COMPUTERIZED SYSTEM AND METHOD OF NAVIGATING DATA WITH TREE STRUCTURE VISUALIZATION USING SEGMENTED ACCESS RIGHTS
A computer system and method is disclosed for financial management and estate planning. The system provides data aggregation for both financial and non-financial assets to create a “virtual vault” from which the owner can view all information about his/her portfolio. In some embodiments, the system provides a tree visualization of the portfolio, which allows a structured organization that provides both a high level view and the ability to drill down to an in-depth analysis. In some cases, the system provides segmented permissions in which restricted access could be granted based on module and/or asset in the tree visualization.
This application claims the benefit of U.S. Provisional Application Ser. No. 62/121,797 filed Feb. 27, 2015, which is hereby incorporated by reference in its entirety.
TECHNICAL FIELDThis disclosure relates generally to computer systems and methods for financial and estate planning; in particular, this disclosure relates to a computerized system and method in which financial data can be visualized with a tree structure. In some embodiments, access rights to the tree structure can be restricted by node and/or module.
BACKGROUND AND SUMMARYWith high wealth individuals, there is a risk of legacy failure in which it can be difficult to put personal affairs in order and obtain a successful succession. One problem can be information regarding financial and non-financial assets being in disparate locations and subject to potentially different managers. This causes difficulties in complete and transparent visibility of wealth and potentially delays information needed to make informed decisions. Moreover, the number of people involved to manage assets can reduce the desired level of confidentiality.
This disclosure relates to a computer system and method for financial management and estate planning. In some embodiments, the system provides data aggregation for all assets worldwide, regardless of currency and financial institution or type of asset. This provides a centralized location or “virtual vault” from which the owner can view all information about his/her portfolio. In some embodiments, the system provides a tree visualization of the portfolio, which allows a structured organization that provides both a high level view and the ability to drill down to an in-depth analysis. In some cases, the system provides segmented permissions in which restricted access could be granted based on module and/or asset in the tree visualization. This allows the owner to see the entire financial picture while allowing other users to only see the part of wealth to which they have been delegated management responsibility.
According to one aspect, this disclosure provides a storage device coupled to at least one processor. The storage device stores financial portfolio data representing financial and non-financial assets of an owner, node structure data representing a relationship of the assets in a hierarchical tree structure, and a program for controlling the at least one processor. The processor(s) are operative with the program to obtain the financial portfolio data and node structure data. The processor generates a visual representation of the financial portfolio data in a hierarchical tree arrangement based on the node structure data. The hierarchical tree arrangement comprises a plurality of nodes including a root node and a plurality of descendant nodes of the root node in which the root node represents substantially the entire portfolio of the owner as identified in the financial portfolio data and the plurality of descendant nodes represent respective portions of the portfolio. The plurality of descendant nodes typically represent a plurality of asset types, including both financial and non-financial assets.
In some cases, the plurality of asset types represented by the descendant nodes include one or more of an investment structure, financial asset, alternative investment, collection, insurance, memberships, motor vehicle, or real estate in which the owner has a full or partial ownership interest. For example, a descendant node representing an investment structure could identify a personal investment, trust investment, or corporate investment in which the owner has a full or partial ownership interest. By way of another example, a descendant node representing a financial asset could identify one or more of a bank account, a loan receivable or a loan payable in which the owner has a full or partial ownership interest. In some cases, a descendant node representing an alternative investment could identify one or more of a capital participation investment, private equity investment, a venture capital investment, or a private funds investment in which the owner has a full or partial ownership interest. Depending on the circumstances, a descendant node representing a collection could identify one or more of an antique, jewelry, photography, watch, book, painting, sculpture, or wine in which the owner has a full or partial ownership interest. In some embodiments, a descendant node representing insurance could identify one or more of a life insurance policy or an insurance policy concerning an investment in which the owner has a full or partial ownership interest. Embodiments are contemplated in which a descendant node representing motor vehicles could identify one or more of an airplane, helicopter, watercraft, automobile, motorcycle, or yacht in which the owner has a full or partial ownership interest. In some cases, a descendant node representing real estate could identify one or more of commercial real estate, industrial real estate, land or residential real estate in which the owner has a full or partial ownership interest.
This disclosure includes embodiments in which responsive to selection of a node, the processor(s) expand the selected node to identify one or more descendant nodes of the selected node. In some cases, the renewed selection of the node, collapses the selected node to hide one or more descendant nodes of the selected node.
In some embodiments, a variety of flags could be associated with nodes. For example, the processor could generate a count flag associated with one or more nodes that identifies an aggregate count of descendant nodes for each respective node. In some embodiments, the processor(s) could be configured to generate a value flag associated with one or more nodes that identifies an aggregate monetary value of descendant nodes for each respective node.
A user can modify the portfolio of the owner. For example, a user interface could be provided from which additional nodes representing a portion of the financial portfolio of the owner can be added. In some embodiments, the user interface includes an area with a plurality of node types representing a plurality of asset types is presented for insertion into the hierarchical tree arrangement. For example, a new node could be added to the hierarchical tree arrangement by moving a node from the area with node types onto an existing node in the hierarchical tree arrangement. When this happens, in some embodiments, the relationship of the new node is assigned as a child of the existing node and this relationship between the new node and the existing node is stored in the node structure data. When a new node is added, the user could be prompted for input of data regarding the new node and store this data in the financial portfolio data. For example, the user could be prompted to uploading of one or more documents regarding the new node and store these one or more documents in the financial portfolio data.
In some embodiments, the portfolio of the user can be searched. For example, the processor(s) could generate a visual representation of the financial portfolio data that includes the search query in a hierarchical tree arrangement based on the node structure data in which only nodes associated with the search query are identified. In this manner, only nodes responsive to the search are displayed for the user.
Depending on the circumstances, user access rights can be provided for restricting access to the portfolio of the owner. For example, the storage device could include user access rights data and the processor(s) could be configured to hide one or more nodes of the hierarchical tree arrangement based on the access rights data. This allows the user to provided segmented access for delegating management of portions of the assets.
According to another aspect, this disclosure provides a computer-implemented method. Financial portfolio data is stored that represents financial and non-financial assets of an owner. Node structure data representing a relationship of the assets in a hierarchical tree structure is also stored. The computer generates a visual representation of the financial portfolio data in a hierarchical tree arrangement based on the node structure data. The hierarchical tree arrangement comprises a plurality of nodes including a root node and a plurality of descendent nodes of the root node. The root node represents substantially the entire portfolio of the owner based on the financial portfolio data and the one or descendent nodes represent respective portions of the portfolio.
According to yet another aspect, this disclosure provides a tangible, non-transitory computer readable medium storing instructions that, when executed by at least one processor, causes the at least one processor to perform a method. Financial portfolio data is stored that represents financial and non-financial assets of an owner. Node structure data representing a relationship of the assets in a hierarchical tree structure is also stored. The computer generates a visual representation of the financial portfolio data in a hierarchical tree arrangement based on the node structure data. The hierarchical tree arrangement comprises a plurality of nodes including a root node and a plurality of descendent nodes of the root node. The root node represents substantially the entire portfolio of the owner based on the financial portfolio data and the one or descendent nodes represent respective portions of the portfolio.
Additional features and advantages of the invention will become apparent to those skilled in the art upon consideration of the following detailed description of the illustrated embodiment exemplifying the best mode of carrying out the invention as presently perceived. It is intended that all such additional features and advantages be included within this description and be within the scope of the invention.
The present disclosure will be described hereafter with reference to the attached drawings which are given as non-limiting examples only, in which:
Corresponding reference characters indicate corresponding parts throughout the several views. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principals of the invention. The exemplification set out herein illustrates embodiments of the invention, and such exemplification is not to be construed as limiting the scope of the invention in any manner.
DETAILED DESCRIPTION OF THE DRAWINGSWhile the concepts of the present disclosure are susceptible to various modifications and alternative forms, specific exemplary embodiments thereof have been shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that there is no intent to limit the concepts of the present disclosure to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the disclosure.
This disclosure relates generally to a computerized system and method for managing financial portfolios, including both financial and non-financial assets, and estate planning. With regard to financial management, the system provides a “virtual vault” in which financial data can be stored in a structured manner that is organized so the owner can view his/her finances with little effort and provides safeguards to protect the owner from those managing his/her finances. The system can also be used for estate planning purposes by organizing information about the assets in a centralized location. In some embodiments, the system provides a visual view of the financial portfolio that presents information in a tree structure from which a high level view of finances can be determined. In such a view, various financial structures and assets appear as nodes in the tree structure that can be collapsed and expanded. Typically, the nodes are associated with structured data that provides detailed information about the node, including in some cases electronic documents, photographs, and other data about the node.
The detailed description which follows is presented in part in terms of algorithms and symbolic representations of operations on data bits within a computer memory representing alphanumeric characters or other information. An algorithm is here and is generally conceived to be a self-consistent sequence of steps leading to a desired result. These steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic pulses or signals capable of being stored, transferred, transformed, combined, compared, and otherwise manipulated. It proves convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, symbols, characters, display data, terms, numbers, or the like as a reference to the physical items or manifestations in which such signals are embodied or expressed. It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely used here as convenient labels applied to these quantities.
Some algorithms may use data structures for both inputting information and producing the desired result. Data structures greatly facilitate data management by data processing systems, and are not accessible except through sophisticated software systems. Data structures are not the information content of a memory, rather they represent specific electronic structural elements which impart or manifest a physical organization on the information stored in memory. More than mere abstraction, the data structures are specific electrical or magnetic structural elements in memory which simultaneously represent complex data accurately, often data modeling physical characteristics of related items, and provide increased efficiency in computer operation.
Further, the manipulations performed are often referred to in terms, such as comparing or adding, commonly associated with mental operations performed by a human operator. No such capability of a human operator is necessary, or desirable in most cases, in any of the operations described herein which form part of the present invention; the operations are machine operations. Useful machines for performing the operations of the present invention include general purpose digital computers or other similar devices. In all cases the distinction between the method operations in operating a computer and the method of computation itself should be recognized. A method and apparatus are disclosed for operating a computer in processing electrical or other (e.g., mechanical, chemical) physical signals to generate other desired physical manifestations or signals. The computer operates on software modules, which are collections of signals stored on a media that represents a series of machine instructions that enable the computer processor to perform the machine instructions that implement the algorithmic steps. Such machine instructions may be the actual computer code the processor interprets to implement the instructions, or alternatively may be a higher level coding of the instructions that is interpreted to obtain the actual computer code. The software module may also include a hardware component, wherein some aspects of the algorithm are performed by the circuitry itself, rather as a result of an instruction.
An apparatus is disclosed for performing these operations. This apparatus may be specifically constructed for the required purposes, or it may comprise a general purpose computer as selectively activated or reconfigured by a computer program stored in the computer. The algorithms presented herein are not inherently related to any particular computer or other apparatus unless explicitly indicated as requiring particular hardware. In some cases, the computer programs may communicate or relate to other programs or equipment through signals configured to particular protocols which may or may not require specific hardware or programming to interact. In particular, various general purpose machines may be used with programs written in accordance with the teachings herein, or it may prove more convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these machines will appear from the description below.
In the following description several terms which are used frequently have specialized meanings in the present context. The term “network” means two or more computers which are connected in such a manner that messages may be transmitted between the computers. In such computer networks, typically one or more computers operate as a “server,” a computer with large storage devices such as hard disk drives and communication hardware to operate peripheral devices such as printers or modems. The term “browser” refers to a program which is not necessarily apparent to the user, but which is responsible for transmitting messages between the user's computer and the network server and for displaying and interacting with network resources.
Browsers are designed to utilize a communications protocol for transmission of text and graphic information over a worldwide network of computers, namely the “World Wide Web” or simply the “Web.” Examples of browsers compatible with the present invention include the Internet Explorer browser program offered by Microsoft Corporation (Internet Explorer is a trademark of Microsoft Corporation), the Chrome browser program offered by Google Inc. (Chrome is a trademark of Google Inc.), the Safari browser program offered by Apple Inc. (Safari is a trademark of Apple Inc.) or the Firefox browser program distributed by the Mozilla Foundation (Firefox is a registered trademark of the Mozilla Foundation). The browser could operate on a desktop operating system, such as Windows by Microsoft Corporation (Windows is a trademark of Microsoft Corporation) or OS X by Apple Inc. (OS X is a trademark of Apple Inc.). In some cases, the browser could operate on mobile operating systems, such as iOS by Apple Inc. (iOS is a trademark of Apple Inc.) or Android by Google Inc. (Android is a trademark of Google Inc.). Browsers display information which is formatted in a Standard Generalized Markup Language (“SGML”) or a Hyper Text Markup Language (“HTML”), both being scripting languages which embed non-visual codes in a text document through the use of special ASCII text codes. Files in these formats may be easily transmitted across computer networks, including global information networks like the Internet, and allow the Browsers to display text, images, and play audio and video recordings.
In the example computing environment 100 shown in
The example in
As shown, the family office software 108 has access to node structure data 116. As discussed below, the node structure data 116 allows the family office software 108 to generate a tree visualization of financial information. This visualization allows an organized view of the portfolio that is intuitive and provides high level information in which users can drill down to obtain additional information.
Referring again to
In the example shown, the family office software 108 includes a real time monitor 208, consolidated portfolio analysis 210, order management system 212, cost structure analysis 214, global wealth map 216, automated reconciliation system 218, client registration system 220, cash order management 222, legacy distribution manager 224, activation notifications center 226, and settings 228. An example user interface from which a user can access these various modules is shown in
The real time monitor 208 allows the owner to view transactions occurring in one or more of his/her accounts in approximately real time. This can be done, for example, by downloading financial data from one or more of the accounts 110 via a network 106.
The consolidated portfolio analysis 210 allows the user to perform analysis on the financial portfolio of the owner.
The order management system 212 allows the user to manage orders regarding various assets. The cost structure analysis 214 allows the user to perform an analysis regarding the cost of various assets of the owner.
The global wealth map 216 provides a tree structure visualization of the various financial structures and assets of the owner.
Referring to
Referring again to
Referring again to
Referring back to
Referring to
Referring again to
The client registration system 220 allows the user to set up the tree structure of the portfolio and populate information about the nodes in the portfolio.
Referring again to
The legacy distribution manager 224 allows the user to distribute funds as needed.
The activation notification center 226 allows the owner to receive notifications based on certain triggering events. For example, if an amount of money withdrawn from an account exceeds a predetermined amount, the activation notification center 226 may send a notification, such as a text or email, to the owner (and/or delegated person). This allows the owner to remain aware of activities in the portfolio that may be outside of the desired scope.
The settings module 228 allows a user to, among other things, select the modules and nodes in the tree structure to which users have access. This allows the owner to segment access rights so various persons involved in the management of his/her assets only see a piece of the portfolio for which he/she manages. The advantage is that the owner has access to the entire portfolio without being dependent on various managers to provide information.
Although the present disclosure has been described with reference to particular means, materials, and embodiments, from the foregoing description, one skilled in the art can easily ascertain the essential characteristics of the invention and various changes and modifications may be made to adapt the various uses and characteristics without departing from the spirit and scope of the invention.
Claims
1. An apparatus comprising:
- a storage device; and
- at least one processor coupled to the storage device, wherein the storage device stores financial portfolio data representing financial and non-financial assets of an owner, node structure data representing a relationship of the assets in a hierarchical tree structure, user access rights data representing a portion of the financial portfolio data to which respective users have access, and a program for controlling the at least one processor, and wherein the at least one processor, being operative with the program, is configured to: display a visual representation of the financial portfolio data in a hierarchical tree arrangement based on the node structure data within a graphical user interface on a computer screen, wherein the hierarchical tree arrangement comprises a plurality of nodes including a root node and a plurality of descendant nodes of the root node, wherein the root node represents substantially the entire portfolio of the owner as identified in the financial portfolio data and the plurality of descendant nodes represent respective portions of the portfolio;
- monitor for selection of a node of the plurality of nodes;
- in response to selection of a node, automatically determine which of the descendant nodes of the selected node to hide based on the user access rights data associated with a current user; and
- automatically expand the selected node to: (1) identify on the graphical user interface one or more descendant nodes of the selected node to which the current user has access based on the user access rights data and those nodes to which the current user has access, generate a value flag associated with those nodes that identifies an aggregate monetary value of descendant nodes for each respective node, and (2) hide on the graphical user interface one or more of the descendant nodes of the selected node based on the user access rights data so that the visual representation of the financial portfolio data hides any nodes to which the current user does not have access.
2. The apparatus of claim 1, wherein the plurality of descendant nodes represent a plurality of asset types, including both financial and non-financial assets.
3. The apparatus of claim 2, wherein the plurality of asset types represented by the descendant nodes include one or more of an investment structure, financial asset, alternative investment, collection, insurance, memberships, motor vehicle, or real estate in which the owner has a full or partial ownership interest.
4. The apparatus of claim 3, wherein a descendant node representing an investment structure identifies a personal investment, trust investment, or corporate investment in which the owner has a full or partial ownership interest.
5. The apparatus of claim 3, wherein a descendant node representing a financial asset identifies one or more of a bank account, a loan receivable or a loan payable in which the owner has a full or partial ownership interest.
6. The apparatus of claim 3, wherein a descendant node representing an alternative investment identifies one or more of a capital participation investment, private equity investment, a venture capital investment, or a private funds investment in which the owner has a full or partial ownership interest.
7. The apparatus of claim 3, wherein a descendant node representing a collection identifies one or more of an antique, jewelry, photography, watch, book, painting, sculpture, or wine in which the owner has a full or partial ownership interest.
8. The apparatus of claim 3, wherein a descendant node representing insurance identifies one or more of a life insurance policy or an insurance policy concerning an investment in which the owner has a full or partial ownership interest.
9. The apparatus of claim 3, wherein the descendant node representing motor vehicles identifies one or more of an airplane, helicopter, watercraft, automobile, motorcycle, or yacht in which the owner has a full or partial ownership interest.
10. The apparatus of claim 3, wherein a descendant node representing real estate identifies one or more of commercial real estate, industrial real estate, land or residential real estate in which the owner has a full or partial ownership interest.
11. (canceled)
12. The apparatus of claim 1, wherein, responsive to renewed selection of the selected node, the at least one processor is configured to collapse the selected node to hide one or more descendant nodes of the selected node.
13. The apparatus of claim 1, wherein the at least one processor is configured to generate a count flag associated with one or more nodes that identifies an aggregate count of descendant nodes for each respective node.
14. (canceled)
15. The apparatus of claim 1, wherein the at least one processor is configured to generate a user interface from which additional nodes representing a portion of the financial portfolio of the owner can be added.
16. The apparatus of claim 15, wherein the user interface includes an area with a plurality of node types representing a plurality of asset types for insertion into the hierarchical tree arrangement.
17. The apparatus of claim 16, wherein the at least one processor is configured to add a new node to the hierarchical tree arrangement based on moving a node from the area with node types onto an existing node in the hierarchical tree arrangement.
18. The apparatus of claim 17, wherein the at least one processor is configured to assign the new node as a child of the existing node and store this relationship between the new node and the existing node in the node structure data.
19. The apparatus of claim 18, wherein the at least one processor is configured to prompt for input of data regarding the new node and store this data in the financial portfolio data.
20. The apparatus of claim 19, wherein the at least one processor is configured to prompt for uploading of one or more documents regarding the new node and store these one or more documents in the financial portfolio data.
21. The apparatus of claim 1, wherein the at least one processor is configured to prompt for a search query, search the financial portfolio data for the search query and generate a visual representation of the financial portfolio data that includes the search query in a hierarchical tree arrangement based on the node structure data in which only nodes associated with the search query are identified.
22. The apparatus of claim 1, wherein, responsive to selection of a node, the at least one processor is configured to provide additional information concerning the selected node, including one or more of textual information, graphic information, or documents regarding the asset represented by the selected node.
23. (canceled)
24. A computer-implemented method for dynamically hiding restricted data in a hierarchical tree structure displayed in a graphical user interface, comprising:
- storing financial portfolio data representing financial and non-financial assets of an owner;
- storing node structure data representing a relationship of the assets in a hierarchical tree structure;
- storing user access rights data representing a portion of the financial portfolio data to which respective users have access;
- displaying a visual representation of the financial portfolio data in a hierarchical tree arrangement based on the node structure data within a graphical user interface on a computer screen, wherein the hierarchical tree arrangement comprises a plurality of nodes including a root node and a plurality of descendent nodes of the root node, wherein the root node represents substantially the entire portfolio of the owner based on the financial portfolio data and the one or descendent nodes represent respective portions of the portfolio;
- monitoring for selection of a node of the plurality of nodes;
- in response to selection of a node, automatically determining, by a processor, which of the descendant nodes of the selected node to hide based on the user access rights data associated with a current user; and
- automatically expanding the selected node, by the processor, to: (1) identify on the graphical user interface one or more descendant nodes of the selected node to which the current user has access based on the user access rights data, and (2) hide on the graphical user interface one or more of the descendant nodes of the selected node based on the user access rights data so that the visual representation of the financial portfolio data hides any nodes to which the current user does not have access.
25. (canceled)
26. The method of claim 24, further comprising collapsing the selected node to hide one or more descendant nodes of the selected node upon renewed selection of the selected node.
27. The method of claim 24, further comprising generating a count flag that identifies an aggregate count of descendant nodes of one or more nodes.
28. The method of claim 24, further comprising generating a value flag that identifies an aggregate monetary value of descendant nodes of one or more nodes.
29. The method of claim 24, further comprising adding a new node by moving a new node onto an existing node in the hierarchical tree arrangement, wherein the new node is assigned as a child node of the existing node.
30. A tangible, non-transitory computer readable medium storing instructions that, when executed by at least one processor, causes the at least one processor to perform a method comprising:
- storing financial portfolio data representing financial and non-financial assets of an owner;
- storing node structure data representing a relationship of the assets in a hierarchical tree structure;
- storing user access rights data representing a portion of the financial portfolio data to which respective users have access;
- displaying a visual representation of the financial portfolio data in a hierarchical tree arrangement based on the node structure data within a graphical user interface on a computer screen, wherein the hierarchical tree arrangement comprises a plurality of nodes including a root node and a plurality of descendent nodes of the root node, wherein the root node represents substantially the entire portfolio of the owner based on the financial portfolio data and the plurality of descendent nodes represent respective portions of the portfolio;
- monitoring for selection of a node of the plurality of nodes;
- in response to selection of a node, automatically determining, by a processor, which of the descendant nodes of the selected node to hide based on the user access rights data associated with a current user; and
- automatically expanding the selected node, by the processor, to: (1) identify on the graphical user interface one or more descendant nodes of the selected node to which the current user has access based on the user access rights data, and (2) hide on the graphical user interface one or more of the descendant nodes of the selected node based on the user access rights data so that the visual representation of the financial portfolio data hides any nodes to which the current user does not have access.
Type: Application
Filed: Apr 30, 2015
Publication Date: Sep 1, 2016
Inventors: Domingo Viesca Decanini (Nuevo Leon), Javier Manuel Gutierrez Rodriguez (Nuevo Leon)
Application Number: 14/700,367