Systems and methods of the present disclosure may receive, from a user computing device, a user-provided data record query including a natural language request for information associated with one or more data sources. User persona attributes of the user may be determined, such as a user role or security parameters or both. Based on the user persona attributes a context query may be generated to obtain context attributes associated with the user-provided query. The natural language request and the context attributes are input into the model orchestration large language model (LLM) to output instructions to machine learning (ML) agents based on the context attributes. The ML agents output responses associated with the user-provided data record query based on the instructions, and the responses are input into the model orchestration LLM to output to the user computing device a natural language response based on the context attributes.
In some embodiments, the instant invention provides a programmed system that includes at least the following components: a computer programmed with software instructions that include: code to periodically receive financial data of a plurality of customers from a plurality of financial-related entities related to a plurality of financial assets, code to consolidate the financial data into a consolidated financial data; code to analyze the consolidated financial data with at least one address-matching program; code to associate each record of the consolidated financial data with a respective eleven digit postal code to result in an address-enriched consolidated financial data; code to anonymize the address-enriched consolidated financial data to form an anonymous address-enriched consolidated financial data; and code to link information of the anonymous address-enriched consolidated financial data across a plurality data relationship to form a consolidate household view for each respective eleven digit postal code.
G06Q 40/06 - Gestion de biensPlanification ou analyse financières
3.
DATABASE-CENTERED COMPUTER NETWORK SYSTEMS AND COMPUTER-IMPLEMENTED METHODS FOR CRYPTOGRAPHICALLY-SECURED DISTRIBUTED DATA MANAGEMENT BASED ON ENTROPY AND HAVING A SUPERVISORY NODE
In some embodiments, the present invention provides for an exemplary computer system which includes at least the following components: a network of externally owned presence (EOP) member nodes, including a supervisory EOP member node is configured to generate at least one personalized cryptographic private key for each peer EOP member node; a distributed database, storing a plurality of persistent data objects; and a plurality of self-contained self-executing software containers (SESCs); where each SESC includes an independently executable software code which is at least configured to: apply entropy to generate a state hash representative of a current state of a persistent data object, perform a data action with the persistent data object; and determine that a particular EOP member node has a permission to cause the SESC to perform the data action with the persistent data object based.
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06Q 40/04 - TransactionsOpérations boursières, p. ex. actions, marchandises, produits dérivés ou change de devises
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
4.
METHOD AND SYSTEM RELATING TO SOCIAL MEDIA TECHNOLOGIES
In an embodiment, a method performed in the computing system comprises steps of (a) electronically receiving an identifier concerning an investor's ownership or management of at least one brokerage account or at least one security; (b) electronically validating by the computing system the investor by querying a record database using the identifier to obtain an information from at least one investment account associated with the investor; (c) electronically extracting by the computing system the information; (d) electronically populating by the computing system a profile for the investor with the extracted information and electronically storing the extracted information to a computer readable medium in a profile database, wherein the extracted information comprises at least the investor's positional information; (e) electronically providing by the computing system at least one capability to the investor, wherein the capability allows the investor to electronically perform one or more activities; and (f) electronically generating by the computing system a representation of a quantity of a security owned or managed by the investor from the investor's positional information without generating a personal information of the investor.
G06Q 40/06 - Gestion de biensPlanification ou analyse financières
G06Q 40/04 - TransactionsOpérations boursières, p. ex. actions, marchandises, produits dérivés ou change de devises
G06Q 50/00 - Technologies de l’information et de la communication [TIC] spécialement adaptées à la mise en œuvre des procédés d’affaires d’un secteur particulier d’activité économique, p. ex. aux services d’utilité publique ou au tourisme
36 - Services financiers, assurances et affaires immobilières
Produits et services
Regulatory submission management, namely, assisting others in preparing and filing documents with governmental regulatory bodies; Providing a secured access database via the Internet through which documents and images can be viewed, copied, and printed for purposes of conducting corporate transactions Transfer agency services rendered to issuers of investment securities
6.
COMPUTER NETWORK SYSTEMS FOR CRYPTOGRAPHICALLY-SECURED, TOKEN-BASED OPERATIONS AND METHODS OF USE THEREOF
Systems and methods of the present disclosure enable reversible blockchain operations. An operation-reverse operation pair specifies an operation for exchange of a first token for a second token, and a reverse operation for return of the second token for the first token upon at least one condition being satisfied. A self-executing software container (SESC) executes the operation-reverse operation pair according to the condition by detecting a transfer of the first token into a first segregated data structure, and a transfer of the second token from a second token storage to a first token storage. The SESC initiates a transfer of the first token from the first segregated data structure to a second segregated data structure in response to the transfer of the second token. Upon detecting a reverse operation matching the condition, the SESC initiates a transfer of the first token back to the first segregated data structure.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 16/16 - Opérations sur les fichiers ou les dossiers, p. ex. détails des interfaces utilisateur spécialement adaptées aux systèmes de fichiers
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
H04L 9/38 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité le chiffrement étant effectué par un appareil mécanique, p. ex. cames rotatives, interrupteurs, perforatrices de bande à clavier de clé
7.
COMPUTER-BASED SYSTEMS AND METHODS FOR MACHINE LEARNING BASED EXCEPTION PREDICTIONS
A failure prediction method including a predicting flow and a model training flow, the predicting flow including receiving a natural language input from a client computer, translating the input into a task by a LLM, selecting a ML model dedicated to the task, receiving first data, converting the first data to second data of a predetermined format, immediately applying, the ML model on the second data for predicting an output and providing a corresponding explanation, storing the second data and the output into historical data in a storage layer, translating the output and the explanation into a prediction in the natural language by the LLM, and transmitting the prediction to the client computer and iterating the predicting flow for a predetermined number of time; and the model training flow including retrieving the historical data from the storage layer, and training the ML model on the historical data.
Systems and methods of the present disclosure may receive, from a user computing device, a user-provided data record query including a natural language request for information associated with one or more data sources. User persona attributes of the user may be determined, such as a user role or security parameters or both. Based on the user persona attributes a context query may be generated to obtain context attributes associated with the user-provided query. The natural language request and the context attributes are input into the model orchestration large language model (LLM) to output instructions to machine learning (ML) agents based on the context attributes. The ML agents output responses associated with the user-provided data record query based on the instructions, and the responses are input into the model orchestration LLM to output to the user computing device a natural language response based on the context attributes.
Systems and methods of the present disclosure may receive, from a user computing device, a user- provided data record query including a natural language request for information associated with one or more data sources. User persona attributes of the user may be determined, such as a user role or security parameters or both. Based on the user persona attributes a context query may be generated to obtain context attributes associated with the user-provided query. The natural language request and the context attributes are input into the model orchestration large language model (LLM) to output instructions to machine learning (ML) agents based on the context attributes. The ML agents output responses associated with the user-provided data record query based on the instructions, and the responses are input into the model orchestration LLM to output to the user computing device a natural language response based on the context attributes.
In some embodiments, the present disclosure provides an exemplary method that may include steps of identifying a plurality of entities seeking to interact with each other; analyzing each entity to determine a type of constraint between each entity of the plurality of entities; automatically generating an internal identification token associated with each entity based on stored information; and utilizing the internal identification token to perform at least one action associated with the interaction of the plurality of entities.
A present disclosure provides an exemplary system that includes at least: a distributed blockchain environment, including: a plurality of externally owned presence (EOP) member nodes associated with a plurality of distinct entities, a cryptographically-secured distributed ledger; a plurality of electronic wallets (e-Wallets), configured to hold records of distributed leger collateral (DLC) tokens; a plurality of self-contained self-executing software containers (SESCs), including: first-type SESCs, second-type SESCs, and third-type SESCs; where the DLC tokens are used by the distributed blockchain environment; where the first-type SESCs, the second-type SESCs, and the third-type SESCs are distinct SESCs; where each DLC token include at least one unique entity-identifying cryptographic hash; where, for each respective transaction associated with a respective EOP member node, a respective computer invokes the first-type SESCs and the third-type SESCs to cryptographically administer each respective transaction within the distributed blockchain environment.
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
12.
COMPUTER-BASED SYSTEMS CONFIGURED TO ORCHESTRATE A TRANSFER OF A DIGITAL ARTIFACT AND METHODS OF USE THEREOF
In some embodiments, the present disclosure provides an exemplary method that may include steps of identifying a plurality of entities seeking to interact with each other; determining a set of artifacts associated with each entity of the plurality of entities; Utilizing a cloud-based functionality to dynamically connect at least two entities based on a determination of the set of artifacts shared between the at least two entities; dynamically integrating a plurality of protocols into an interaction session associated with the at least two entities; verifying the plurality of protocols associated with the interaction session; initiating the interaction session between at least two entities based on the plurality of protocols and the set of artifacts; and automatically modifying the interaction session to orchestrate a transfer of at least one artifact of the set of artifacts between the at least two entities.
In some embodiments, the present disclosure provides an exemplary method that may include steps of accessing a set of data records; receiving an instruction to perform an action; determining input data associated with the instruction; verifying the input data; identifying a pattern of behavior associated with each type of data; converting verified input data of a particular data type into a uniform secure data state; dynamically enabling a communication session between at least two security modules; orchestrating a delay within the communication session; and automatically programming a plurality of controls to modify the communication session.
G06F 21/50 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation
G06Q 40/04 - TransactionsOpérations boursières, p. ex. actions, marchandises, produits dérivés ou change de devises
In some embodiments, the present disclosure provides an exemplary method that may include steps of identifying a plurality of entities seeking to interact with each other; analyzing each entity to determine a type of constraint between each entity of the plurality of entities; automatically generating an internal identification token associated with each entity based on stored information; and utilizing the internal identification token to perform at least one action associated with the interaction of the plurality of entities.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
15.
COMPUTER-BASED SYSTEMS CONFIGURED TO AUTOMATICALLY PROGRAM A PLURALITY OF CONTROLS TO MODIFY A COMMUNICATION SESSION ASSOCIATED WITH A TRANSACTION AND METHODS OF USE THEREOF
In some embodiments, the present disclosure provides an exemplary method that may include steps of accessing a set of data records; receiving an instruction to perform an action; determining input data associated with the instruction; verifying the input data; identifying a pattern of behavior associated with each type of data; converting verified input data of a particular data type into a uniform secure data state; dynamically enabling a communication session between at least two security modules; orchestrating a delay within the communication session; and automatically programming a plurality of controls to modify the communication session.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 40/04 - TransactionsOpérations boursières, p. ex. actions, marchandises, produits dérivés ou change de devises
16.
Computer-based systems configured to automatically generate a interaction session based on an internal identification token and methods of use thereof
In some embodiments, the present disclosure provides an exemplary method that may include steps of identifying a plurality of entities seeking to interact with each other, analyzing each entity to determine a type of constraint between each entity of the plurality of entities; automatically generating an internal identification token associated with each entity based on stored information; and utilizing the internal identification token to perform at least one action associated with the interaction of the plurality of entities.
A machine-learning based method includes receiving an instruction to model an engagement predicting score for a user. User-specific, activity-specific data is obtained from digital resources that include a user-specific activity performance data regarding performance of at least one activity by the user, an object data for an object that allows the user to perform the at least one activity, and user-specific personal data of the user. A user-specific activity engagement labeling data for the at least one activity is predicted by utilizing a first-type data pipeline on the at least one user-specific activity performance data. User-specific, activity-specific data features are predicted by utilizing a second-type data pipeline on the user-specific, activity-specific data. The engagement predicting score is predicted from the user-specific, activity-specific data features and the user-specific activity engagement labeling data. A computing device is instructed to present at least one user-specific activity-related action instruction.
In some embodiments, the present disclosure provides an exemplary method that may include steps of identifying a plurality of entities seeking to interact with each other; determining a set of artifacts associated with each entity of the plurality of entities; Utilizing a cloud-based functionality to dynamically connect at least two entities based on a determination of the set of artifacts shared between the at least two entities; dynamically integrating a plurality of protocols into an interaction session associated with the at least two entities; verifying the plurality of protocols associated with the interaction session; initiating the interaction session between at least two entities based on the plurality of protocols and the set of artifacts; and automatically modifying the interaction session to orchestrate a transfer of at least one artifact of the set of artifacts between the at least two entities.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
19.
Systems and methods of large language model driven orchestration of task-specific machine learning software agents
Systems and methods of the present disclosure may receive, from a user computing device, a user-provided data record query including a natural language request for information associated with one or more data sources. User persona attributes of the user may be determined, such as a user role or security parameters or both. Based on the user persona attributes a context query may be generated to obtain context attributes associated with the user-provided query. The natural language request and the context attributes are input into the model orchestration large language model (LLM) to output instructions to machine learning (ML) agents based on the context attributes. The ML agents output responses associated with the user-provided data record query based on the instructions, and the responses are input into the model orchestration LLM to output to the user computing device a natural language response based on the context attributes.
G06N 3/10 - Interfaces, langages de programmation ou boîtes à outils de développement logiciel, p. ex. pour la simulation de réseaux neuronaux
20.
DATABASE-CENTERED COMPUTER NETWORK SYSTEMS AND COMPUTER-IMPLEMENTED METHODS FOR CRYPTOGRAPHICALLY-SECURED DISTRIBUTED DATA MANAGEMENT BASED ON ENTROPY AND HAVING A SUPERVISORY NODE
In some embodiments, the present invention provides for an exemplary computer system which includes at least the following components: a network of externally owned presence (EOP) member nodes, including a supervisory EOP member node is configured to generate at least one personalized cryptographic private key for each peer EOP member node; a distributed database, storing a plurality of persistent data objects; and a plurality of self-contained self-executing software containers (SESCs); where each SESC includes an independently executable software code which is at least configured to: apply entropy to generate a state hash representative of a current state of a persistent data object, perform a data action with the persistent data object; and determine that a particular EOP member node has a permission to cause the SESC to perform the data action with the persistent data object based.
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06Q 40/04 - TransactionsOpérations boursières, p. ex. actions, marchandises, produits dérivés ou change de devises
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
21.
MAPPING CONSUMER OWNERSHIP OF FINANCIAL ASSETS TO GEOGRAPHIC LOCALITIES AND COMPUTER-IMPLEMENTED METHODS AND COMPUTER SYSTEMS THEREOF
In some embodiments, the instant invention provides a programmed system that includes at least the following components: a computer programmed with software instructions that include: code to periodically receive financial data of a plurality of customers from a plurality of financial-related entities related to a plurality of financial assets, code to consolidate the financial data into a consolidated financial data; code to analyze the consolidated financial data with at least one address-matching program; code to associate each record of the consolidated financial data with a respective eleven digit postal code to result in an address-enriched consolidated financial data; code to anonymize the address-enriched consolidated financial data to form an anonymous address-enriched consolidated financial data; and code to link information of the anonymous address-enriched consolidated financial data across a plurality data relationship to form a consolidate household view for each respective eleven digit postal code.
In an embodiment, a method performed in the computing system comprises steps of (a) electronically receiving an identifier concerning an investor's ownership or management of at least one brokerage account or at least one security; (b) electronically validating computing system the investor by querying a record database using the identifier to obtain an information from at least one investment account associated with the investor; (c) electronically extracting by the computing system the information; (d) electronically populating by the computing system a profile for the investor with the extracted information and electronically storing the extracted information to a computer readable medium in a profile database, wherein the extracted information comprises at least the investor's positional information; (e) electronically providing by the computing system at least one capability to the investor, wherein the capability allows the investor to electronically perform one or more activities; and (f) electronically generating by the computing system a representation of a quantity of a security owned or managed by the investor from the investor's positional information without generating a personal information of the investor.
G06Q 40/06 - Gestion de biensPlanification ou analyse financières
G06Q 40/04 - TransactionsOpérations boursières, p. ex. actions, marchandises, produits dérivés ou change de devises
G06Q 50/00 - Technologies de l’information et de la communication [TIC] spécialement adaptées à la mise en œuvre des procédés d’affaires d’un secteur particulier d’activité économique, p. ex. aux services d’utilité publique ou au tourisme
23.
COMPUTER NETWORK SYSTEMS ADMINISTERING CRYPTOGRAPHICALLY-SECURED, TOKEN-BASED SUBSTITUTION MANAGEMENT AND METHODS OF USE THEREOF
A present disclosure provides an exemplary system that includes at least: a distributed blockchain environment, including: a plurality of externally owned presence (EOP) member nodes associated with a plurality of distinct entities, a cryptographically-secured distributed ledger; a plurality of electronic wallets (e-Wallets), configured to hold records of distributed leger collateral (DLC) tokens; a plurality of self-contained self-executing software containers (SESCs), including: first-type SESCs, second-type SESCs, and third-type SESCs; where the DLC tokens are used by the distributed blockchain environment; where the first-type SESCs, the second-type SESCs, and the third-type SESCs are distinct SESCs; where each DLC token include at least one unique entity-identifying cryptographic hash; where, for each respective transaction associated with a respective EOP member node, a respective computer invokes the first-type SESCs and the third-type SESCs to cryptographically administer each respective transaction within the distributed blockchain environment.
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
24.
Computer network systems for cryptographically-secured, token-based operations and methods of use thereof
Systems and methods of the present disclosure enable reversible blockchain operations. An operation-reverse operation pair specifies an operation for exchange of a first token for a second token, and a reverse operation for return of the second token for the first token upon at least one condition being satisfied. A self-executing software container (SESC) executes the operation-reverse operation pair according to the condition by detecting a transfer of the first token into a first segregated data structure, and a transfer of the second token from a second token storage to a first token storage. The SESC initiates a transfer of the first token from the first segregated data structure to a second segregated data structure in response to the transfer of the second token. Upon detecting a reverse operation matching the condition, the SESC initiates a transfer of the first token back to the first segregated data structure.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 16/16 - Opérations sur les fichiers ou les dossiers, p. ex. détails des interfaces utilisateur spécialement adaptées aux systèmes de fichiers
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
H04L 9/38 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité le chiffrement étant effectué par un appareil mécanique, p. ex. cames rotatives, interrupteurs, perforatrices de bande à clavier de clé
25.
FACILITATING CORPORATE TENDERS/DUTCH AUCTION TENDERS AND COMPUTER-IMPLEMENTED METHODS AND COMPUTER SYSTEMS THEREOF
In some embodiments, the instant invention provides a programmed system having a computer programmed with software instructions that include at least: code to receive an electronic Tender voting request to conduct a Tender voting; where the Tender voting is limited to a plurality of employees who has owned shares of an issuer at a record date via at least one of: i) at least one 401K plan, and ii) at least one employee stock ownership plan (ESOP); where the Tender voting is selected from the group of Tender voting types consisting of: i) a Tender offer, ii) an All-or-None Tender offer, and iii) a Dutch Tender auction; code to identify the plurality of employees; code to generate a plurality of programmed visual computer screens to allow the plurality of employees to submit Tender votes; and code to dynamically output a report identifying a progress of the Tender voting.
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Financial evaluation, tracking, processing, analysis, forecasting, consultancy, capacity optimization, advisory, research, settlement, and exception management services relating to securities, assets and other financial instruments; financial data analysis; front-to-back trade lifecycle management services for securities, assets and other financial instruments; electronic financial trading, processing, and settlement services; investment management, processing, exception management, capacity optimization, research and settlement in the fields of securities, assets and other financial instruments; securities, assets and other financial instruments trading, investing, processing, exception management, and settlement services for others via the internet Computer software platform provided on a software as service (SaaS) basis leveraging artificial intelligence to increase operations velocity and efficiency for securities, assets and other financial instruments trading, processing and settlements
27.
Machine learning-based methods and systems for modeling user-specific, activity specific engagement predicting scores
A machine-learning based method includes receiving an instruction to model an engagement predicting score for a user. User-specific, activity-specific data is obtained from digital resources that include a user-specific activity performance data regarding performance of at least one activity by the user, an object data for an object that allows the user to perform the at least one activity, and user-specific personal data of the user. A user-specific activity engagement labeling data for the at least one activity is predicted by utilizing a first-type data pipeline on the at least one user-specific activity performance data. User-specific, activity-specific data features are predicted by utilizing a second-type data pipeline on the user-specific, activity-specific data. The engagement predicting score is predicted from the user-specific, activity-specific data features and the user-specific activity engagement labeling data. A computing device is instructed to present at least one user-specific activity-related action instruction.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer software platform provided on a software as a service (SaaS) basis using artificial intelligence to identify patterns of bond and securities trading activity
A machine-learning based method includes receiving an instruction to model an engagement predicting score for a user. User-specific, activity-specific data is obtained from digital resources that include a user-specific activity performance data regarding performance of at least one activity by the user, an object data for an object that allows the user to perform the at least one activity, and user-specific personal data of the user. A user-specific activity engagement labeling data for the at least one activity is predicted by utilizing a first-type data pipeline on the at least one user-specific activity performance data. User-specific, activity-specific data features are predicted by utilizing a second-type data pipeline on the user-specific, activity-specific data. The engagement predicting score is predicted from the user-specific, activity-specific data features and the user-specific activity engagement labeling data. A computing device is instructed to present at least one user-specific activity-related action instruction.
Systems and methods of the present disclosure enable reversible blockchain operations. An operation-reverse operation pair specifies an operation for exchange of a first token for a second token, and a reverse operation for return of the second token for the first token upon at least one condition being satisfied. A self-executing software container (SESC) executes the operation-reverse operation pair according to the condition by detecting a transfer of the first token into a first segregated data structure, and a transfer of the second token from a second token storage to a first token storage. The SESC initiates a transfer of the first token from the first segregated data structure to a second segregated data structure in response to the transfer of the second token. Upon detecting a reverse operation matching the condition, the SESC initiates a transfer of the first token back to the first segregated data structure.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 16/16 - Opérations sur les fichiers ou les dossiers, p. ex. détails des interfaces utilisateur spécialement adaptées aux systèmes de fichiers
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
H04L 9/38 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité le chiffrement étant effectué par un appareil mécanique, p. ex. cames rotatives, interrupteurs, perforatrices de bande à clavier de clé
35.
COMPUTER NETWORK SYSTEMS FOR CRYPTOGRAPHICALLY-SECURED, TOKEN-BASED OPERATIONS AND METHODS OF USE THEREOF
Systems and methods of the present disclosure enable reversible blockchain operations. An operation-reverse operation pair specifies an operation for exchange of a first token for a second token, and a reverse operation for return of the second token for the first token upon at least one condition being satisfied. A self-executing software container (SESC) executes the operation-reverse operation pair according to the condition by detecting a transfer of the first token into a first segregated data structure, and a transfer of the second token from a second token storage to a first token storage. The SESC initiates a transfer of the first token from the first segregated data structure to a second segregated data structure in response to the transfer of the second token. Upon detecting a reverse operation matching the condition, the SESC initiates a transfer of the first token back to the first segregated data structure.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Software as a service (SAAS) services featuring software for assisting wealth management professionals and financial advisors, for enabling financial services firms to create, manage, and distribute electronic information pertaining to financial transactions and regulatory communications, and for financial asset management and servicing
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Software as a service (SAAS) services featuring software for assisting wealth management professionals and financial advisors, for enabling financial services firms to create, manage, and distribute electronic information pertaining to financial transactions and regulatory communications, and for financial asset management and servicing
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Platform as a service (PaaS) featuring computer software platforms for enabling financial services firms to create, manage, and distribute electronic information pertaining to financial transactions and regulatory communications
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Computer software consulting; computer technology consultation in the field of machine learning and artificial intelligence; consulting services in the field of cloud computing; consulting services in the fields of implementation and use of computer hardware and software systems for others; integration of computer systems and networks;
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer software consulting; integration of computer software into multiple systems and networks; technology consultation in the fields of adoption of artificial intelligence, blockchain technology, cloud computing, and digital technologies
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing temporary use of online non-downloadable software, namely, computer software platform used to identify patterns of bond trading activity
42.
Method and system relating to social media technologies configured for permissioned activities on a network platform hosting shareholder forum and meetings
In an embodiment, a method performed in the computing system comprises steps of (a) electronically receiving an identifier concerning an investor's ownership or management of at least one brokerage account or at least one security; (b) electronically validating by the computing system the investor by querying a record database using the identifier to obtain an information from at least one investment account associated with the investor; (c) electronically extracting by the computing system the information; (d) electronically populating by the computing system a profile for the investor with the extracted information and electronically storing the extracted information to a computer readable medium in a profile database, wherein the extracted information comprises at least the investor's positional information; (e) electronically providing by the computing system at least one capability to the investor, wherein the capability allows the investor to electronically perform one or more activities; and (f) electronically generating by the computing system a representation of a quantity of a security owned or managed by the investor from the investor's positional information without generating a personal information of the investor.
G06Q 40/04 - TransactionsOpérations boursières, p. ex. actions, marchandises, produits dérivés ou change de devises
G06Q 40/06 - Gestion de biensPlanification ou analyse financières
G06Q 50/00 - Technologies de l’information et de la communication [TIC] spécialement adaptées à la mise en œuvre des procédés d’affaires d’un secteur particulier d’activité économique, p. ex. aux services d’utilité publique ou au tourisme
43.
Computer network systems administering cryptographically-secured, token-based substitution management and methods of use thereof
A present disclosure provides an exemplary system that includes at least: a distributed blockchain environment, including: a plurality of externally owned presence (EOP) member nodes associated with a plurality of distinct entities, a cryptographically-secured distributed ledger; a plurality of electronic wallets (e-Wallets), configured to hold records of distributed leger collateral (DLC) tokens; a plurality of self-contained self-executing software containers (SESCs), including: first-type SESCs, second-type SESCs, and third-type SESCs; where the DLC tokens are used by the distributed blockchain environment; where the first-type SESCs, the second-type SESCs, and the third-type SESCs are distinct SESCs; where each DLC token include at least one unique entity-identifying cryptographic hash; where, for each respective transaction associated with a respective EOP member node, a respective computer invokes the first-type SESCs and the third-type SESCs to cryptographically administer each respective transaction within the distributed blockchain environment.
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
44.
Database-centered computer network systems and computer-implemented methods for cryptographically-secured distributed data management based on entropy and having a supervisory node
In some embodiments, the present invention provides for an exemplary computer system which includes at least the following components: a network of externally owned presence (EOP) member nodes, including a supervisory EOP member node is configured to generate at least one personalized cryptographic private key for each peer EOP member node; a distributed database, storing a plurality of persistent data objects; and a plurality of self-contained self-executing software containers (SESCs); where each SESC includes an independently executable software code which is at least configured to: apply entropy to generate a state hash representative of a current state of a persistent data object, perform a data action with the persistent data object; and determine that a particular EOP member node has a permission to cause the SESC to perform the data action with the persistent data object based.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06Q 40/04 - TransactionsOpérations boursières, p. ex. actions, marchandises, produits dérivés ou change de devises
In an embodiment, a method performed in the computing system comprises steps of (a) electronically receiving an identifier concerning an investor's ownership or management of at least one brokerage account or at least one security; (b) electronically validating by the computing system the investor by querying a record database using the identifier to obtain an information from at least one investment account associated with the investor; (c) electronically extracting by the computing system the information; (d) electronically populating by the computing system a profile for the investor with the extracted information and electronically storing the extracted information to a computer readable medium in a profile database, wherein the extracted information comprises at least the investor's positional information; (e) electronically providing by the computing system at least one capability to the investor, wherein the capability allows the investor to electronically perform one or more activities; and (f) electronically generating by the computing system a representation of a quantity of a security owned or managed by the investor from the investor's positional information without generating a personal information of the investor.
G06Q 40/00 - FinanceAssuranceStratégies fiscalesTraitement des impôts sur les sociétés ou sur le revenu
G06Q 40/06 - Gestion de biensPlanification ou analyse financières
G06Q 40/04 - TransactionsOpérations boursières, p. ex. actions, marchandises, produits dérivés ou change de devises
G06Q 50/00 - Technologies de l’information et de la communication [TIC] spécialement adaptées à la mise en œuvre des procédés d’affaires d’un secteur particulier d’activité économique, p. ex. aux services d’utilité publique ou au tourisme
47.
Database-centered computer network systems and computer-implemented methods for cryptographically-secured distributed data management based on entropy and having a supervisory node
In some embodiments, the present invention provides for an exemplary computer system which includes at least the following components: a network of externally owned presence (EOP) member nodes, including a supervisory EOP member node is configured to generate at least one personalized cryptographic private key for each peer EOP member node; a distributed database, storing a plurality of persistent data objects; and a plurality of self-contained self-executing software containers (SESCs); where each SESC includes an independently executable software code which is at least configured to: apply entropy to generate a state hash representative of a current state of a persistent data object, perform a data action with the persistent data object; and determine that a particular EOP member node has a permission to cause the SESC to perform the data action with the persistent data object based.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing temporary use of online, non-downloadable software used to facilitate electronic preparation and filing of documents with the Securities and Exchange Commission
50.
Mapping consumer ownership of financial assets to geographic localities and computer-implemented methods and computer systems thereof
In some embodiments, the instant invention provides a programmed system that includes at least the following components: a computer programmed with software instructions that include: code to periodically receive financial data of a plurality of customers from a plurality of financial-related entities related to a plurality of financial assets, code to consolidate the financial data into a consolidated financial data; code to analyze the consolidated financial data with at least one address-matching program; code to associate each record of the consolidated financial data with a respective eleven digit postal code to result in an address-enriched consolidated financial data; code to anonymize the address-enriched consolidated financial data to form an anonymous address-enriched consolidated financial data; and code to link information of the anonymous address-enriched consolidated financial data across a plurality data relationship to form a consolidate household view for each respective eleven digit postal code.
In some embodiments, the present invention provides for an exemplary computer system which includes at least the following components: a network of externally owned presence (EOP) member nodes, including a supervisory EOP member node is configured to generate at least one personalized cryptographic private key for each peer EOP member node; a distributed database, storing a plurality of persistent data objects; and a plurality of self-contained self-executing software containers (SESCs); where each SESC includes an independently executable software code which is at least configured to: generate a state hash representative of a current state of a persistent data object, perform a data action with the persistent data object; and determine that a particular EOP member node has a permission to cause the SESC to perform the data action with the persistent data object based.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
In some embodiments, the instant invention provides a programmed system that includes at least the following components: a computer programmed with software instructions that include: code to periodically receive financial data of a plurality of customers from a plurality of financial- related entities related to a plurality of financial assets, code to consolidate the financial data into a consolidated financial data; code to analyze the consolidated financial data with at least one address-matching program; code to associate each record of the consolidated financial data with a respective eleven digit postal code to result in an address-enriched consolidated financial data; code to anonymize the address-enriched consolidated financial data to form an anonymous address-enriched consolidated financial data; and code to link information of the anonymous address-enriched consolidated financial data across a plurality data relationship to form a consolidate household view for each respective eleven digit postal code.
In some embodiments, the instant invention provides a programmed system having a computer programmed with software instructions that include at least: code to receive an electronic Tender voting request to conduct a Tender voting; where the Tender voting is limited to a plurality of employees who has owned shares of an issuer at a record date via at least one of: i) at least one 401K plan, and ii) at least one employee stock ownership plan (ESOP); where the Tender voting is selected from the group of Tender voting types consisting of: i) a Tender offer, ii) an All-or-None Tender offer, and iii) a Dutch Tender auction; code to identify the plurality of employees; code to generate a plurality of programmed visual computer screens to allow the plurality of employees to submit Tender votes; and code to dynamically output a report identifying a progress of the Tender voting.
In some embodiments, the instant invention provides a programmed system having a computer programmed with software instructions that include at least: code to receive an electronic Tender voting request to conduct a Tender voting; where the Tender voting is limited to a plurality of employees who has owned shares of an issuer at a record date via at least one of: i) at least one 401K plan, and ii) at least one employee stock ownership plan (ESOP); where the Tender voting is selected from the group of Tender voting types consisting of: i) a Tender offer, ii) an All-or- None Tender offer, and iii) a Dutch Tender auction; code to identify the plurality of employees; code to generate a plurality of programmed visual computer screens to allow the plurality of employees to submit Tender votes; and code to dynamically output a report identifying a progress of the Tender voting.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Provision of software platforms as an online service (PAAS) namely provisional of computer software platforms for creating and managing communications material relating to marketing, transactional and regulatory communications from a financial services firm to its clients and distributing same via websites, mobile software applications, email, and social media platforms
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing use of non-downloadable computer software for distribution of news, sales, trends, and information regarding sales and assets of mutual funds and exchange-traded funds (ETFs) to financial institutions
09 - Appareils et instruments scientifiques et électriques
Produits et services
Downloadable computer software for the management of brokerage fee and commission payments and receipts, reconciliation of financial transactions involving cash, securities, derivatives and commodities, and management of financial trading activities.
09 - Appareils et instruments scientifiques et électriques
36 - Services financiers, assurances et affaires immobilières
Produits et services
Downloadable computer software for the management of securities, derivatives, and commodities brokerage fee and commission payments and receipts, reconciliation of financial transactions involving cash, securities, derivatives and commodities, and management of financial trading activities Management of securities, derivatives, and commodities brokerage fee and commission payments and receipts; reconciliation of financial transactions involving cash, securities, derivatives and commodities; managing financial trading activities; providing a secured access database via the internet for the management of securities, derivatives, and commodities brokerage fee and commission payments and receipts, reconciliation of financial transactions involving cash, securities, derivatives and commodities, and management of financial trading activities
09 - Appareils et instruments scientifiques et électriques
16 - Papier, carton et produits en ces matières
36 - Services financiers, assurances et affaires immobilières
Produits et services
Providing electronic downloadable reports regarding shareholder and investor voting [ Printed reports featuring information regarding shareholder and investor voting ] Providing information via the Internet in the field of shareholder and investor voting; providing a secured access database via the Internet through which documents and images can be viewed, downloaded, and printed for use by others in the analysis of shareholder and investor voting
65.
Method and system relating to social media technologies
In an embodiment, a method performed by the computing system comprises steps of: (a) receiving an identifier concerning an investor's ownership or management of a brokerage account or a security; (b) validating by the computing system the investor by querying a record database using the identifier to obtain an information from an investment account associated with the investor; (c) extracting by the computing system the information; (d) populating by the computing system a profile for the investor with the extracted information and electronically storing the extracted information to a computer readable medium in a profile database, wherein the extracted information comprises the investor's positional information; (e) providing by the computing system a capability to the investor, wherein the capability allows the investor to electronically perform one or more activities; and (f) generating by the computing system a representation of a quantity of a security owned or managed by the investor from the investor's positional information without generating a personal information of the investor.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing temporary use of a non-downloadable computer software application for proxy management and processing via a global telecommunications network
A method, system, and program product for the electronic delivery and distribution of a solicitation for votes on shareholder issues from an issuer to a plurality of voters. The method includes creating an electronic solicitation message for the issuer; tagging the electronic solicitation message with at least one parameter to ensure the electronic solicitation message is available to the voters holding a shareholder position with the issuer; presenting the electronic solicitation message to the voters; recording and compiling a plurality of information regarding each viewing of the transmitted solicitation message; aggregating a plurality of electronic voting results from the voters; and reporting the aggregated electronic voting results to the issuer.
36 - Services financiers, assurances et affaires immobilières
Produits et services
(1) Providing securities brokerage services, namely, securities transaction processing, provision of market data, communications with investors, and foreign exchange and money market information and trading services.
36 - Services financiers, assurances et affaires immobilières
38 - Services de télécommunications
Produits et services
(1) Electronic transmission of data via computer terminals namely, the transmission of on-line brokerage orders originating from personal computers, the internet, and telephone trading systems.
36 - Services financiers, assurances et affaires immobilières
Produits et services
(1) On-line ordering services featuring mutual fund prospectuses of others.
(2) Providing an on-line computer database in the field of mutual fund investments; providing reports concerning the use of the on-line computer database in the field of mutual fund investments via a global computer network.
09 - Appareils et instruments scientifiques et électriques
16 - Papier, carton et produits en ces matières
Produits et services
(1) Computer application system for investor communications used to coordinate and effect investor communication mailings and proxy tabulations for public corporations and mutual fund companies.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Shareholders communication services, namely, services enabling shareholders to receive proxy materials and exercise voting entitlements via an information and communication network.
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
Produits et services
(1) Computer software, namely, software allowing user to interface with mainframe to receive electronic proxy information and execution of electronic voting. (1) Computerized proxy services, namely, electronic delivery of proxy ballots and electronic processing of returned votes.
(1) Investor dividend, proxy and communications services, namely, providing printing, mailing and tabulation of registered and employee share plan annual proxies, and dividend cheque processing services.
95.
FACILITATING CORPORATE TENDERS/DUTCH AUCTION TENDERS AND COMPUTER-IMPLEMENTED METHODS AND COMPUTER SYSTEMS THEREOF
In some embodiments, the instant invention provides a programmed system having a computer programmed with software instructions that include at least: code to receive an electronic Tender voting request to conduct a Tender voting; where the Tender voting is limited to a plurality of employees who has owned shares of an issuer at a record date via at least one of: i) at least one 401K plan, and ii) at least one employee stock ownership plan (ESOP); where the Tender voting is selected from the group of Tender voting types consisting of: i) a Tender offer, ii) an All-or- None Tender offer, and iii) a Dutch Tender auction; code to identify the plurality of employees; code to generate a plurality of programmed visual computer screens to allow the plurality of employees to submit Tender votes; and code to dynamically output a report identifying a progress of the Tender voting.