Institutional Cash Distributors Technology, LLC Patent applications |
Patent application number | Title | Published |
20150066809 | COLLECTIVELY ANALYZING HOLDINGS ACROSS MULTIPLE FIXED INCOME PRODUCTS - Systems, methods, and computer-readable mediums (i.e., utilities) for use in enabling corporate treasurers, money managers, and other investors to view and analyze consolidated credit risk on individual investments across multiple money market products (MMPs) and/or multiple accounts. In one aspect, the utilities may generate a database of MMP and related holding information that may be used to research and analyze one or more MMPs and/or underlying securities even if the same MMP or security is associated with different identifiers. In another aspect, the securities or holdings of the MMPs of actual or sample accounts may be aggregated (e.g., by common identifier, sponsor, issuer, etc.) either within MMPs and/or across multiple MMPs and subsequently analyzed to generate inferences and to obtain numerous types of information which may be presented to corporate treasurers and/or other users on a display (e.g., text, charts, graphs, etc.) for use in gauging a company's or other entity's credit exposure and in making decisions based on what is displayed. | 03-05-2015 |
20140331058 | ENCAPSULATED SECURITY TOKENS FOR ELECTRONIC TRANSACTIONS - Functional data for use in one or more digital transactions are secured by using an encapsulated security token (EST). In certain embodiments, the EST is created by encapsulating digital data including the functional data using at least two cryptographic systems of two parties. The encapsulation and subsequent de-encapsulation can utilize cryptographic systems of the parties that involve a private key for signing and decryption and a public key for encryption and signature verification. If constructed carefully over a series of rigorous events, the resulting EST can be practically impossible to counterfeit. In addition, a propagation of rights can be tracked for auditing and rights can be easily terminated or modified. | 11-06-2014 |
20130318619 | ENCAPSULATED SECURITY TOKENS FOR ELECTRONIC TRANSACTIONS - Functional data for use in one or more digital transactions is secured by using an encapsulated security token (EST). In certain embodiments, the EST is created by encapsulating digital data including the functional data using at least two digital signature systems of two parties. The encapsulation and subsequent de-encapsulation can utilize digital signature systems of the parties that involve a private key for encapsulation and a public key for de-encapsulation. If constructed carefully over a series of rigorous events, the resulting EST can be practically impossible to counterfeit. In addition, a propagation of rights can be tracked for auditing and rights can be easily terminated or modified. | 11-28-2013 |
20130317990 | SECURE TRANSACTION OBJECT CREATION, PROPAGATION AND INVOCATION - Functional data of a cash channel is encapsulated by at least two parties in succession to define an at least twice-encapsulated data object. The encapsulation and subsequent de-encapsulation can utilize digital signature systems of the parties that involve a private key for encapsulation and a public key for de-encapsulation. If constructed carefully over a series of rigorous events, the resulting at least twice-encapsulated data object can be practically impossible to counterfeit. In addition, a propagation of rights can be tracked for auditing and rights can be easily terminated or modified. | 11-28-2013 |