Systems and methods enabling investment activities via the creation and use of client-specific security files
First Claim
1. A computer-implemented method for performing an investment portfolio activity, comprising:
- storing, in a computer memory, a plurality of record entries, including a first record entry and a second record entry that are both associated with a first security, wherein the first record entry stores a first data value for an attribute associated with the first security, and the second record entry stores a second data value for the attribute associated with the first security, wherein the first data value for the attribute is different from the second data value for the attribute, wherein the attribute associated with the first security is either (i) a share price associated with the first security, or (ii) a sector associated with the first security, wherein the first record entry is associated with a first scope defining when the first record entry can be utilized, wherein the second record entry is associated with a second scope defining when the second entry can be utilized;
receiving an instruction to perform one of (i) trading one or more securities, (ii) generating one or more reports, (iii) executing one or more “
what if”
scenarios, or (iv) performing account rebalancing;
determining that the received instruction is associated with the first security, the first scope, and the second scope;
identifying the first record entry and the second record entry based at least in part upon the determined association of the received instruction with the first scope, the second scope, and the first security;
determining that the second scope has priority over the first scope based upon a precedence ordering between the first scope and the second scope; and
performing, in accordance with the received instruction, the one of (i) trading one or more securities, (ii) generating one or more reports, (iii) executing one or more “
what if”
scenarios, or (iv) performing account rebalancing using the second data value of the attribute from the second record entry,wherein the prior steps are executed by one or more computers associated with a portfolio management system.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods and system for performing an investment portfolio activity. A record associated with a security is stored. The record includes two or more data fields each associated with a respective security attribute, and each data field is associated with a single data value. A request to add a new data field to one of the security attributes is received, and the new data field is associated with a new data value. A customized record associated with the security is created, which includes the new data field and the new data value, and an order to perform an investment portfolio activity associated with the security is received. The investment portfolio activity is executed using the new data value included in the customized record.
40 Citations
14 Claims
-
1. A computer-implemented method for performing an investment portfolio activity, comprising:
-
storing, in a computer memory, a plurality of record entries, including a first record entry and a second record entry that are both associated with a first security, wherein the first record entry stores a first data value for an attribute associated with the first security, and the second record entry stores a second data value for the attribute associated with the first security, wherein the first data value for the attribute is different from the second data value for the attribute, wherein the attribute associated with the first security is either (i) a share price associated with the first security, or (ii) a sector associated with the first security, wherein the first record entry is associated with a first scope defining when the first record entry can be utilized, wherein the second record entry is associated with a second scope defining when the second entry can be utilized; receiving an instruction to perform one of (i) trading one or more securities, (ii) generating one or more reports, (iii) executing one or more “
what if”
scenarios, or (iv) performing account rebalancing;determining that the received instruction is associated with the first security, the first scope, and the second scope; identifying the first record entry and the second record entry based at least in part upon the determined association of the received instruction with the first scope, the second scope, and the first security; determining that the second scope has priority over the first scope based upon a precedence ordering between the first scope and the second scope; and performing, in accordance with the received instruction, the one of (i) trading one or more securities, (ii) generating one or more reports, (iii) executing one or more “
what if”
scenarios, or (iv) performing account rebalancing using the second data value of the attribute from the second record entry,wherein the prior steps are executed by one or more computers associated with a portfolio management system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented system for performing an investment portfolio activity, comprising:
-
at least one storage device, wherein the at least one storage device stores a plurality of record entries, including a first record entry and a second record entry that are both associated with a first security, wherein the first record entry stores a first data value for an attribute associated with the first security, and the second record entry stores a second data value for the attribute associated with the first security, wherein the first data value for the attribute is different from the second data value for the attribute, wherein the attribute associated with the first security is either (i) a share price associated with the first security, or (ii) a sector associated with the first security, wherein the first record entry is associated with a first scope defining when the first record entry can be utilized, wherein the second record entry is associated with a second scope defining when the second entry can be utilized; at least one processor in communication with the at least one storage device, wherein the at least one processor is configured to computer-executable instructions to; receive an instruction to perform one of (i) trading one or more securities, (ii) generating one or more reports, (iii) executing one or more “
what if”
scenarios, or (iv) performing account rebalancing;determine that the received instruction is associated with the first security, the first scope, and the second scope; identify the first record entry and the second record entry based at least in part upon the determined association of the received instruction with the first scope, the second scope, and the first security; determine that the second scope has priority over the first scope based upon a precedence ordering between the first scope and the second scope; and perform, in accordance with the received instruction, the one of (i) trading one or more securities, (ii) generating one or more reports, (iii) executing one or more “
what if”
scenarios, or (iv) performing account rebalancing using the second data value of the attribute from the second record entry. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification