a trading entity has exceeded an aggregated limit, such as one or more trading sub-limits corresponding to one or more custodial prime brokers facilitating trading for the trading entity. At least one embodiment includes a pre-trade gateway to determine if an order violates a pre-trade risk based on information collected by a front-end analyzer. Possible actions include, but are not limited to, placing a null order, terminating a connection associated with the order, modifying the order so as not to violate a pre-trade risk check, and/or notifications to one or more entities. | 07-07-2011 |
20110202447 | Financial data processing system - To process financial articles of trade, real time data is collected from a plurality of liquidity destinations in trading at least one of securities, commodities, options, futures and derivatives, the real time data including information on submitted transactions of financial articles of trade. The real time data collected from the plurality of liquidity destinations is aggregated. The real time data is streamed in a standardized form. User criteria are established to identify relevant portions of the streamed real time data. The streamed real time data is analyzed according to the user criteria. The analyzed real time data is consolidated into a computer data base. | 08-18-2011 |
20120203682 | FINANCIAL DATA PROCESSING SYSTEM - To process financial articles of trade and manage risk, data messages originating from a plurality of sources arranged to trade at least one of securities, commodities, options, futures and derivatives are collected. The collected data including information on submitted transactions and completed transactions of financial articles of trade. The collected data is analyzed against established user criteria to identify select portions of the collected data. If a match is detected a risk alert signal will be transmitted. | 08-09-2012 |
20140032259 | SYSTEMS AND METHODS FOR PRIVATE AND SECURE COLLECTION AND MANAGEMENT OF PERSONAL CONSUMER DATA - Computer systems and related methods for managing and protecting consumer data and increasing the accuracy of consumer purchasing alternatives by means of private and secure collection and management of personal online and/or offline consumer data from disparate data sources. In one example, a method for collecting information includes collecting and aggregating a plurality of data relating to a user from a plurality of unaffiliated data sources, wherein the data comprises data of varying formats. Collection of the data is performed in part under authorization by the user. The method may include normalizing the data into a standardized form. The method also includes generating an aggregated data profile associated with the user based on the data that is collected and aggregated. The aggregated data profile gives the user control over their personal data and, with express user permission, provides vendors with a comprehensive view of the user, their interests and characteristics. | 01-30-2014 |
20140082749 | SYSTEMS AND METHODS FOR SECURE AND PERSISTENT RETENTION OF SENSITIVE INFORMATION - An information processing system provisions a client account for a user to enable a client computer associated with the user to store information in an elastic storage system and to prohibit the client computer, the information processing system, and the elastic storage system from altering and from deleting the stored information during an authorized retention period. Data messages are received from one or more client computers and include information that is required to be stored for the authorized retention period. That information is transmitted via one or more data communications networks to the elastic storage system for storage so that the stored information is non-rewriteable and non-erasable during the authorized retention period. The secure data center receives the retrieved copy and provides it to the user device. The elastic storage system permits deletion, modification, or destruction of the stored information only when a trusted independent third party having predetermined authentication information associated with the client account provides the predetermined authentication information to the elastic storage system. | 03-20-2014 |
20140287723 | Mobile Applications For Dynamic De-Identification And Anonymity - Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy and security by enabling subjects to which data pertains to remain “dynamically anonymous,” i.e., anonymous for as long as is desired—and to the extent that is desired—are disclosed herein. Embodiments may include systems that create, access, use (e.g., by collecting, processing, copying, analyzing, combining, modifying or disseminating, etc.), store and/or erase data with increased privacy and security, thereby facilitating the availability of more qualified and accurate information. When data is authorized by subjects to be shared with third parties, embodiments may facilitate sharing information in a dynamically controlled manner that enables delivery of temporally-, geographically-, and/or purpose-limited information to the receiving party. In one example, mobile/wearable/portable applications implementing a system or aspects thereof as disclosed herein may provide a controlling entity with control over both the timing and level of participation in location- and time-sensitive applications. | 09-25-2014 |
20150128284 | Dynamic De-Identification And Anonymity - Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity and security by enabling subjects to which data pertains to remain “dynamically anonymous,” i.e., anonymous for as long as is desired—and to the extent that is desired—are disclosed herein. Embodiments include systems that create, access, use, store and/or erase data with increased privacy, anonymity and security, thereby facilitating the availability of more qualified and accurate information. When data is authorized by subjects to be shared with third parties, embodiments may facilitate sharing information in a dynamically controlled manner that enables delivery of temporally-, geographically-, and/or purpose-limited information to the receiving party. In one example, anonymity measurement scores may be calculated for the shared data elements so that a level of consent/involvement required by the Data Subject before sharing the relevant data elements to third parties may be specified. | 05-07-2015 |
20150128285 | Dynamic De-Identification And Anonymity - Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity and security by enabling subjects to which data pertains to remain “dynamically anonymous,” i.e., anonymous for as long as is desired—and to the extent that is desired—are disclosed herein. Embodiments include systems that create, access, use, store and/or erase data with increased privacy, anonymity and security, thereby facilitating the availability of more qualified and accurate information. When data is authorized by subjects to be shared with third parties, embodiments may facilitate sharing information in a dynamically controlled manner that enables delivery of temporally-, geographically-, and/or purpose-limited information to the receiving party. In one example, anonymity measurement scores may be calculated for the shared data elements so that a level of consent/involvement required by the Data Subject before sharing the relevant data elements to third parties may be specified. | 05-07-2015 |
20150128287 | Dynamic De-Identification And Anonymity - Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity and security by enabling subjects to which data pertains to remain “dynamically anonymous,” i.e., anonymous for as long as is desired—and to the extent that is desired—are disclosed herein. Embodiments include systems that create, access, use, store and/or erase data with increased privacy, anonymity and security, thereby facilitating the availability of more qualified and accurate information. When data is authorized by subjects to be shared with third parties, embodiments may facilitate sharing information in a dynamically controlled manner that enables delivery of temporally-, geographically-, and/or purpose-limited information to the receiving party. In one example, anonymity measurement scores may be calculated for the shared data elements so that a level of consent/involvement required by the Data Subject before sharing the relevant data elements to third parties may be specified. | 05-07-2015 |
20150187003 | METHOD AND SYSTEM FOR MANAGING INTRADAY RISK OVER A COMMUNICATIONS NETWORK - Example embodiments include a method and system for managing intraday risk conditions. Data transaction specific data messages transmitted over a data communications network from a plurality of source nodes trading an article of trade with a plurality of destination nodes are processed. The messages include account parameter information. Intraday risk condition data is associated in memory with entity identification data associated with an entity. Using the entity identification data, account parameter information included in the processed data transaction specific data messages is identified that matches the intraday risk condition data for the entity. In response to an identified match, a data transaction involving the entity submitted via a communication session to a corresponding one of the plurality of destination nodes is modified to reduce intraday risk for the entity associated with the data transaction. | 07-02-2015 |
20150206155 | Systems And Methods For Private And Secure Collection And Management Of Personal Consumer Data - Computer systems and related methods for managing and protecting consumer data and increasing the accuracy of consumer purchasing alternatives by means of private and secure collection and management of personal online and/or offline consumer data from disparate data sources. In one example, a method for collecting information includes collecting and aggregating a plurality of data relating to a user from a plurality of unaffiliated data sources, wherein the data comprises data of varying formats. Collection of the data is performed in part under authorization by the user. The method may include normalizing the data into a standardized form. The method also includes generating an aggregated data profile associated with the user based on the data that is collected and aggregated. The aggregated data profile gives the user control over their personal data and, with express user permission, provides vendors with a comprehensive view of the user, their interests and characteristics. | 07-23-2015 |