WO2007090241A1 - A method for optimising the security value of an investment portfolio - Google Patents
A method for optimising the security value of an investment portfolio Download PDFInfo
- Publication number
- WO2007090241A1 WO2007090241A1 PCT/AU2007/000140 AU2007000140W WO2007090241A1 WO 2007090241 A1 WO2007090241 A1 WO 2007090241A1 AU 2007000140 W AU2007000140 W AU 2007000140W WO 2007090241 A1 WO2007090241 A1 WO 2007090241A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- securities
- portfolio
- value
- diversified
- security
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/06—Asset management; Financial planning or analysis
Definitions
- the present invention relates to a method of optimising the security value of an investment portfolio lodged as security for a margin loan.
- a portfolio that is not diversified has all, or most of its securities in a similar type of asset class or market sector. For example, an investor could have all their portfolio value in a small number of 'blue chip' securities. Although these securities may have a solid record of stable earnings and dividend growth, there is a systematic risk that all the securities could be affected by adverse market changes. For example, a portfolio consisting only of shares is vulnerable to stock market drop or crash. A portfolio consisting only of securities in a specific company is vulnerable to the fortunes of that company (e.g., Ansett Airlines, Enron) and all the value of the portfolio could be lost if the company fails.
- asset classes such as equities, real estate and fixed income securities. Because each of these three asset classes is non-correlated (i.e., behaves independently), if one fails, then generally, it is unlikely that both the other two asset classes will do poorly.
- the composition of a portfolio includes both a diversified portion and a concentrated or 'standard' portion of financial assets.
- the level of diversification (and concomitant level of concentration) is preferably managed by the portfolio owner or their investment advisor to balance investor returns against investment risk.
- the desired degree of diversification and risk acceptable to the investor will be predetermined and the composition of the portfolio adjusted accordingly.
- a margin loan is a line of credit that uses a range of financial assets, such as shares and managed funds, as security for the underlying loan amount.
- Margin loans are frequently used by investors to improve or increase their portfolio.
- a borrower can leverage existing equity held in deposits, managed funds and/or securities (stocks) to take advantage of further investment opportunities as they arise. That is, by adding borrowed money to existing assets, the borrower increases the total amount of money that they can invest in their portfolio. This leveraging effect can be used to increase the value of an investment portfolio over time.
- a lending institution will typically lend up to a certain percentage of the market value of the securities held in the portfolio. This percentage is commonly referred to as a loan to value ratio or LVR.
- the loan to value ratio may vary between different classes of assets and/or between different individual security holdings in the same asset class.
- the present invention also provides a system for automatically optimising a security value of an investor investment portfolio financed using a margin lending facility, the investment portfolio including a plurality of security holdings at least some of which comprise a diversified portion of the portfolio, the system comprising,
- A determines a market value and composition of the portfolio based on a level of diversification in the portfolio, the composition of the portfolio including a diversified portion and a standard portion
- B applies a diversified LVR to the diversified portion of the portfolio and a standard LVR to the standard portion of the portfolio to calculate a maximum security value
- C compares the maximum security value calculated against a minimum security value required to secure the loan to determine whether the margin loan requires clearing.
- the user may be the investor or another party such as a financial adviser, banker, stock broker, or the provider of the margin loan.
- the user comprises two or more parties.
- the first and second databases may be one and the same, or linked.
- the first and second databases may reside on the same, or different servers.
- the present invention also provides a method for automatically optimising a security value of an investor investment portfolio financed using a margin lending facility, the investment portfolio including a plurality of security holdings at least some of which comprise a diversified portion of the portfolio, the method comprising,
- B communicating a maximum security value to the one or more remote user terminals, the maximum security value calculated based on application of a diversified LVR to the diversified portion of the portfolio and a standard LVR to the standard portion of the portfolio, and C communicating to the one or more remote user terminals advice as to whether the margin loan requires clearing, the advice being based on a comparison of the maximum security value calculated against a minimum security value required to secure the margin loan.
- the present invention also provides a system for automatically optimising a security value of an investor investment portfolio financed using a margin lending facility, the investment portfolio including a plurality of security holdings at least some of which comprise a diversified portion of the portfolio, the system including a processor configured for:
- the steps of the invention includes the initial steps of,
- the plurality of security holdings involves one or more investments chosen from the group comprising shares and managed funds.
- shares and managed funds form part of the diversified portion of the portfolio, whereas options (including the underlying shares with which they are associated) and cash form part of the standard part of the portfolio.
- options including the underlying shares with which they are associated
- cash form part of the standard part of the portfolio.
- the optimization is based on the level of diversification of the securities in the portfolio.
- the diversified LVR which is applied to the diversified portion of the portfolio is typically (but not always) higher than the standard LVR which is applied to the standard portion of the portfolio.
- the method of optimising the security value of investment portfolios relies on the lending institution using approved security listings of diversified and standard LVRs for a large number of securities to manage risk exposure.
- financial institutions create lists of hundreds of margin lending approved securities that are regularly updated and have the following general format:
- This diversified LVRs will typically be 5 to 20% higher than the standard LVRs.
- Higher LVRs can be offered economically by a lending institution because the diversification of the portfolio used to secure the loan helps to mitigate risk to the lending institution.
- the use of separate standard and diversified LVRs is advantageous to the borrower because provided that the borrower maintains diversification of the portfolio, the borrower can increase the leverage on investments when compared to the leverage that would be available if the lending institution did not take into account the level of diversification of the borrower's investment portfolio.
- An additional advantage is that the borrower has the option of maintaining their existing margin loan amount and using the diversified LVRs to increase the amount by which the market would need to fall before they receive a margin call.
- Maximum security value If the maximum security value calculated is greater than the minimum security value the difference in value may be used to leverage further margin loan funds. For example leverage could be obtained by increasing an existing variable loan or by instigating one or more new fixed loans.
- the determination of the market value and composition of the portfolio may include the following steps:
- MaxP single security may comprise and still be eligible for a diversified LVR
- the diversified LVR is applied to the maximum diversified value of each security holding. More preferably, the standard LVR is applied to the value of each single security holding in excess of the maximum diversified value for that security holding.
- the determination of the market value and composition of the portfolio includes:
- the plurality of security holdings includes one or more restricted securities.
- the term 'restricted security' refers to securities that, in the lender's opinion, have insufficient or limited liquidity in a market and may be difficult to sell except at a substantial discount. If an attempt is made to sell restricted security to clear a margin call, they may be difficult to sell, or the share sale price may be affected by the actual sale. This can happen for example, when the shares constitute a large proportion of a small value company. Accordingly the financial institutions may class certain securities as 'restricted security'.
- the method of the present invention will preferably further include the step of reducing the diversified portion of the restricted securities so that they comprise no more than a limited percentage of the diversified portfolio. This is referred to as 'restricted security limitation'.
- the person using the method and process of the present invention will be an investor, or person associated with the investor and their portfolio such as an investment advisor, stockbroker, accountant or a financial institution having an interest in the portfolio. This would include, for example, the lending institution providing the margin loan.
- the person can access data generated by the present invention through a wired or wireless communications network such as the Internet or Bluetooth.
- a wired or wireless communications network such as the Internet or Bluetooth.
- access would be subject to normal login security restrictions to prevent unauthorised access to information regarding the investor and their investor portfolio. This could be achieved for example, by use of any commonly available software authentication module.
- the steps of the present invention are automatically carried out in real-time.
- each investor's investment portfolio is automatically monitored in real-time to enable the lending institution to make available the maximum security value to the borrower, based on the level of diversification of the portfolio, whilst at the same time minimising the risk to the lending institution.
- One of the advantages of the present invention is that it enables a lending institution to offer higher security values and a significantly larger range of approved securities for assets that are held in a diversified portfolio.
- Monitoring the investment portfolio involves making a series of computations to determine the market value and composition of the portfolio, and the application of two separate LVRs to ensure that the maximum security value is made available to the borrower.
- the two LVRs applied are a diversified LVR, and a standard LVR. On completion of these computations, any additional security value available to the borrower is automatically applied to their investment portfolio.
- the present invention further provides a method for minimisation of the amount of security holdings that must be sold to clear the margin call.
- the method includes the step of selling individual security holdings that are higher than the maximum value for diversification down to the minimum value for diversification, starting with the lowest LVR security.
- the exception to this rule is when the security has a diversified LVR that is equal to the standard LVR. If the call for margin loan clearance has still not been cleared by selling all of the lowest LVR securities, the maximum LVR security remaining is sold in the same manner. These steps are repeated until such time that only 1/MaxP securities remain in the portfolio. Once only 1/MaxP securities remain in the portfolio, the (1/MaxP - 1) security is sold. Where the portfolio has (1/MaxP - 1) or less securities in the portfolio, the lowest LVR security is sold first.
- Figure 1 is a block diagram of the system of the present invention
- Figure 3 is a schematic depiction of preferred architecture of a system for performing the present invention
- Figure 4 is a flow diagram for a process of clearing a call for margin loan clearance according to the present invention by sale of portfolio assets
- Figure 5 is a diagrammatic depiction of warehousing of security flow.
- FIG. 1 is a block diagram of the system of the present invention.
- the system 100 includes an investor computer 102, an investment advisor computer 104 and server 106 which communicate with each other via a communications network 112, such as one or more wired or wireless networks (e.g. 802.1 lb/g, Bluetooth, the Internet).
- the investor computer 102 may be a processor incorporated into a mobile phone, a public kiosk computer terminal, or a standard computer (e.g. that provided by IBM Corporation ⁇ http://www.ibm.com>) running a standard operating system (such as Microsoft WindowsTM, Unix, Linux or Apple OS X).
- the server 106 is a standard web server providing access to a network service (e.g. an online email service) to authenticated users.
- a network service e.g. an online email service
- the investor computer 102 and investment advisor computer include communications modules 108 that (e.g. under the control of a user) generates request messages for sending to, and processes response messages received from, the authentication agent module 108 and the vendor server 106 via the network 112.
- the communications module 108 may be a web browser application running on the computer (e.g. Microsoft Internet ExplorerTM, Netscape Navigator, Mozilla Firefox or Apple Safari).
- Microsoft Internet ExplorerTM, Netscape Navigator, Mozilla Firefox or Apple Safari e.g. Microsoft Internet ExplorerTM, Netscape Navigator, Mozilla Firefox or Apple Safari.
- the system is more accessible to users by not requiring special software to be installed in order for authentication to occur (in contrast to existing single sign-on services).
- the request/response messages generated by the system 100 may be in the Hypertext Transfer Protocol (HTTP) or any other communications protocol, such as a schema-based or XML data communications protocol), and these messages may be encrypted using a Secure Sockets Layer (SSL), Transport Layer Security (TLS) or other encryption mechanism (preferably using at least 128-bit encryption).
- SSL Secure Sockets Layer
- TLS Transport Layer Security
- the server 104 is a standard web server including an authentication agent module 110 and a first and second database 114 and 114' .
- the module 110 and database 114 are stored in the memory of the authentication server 104.
- the memory includes one or more physical data storage media (e.g. a hard disk), random access memory (RAM) and/or read-only memory (ROM).
- the authentication server 104 sends and receives request/response messages via the network 112.
- the database 114 may include a relational database (such as MyS QL ⁇ h ⁇ t ⁇ .7/www.my sql. or g>), a symbol-delimited file and/or a hash table.
- the processes performed by the communications module 108 are preferably implemented in software and executed by the investor computer 102 or investment advisor computer 104 and the server 106 respectively. Those skilled in the art will appreciate that the processes performed by the modules 108 and 108' can be executed, at least in part, by dedicated hardware circuits, e.g. Application Specific Integrated Circuits (ASICs) or Field- Programmable Gate Arrays (FPGAs).
- ASICs Application Specific Integrated Circuits
- FPGAs Field- Programmable Gate Arrays
- An investor operates the investor computer 102 (or the investment advisor operates the investment advisor computer 104) to control the communications module 108 to send user login data to the server 106 for authenticating the user.
- An authentication agent module 110 processes the user login data and may automatic generation of a key identifier by a one-time password device (e.g. a RSA SecureID token, Vasco Digipass or ActivCard Token).
- the secondary identification data may include an identifier stored on a personal smart card, or one or more identifiers generated based on the user's bionietric attributes, e.g. by fingerprint readers or retinal scanners.
- the authentication agent module 110 may be configure to perform additional processing (e.g. to perform a Completely Automated Public Turing testing process to tell Computers and Humans Apart (CAPTCHA) that involves generating challenge and receiving a response to the challenge to determine whether the response is from a human) that enables the module 110 to distinguish between authentication requests from human users and other types of requests, such as those generated automatically by a computer posing as users (similar to a Denial of Service attack).
- This minimises the processing of illegitimate requests that block legitimate user requests to authenticate with the module 110.
- the user After the user (102 or 104) has been authenticated by the authentication agent module 110, the user is able to access a range of modules 111.
- These may include, for example, a module relating to their margin lending account and portfolio details.
- they can place trades via the Australian Stock Exchange, withdraw funds from their loan or model their position in a variety of simulated positions.
- the user is able to get a representation of the breakdown of their portfolio into its constituent parts, namely the diversified and standard portions including data setting out the percentage of each security in each portion and whether or not the security is restricted.
- the user is also able to see the current level of their loan balance in so far as it relates to their available security value, the funds they have available to trade with or withdraw, their current gearing ratio and credit limit as well as any personal information.
- an investment advisor may be authorised to access information in relation to the investor.
- the investment advisor may also be authorised to view more than one account (such as, for a number of different clients) .
- Figure 2 is a flow diagram depicting the steps in the system and method of the present invention for automatically optimising a security value of an investor investment portfolio financed using a margin lending facility.
- the process begins at 500, typically when an investment adviser, investor, banker or the like logs into the relevant communications system and typically goes through an authentication process in order to communicate 510 with the relevant server.
- the user then registers investor data in a first database held on the server 520, the data including investor name, address, and other identifiers.
- the user then registers investment portfolio data 530 in a second server database, including details of a plurality of security holdings.
- Server software then calculates 540 a market value for the portfolio and portfolio composition data based on a level of diversification in the portfolio.
- the software specifically divides the portfolio into a diversified portion data and standard portion data:
- the server From this the server generates 550 maximum security value data by application of a diversified LVR to the diversified portion data and a standard LVR to the standard portion data. This maximum security value data is then compared 560 to a predetermined minimum security value required to secure the margin loan. If the maximum security value is equal to or greater than the minimum security value 570, then the system continues to automatically recalculate the market value and composition data for the portfolio. If the minimum security value is greater than the maximum security value 580, then the system notifies the user that clearance of the margin loan is required.
- system depicted in Figure 1 operates at the server level under the architecture depicted in Figure 3.
- GUI Graphic User Interface
- the GUI layer is designed as the final output layer and is what the user actually sees on their computer screen. It contains internet based displays such as E*TRADE Australia and bank internet links. For example when the system of the present invention is provided by a bank, the displays include internal bank system and customer facing (statements) displays.
- the GUI layer enables posting of basic requests to the GUI Instruction / Data Output Integration Layer and receives back the required formatted data and displays it to the user.
- This layer is used to interpret information received from the GUI layer and convert it to data required for the data manipulation layer, and vice versa. It is an abstract layer which has no direct access into the databases and contains many rules and thus can be considered a Business Objects type layer. Data manipulation layer
- the data manipulation layer receives information from the GUI Instruction / Data Output Integration Layer in the format which it requires and pushes it to the data access layer. Once received back, it is this layer which then manipulates the data into a valid valuation based around diversification rules which can be used by the GUI Instruction / Data Output Integration Layer.
- the data access layer has been designed to access the stored information held in the database tables. It contains the Client Position engine which works out the client's loan positions and the Diversification Engine which computes the allocations of each security holding of the diversified or standard portions of the portfolio. This layer is the only part of the process which accesses the database table information.
- the architecture of the implementation is around a client-server database model.
- the GUI is held on the client side of the model and is generally a Windows or Unix based GUI. In some instances the GUI is in fact an output (eg paper statements).
- the GUI Instruction / Data Output Integration Layer sends and receives the data via a network interface with the GUI. This layer is stored on the server side of the network as a series of objects and packages. The data manipulation layer and the data access layer are also stored on the server side and communication between the packages (and therefore the layers) is via procedure calls to the objects and packages they represent.
- Figure 4
- Figure 4 is a flow diagram setting out a process for margin loan clearance according to the present invention by sale of portfolio assets.
- a put option is an option which gives a buyer the right, but not the obligation, to sell the underlying security at an agreed price at any time from the purchase of the put option until a predetermined expiry time. The buyer pays a premium for this right to the seller. If the buyer of the put option exercises their right to sell the security, the seller of the put option must purchase the security at the agreed price.
- a bid/ask spread is the difference between the price quoted for selling the security on the market (referred to as the 'ask') and the price quoted to buy the security on the market (the 'bid').
- the bid/ask spread is calculated as (ask - bid)/bid.
- Figure 4 depicts the following process steps for clearing a margin call:
- bid/ ask spread is less than 10% (ie sufficiently small to not affect price too adversely)
- bid/ ask spread of lowest ranked security covered by put options As before for securities with the same effective LVR, bid/ ask spread is to be the next attribute to rank on. 8. If bid/ ask spread is less than 10% (ie sufficiently small to not affect price too adversely), sell security covered by put options in parcels of lot size (ie for a put option with a lot size of 1,000, sell only in parcels of 1,000), sell least of: amount required for clearance of the margin loan and total market value (note that it may be required to exercise the put option to get the required market value) at a bid price up to 10% less than ask price following this rule. (Note that securities with put options are unlikely to have bid/ ask spread issues.)
- Figure 5 illustrates the warehousing of security flow, a feature that may be utilised when clearing a margin loan according to the process of the present invention.
- security has a bid/ ask spread of greater than 10%
- a sell order is to be placed on the security at 10% below ask price. This is repeated for all securities required to clear the margin loan (which at this stage may be all).
- the security is then monitored and the price reviewed hourly. An appointed committee is then responsible for deciding whether to sell at greater than 10% spread, or to stand in the market as is. Examples
- Example 1 sets out a simple portfolio value determination of the type that would be included in the steps of the present invention.
- the investor having the margin loan holds 5 securities and 1 managed fund.
- Example 2 illustrates the determination of a portfolio valuation in a portfolio that includes restricted securities.
- Restricted securities generally have low liquidity hence a borrower may struggle to sell restricted securities except at a substantial discount. Accordingly, if the investment portfolio includes restricted securities, further computations are required to ensure that the restricted securities do not comprise more than a limited percentage (MaxR) of the total value of the portfolio.
- the limited percentage (MaxR) is set at around 50% or lower in order to optimise flexibility for the borrower whilst reducing the risk to the lending institution.
- the diversified value of restricted securities is reduced.
- This reduction in the diversified value of the restricted securities (and hence the overall value of the diversified portion of the portfolio) can cause the value of a non-restricted security to breach the MaxP limit.
- the maximum diversified value of each non restricted security may need to be adjusted prior to this calculation.
- the borrower holds 5 securities (three of which are restricted securities) and 1 managed fund.
- the lending institution has set the limited percentage (MaxR) of the total value of the portfolio which may be comprised of restricted securities at no more than 50%.
- the restricted security calculation is performed on the diversified portfolio values (i.e. the steps detailed in Example 1 have already been performed such that no single security holding comprises more than MaxP - 25% of the portfolio).
- the securities include the following: Sl (ANZ securities) $20,000
- Example 3 sets out an example of a portfolio valuation as applied to a portfolio including options.
- the borrower holds 5 securities (one of which is partially covered by a margin loan clearance option, and two of which are restricted) and 1 managed fund.
- the maximum percentage (MaxP) for any security is set at 25%
- the max percentage for the sum of all restricted securities (MaxR) is set at 50%.
- the securities held are as follows:
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NZ570623A NZ570623A (en) | 2006-02-10 | 2007-02-09 | A method for optimising the security value of an investment portfolio |
AU2007214264A AU2007214264A1 (en) | 2006-02-10 | 2007-02-09 | A method for optimising the security value of an investment portfolio |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2006900663A AU2006900663A0 (en) | 2006-02-10 | A method for optimising the security value of an investment portfolio | |
AU2006900663 | 2006-02-10 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007090241A1 true WO2007090241A1 (en) | 2007-08-16 |
Family
ID=38344813
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2007/000140 WO2007090241A1 (en) | 2006-02-10 | 2007-02-09 | A method for optimising the security value of an investment portfolio |
Country Status (3)
Country | Link |
---|---|
AU (1) | AU2007214264A1 (en) |
NZ (1) | NZ570623A (en) |
WO (1) | WO2007090241A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5864828A (en) * | 1987-04-15 | 1999-01-26 | Proprietary Financial Products, Inc. | Personal financial management system for creation of a client portfolio of investment and credit facilities where funds are distributed based on a preferred allocation |
US6064985A (en) * | 1998-01-21 | 2000-05-16 | Assured Equities, Inc. | Automated portfolio management system with internet datafeed |
US20040064394A1 (en) * | 2002-08-20 | 2004-04-01 | Foliofn, Inc. | Method and apparatus for portfolio trading using margin |
WO2006031446A2 (en) * | 2004-09-10 | 2006-03-23 | Chicago Mercantile Exchange Inc. | System and method of margining fixed payoff products |
-
2007
- 2007-02-09 NZ NZ570623A patent/NZ570623A/en not_active IP Right Cessation
- 2007-02-09 AU AU2007214264A patent/AU2007214264A1/en not_active Abandoned
- 2007-02-09 WO PCT/AU2007/000140 patent/WO2007090241A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5864828A (en) * | 1987-04-15 | 1999-01-26 | Proprietary Financial Products, Inc. | Personal financial management system for creation of a client portfolio of investment and credit facilities where funds are distributed based on a preferred allocation |
US6064985A (en) * | 1998-01-21 | 2000-05-16 | Assured Equities, Inc. | Automated portfolio management system with internet datafeed |
US20040064394A1 (en) * | 2002-08-20 | 2004-04-01 | Foliofn, Inc. | Method and apparatus for portfolio trading using margin |
WO2006031446A2 (en) * | 2004-09-10 | 2006-03-23 | Chicago Mercantile Exchange Inc. | System and method of margining fixed payoff products |
Non-Patent Citations (1)
Title |
---|
FARRELL J.: "Portfolio Management Theory & Applications", vol. 2ND ED., 1997, MCGRAW-HILL, pages: 37 - 41 * |
Also Published As
Publication number | Publication date |
---|---|
AU2007214264A1 (en) | 2007-08-16 |
NZ570623A (en) | 2011-12-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10127610B1 (en) | Risk-based reference pool capital reducing systems and methods | |
US7340430B2 (en) | Real-time trading system | |
US8165952B2 (en) | Electronic trading system | |
US7299208B1 (en) | Apparatus and system for defining an automated spread trading parameter | |
US20060143099A1 (en) | System, method, and computer program for creating and valuing financial insturments linked to average credit spreads | |
US20140019326A1 (en) | Online trading system having real-time account opening | |
US20090192832A1 (en) | Method of enhancing value of pension system assets | |
US20140172679A1 (en) | Systems And Methods Of An Online Secured Loan Manager | |
US8595116B1 (en) | System and method for setting up and managing retirement accounts of ETFs and index mutual funds | |
WO2005019995A2 (en) | On-demand defined securitization methods and systems related applications | |
JP2020532032A (en) | Methods and equipment for value transfer | |
GB2559165A (en) | Blockchain zero checksum trading system | |
US20210224759A1 (en) | Method and System for Implementing a Currency Guaranteed By An Investment Vehicle | |
JP2021501431A (en) | Systems and methods for a global peer-to-peer retirement savings system | |
US20060293992A1 (en) | Life settlement contract based investment methods, systems, and products | |
WO2014098796A1 (en) | Systems and methods of an online secured loan manager | |
Benzennou et al. | Are single stock futures used as an alternative during a short‐selling ban? | |
US7983981B1 (en) | Exchange traded funds and mutual funds providing cash flow distributions | |
Livingston et al. | Credit ratings and rating agencies | |
Chen et al. | Coins with benefits: On existence, pricing kernel and risk premium of cryptocurrencies | |
US20090070239A1 (en) | Open platform for unregistered securities (opus) | |
WO2007090241A1 (en) | A method for optimising the security value of an investment portfolio | |
AU2014277864A1 (en) | A method for optimising the security value of an investment portfolio | |
AU2012216269A1 (en) | A method for optimising the security value of an investment portfolio | |
US20240020769A1 (en) | Processing data for administering stable value products with pooling and capping of risk features utilizing computer-implemented methods and computer systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
DPE2 | Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2007214264 Country of ref document: AU |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2007214264 Country of ref document: AU Date of ref document: 20070209 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2007214264 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 570623 Country of ref document: NZ |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07701471 Country of ref document: EP Kind code of ref document: A1 |