Test strategy system and method for accounts held direct at-fund

ABSTRACT

The present invention provides a system and method for a user to test and transfer data from a client&#39;s database or network to a host&#39;s database or network. In accordance with an exemplary embodiment of the present invention, a user acquires data information from a client. The user uses this information to generate a spreadsheet, and to populate the spreadsheet with assumed values based on the information received from the client. The spreadsheet is configured in a fashion such that it is consistent with the host&#39;s database or network. The user requests and receives a test file from the client and uses a developed algorithm, generally in the form of a computer program, to reformat the file so that it is consistent with the host&#39;s database configuration. The user determines the consistency between the reformatted file and the host&#39;s database by comparing the reformatted file to the previously generated spreadsheet. Any inconsistencies identified alert the user that the file reformatting algorithm needs updating. When all the updates are complete and the reformatting algorithm has been deemed appropriate to carry out the data transformation function, the entire client database log is sent to the user in the form of an input file. The input file is duplicated to protect the original information and then reformatted using the updated algorithm. The reformatted file may then be uploaded to the host&#39;s network or database so that the information contained may be used by others who access the database or network for information.

CROSS REFERENCE TO RELATED APPLICATIONS

This application claims priority to, and the benefit of, U.S.Provisional patent application entitled “Test Strategy System andMethod” filed on Oct. 21, 2003 and assigned U.S. Ser. No. 60/513,300,the entire contents of which are hereby incorporated by reference.

FIELD OF INVENTION

This application generally relates to data testing and transferring, andmore particularly, to a system and method to, test, verify, reformat,and transfer acquired data for compliance on a host database or networksystem.

BACKGROUND OF THE INVENTION

In today's market, the operations of companies move at a much fasterpace than in the past due to increasing technological advances,specifically in the field of information exchange and data management.It is common practice for companies to establish relationships with eachother and engage in a manner that incorporates the cooperative use ofdata. In furthering the relationship between companies and theirrespective interests, it is often necessary to transfer information anddata from one company to another. In many instances the data existing ona database or network of one company may not conform in structure orformat with the database or network of the other company. As such, it isoften the unenviable task of an internal Information Technology (IT)Department to transform acquired data such that the data can exist onits database or network in a manner consistent with the already existingdata.

Furthermore, lack of a structured, consistent approach for transformingdata often creates risk of implementation errors and delays in projectdelivery due to unexpected results during a test phase. For example,computer code is usually developed by a company to provide instructionson how to transform data to comport with the receiving company'sdatabase or network. However, errors in code design or execution cansignificantly delay the use of the transferred data because, forexample, the error must be corrected and the entire transformation ofthe data re-executed.

In an effort to minimize problematic transfer of the desired data, acompany can mitigate significant administrative costs by first workingwith smaller, transferred test files. These test files are typicallycomprised of test data as a limited precursor for the entire databaselog. This limited data is then manipulated and tested to confirm theadequacy of the algorithms used to transform the data to the format ofthe receiving company's database.

In this sense, the company can utilize their resources and control costsin a more efficient manner.

In the past, a company may receive a test file when it wished toimplement a new or modified business relationship with another company.But notably, a typical company's internal systems do not typicallyfollow a structured or consistent testing effort with other companies.One reason for the lack of structured testing is that it usuallyincluded significant, time consuming, and often superfluous coordinationwith companies selected for certain projects. In an effort to alleviatethis excessive coordination, a structured, consistent, repetitive methodis needed to preemptively identify the desired data information, devisea process to transform the data, and test this transforming process ontest data received from an outside company. In this fashion, errors inthe transformation can be readily identified and corrected before theentire data log is transformed. As such, the costly process of trial anderror of numerous computer code corrections, which is commonly used forthe data transformation process and manipulation of the large, acquireddatabases, can be minimized or eliminated.

SUMMARY OF THE INVENTION

The present invention provides a system and method for the testing andtransfer of data from a client to a host. In one aspect of the presentinvention, data testing and transfer is accomplished by identifying thespecific data to be acquired from a client's database or network anddetermining the desired format of the data for the host's database ornetwork. The format and values of the client's data is assumed andentered onto a spreadsheet. The spreadsheet includes specific,predetermined headings to exist for the data fields and then assumed,fictitious, client data is entered into the data fields, based on thehost's data format requirements. The spreadsheet is forwarded to theclient for feedback on the entered data field headings, format of thefictitious assumed data values, and overall organization of thespreadsheet.

In order for the client's data to exist on the host's network in acompatible format, an algorithm is developed by the host to reformat theclient's data. The host receives a test file and reformats this testfile utilizing the developed algorithm. The reformatted test file isthen compared to the created spreadsheet, and the system notesinconsistencies between the file and spreadsheet. If any changes arenecessary, the algorithm is subsequently updated to format the data inthe desired manner, namely consistent with the format of thespreadsheet. After the system verifies the data and reformatting, theentire client database file can be routed to the host, duplicated toprotect the original file information, reformatted using the updatedalgorithm, and uploaded to the host's database or network.

BRIEF DESCRIPTION OF THE DRAWINGS

A more complete understanding of the present invention may be derived byreferring to the detailed description and claims when considered inconnection with the figures, where like reference numbers refer tosimilar elements throughout the figures, and:

FIG. 1 depicts a block diagram illustrating an exemplary system of thepresent invention;

FIG. 2 depicts a flowchart illustrating an exemplary method inaccordance with the present invention;

FIG. 3 depicts a flowchart further illustrating an exemplary method,from FIG. 2, to identify data fields from a clearinghouse for a hostdatabase layout.

FIGS. 4( a) and 4(b) depict flowcharts further illustrating an exemplarymethod, from FIG. 2, of how test files may be received from the client.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

The detailed description of exemplary embodiments of the inventionherein makes reference to the accompanying Figures, which depict theexemplary embodiment by way of illustration and its best mode. Whilethese exemplary embodiments are described in sufficient detail to enablethose skilled in the art to practice the invention, it should beunderstood that other embodiments may be realized and that logical andmechanical changes may be made without departing from the spirit andscope of the invention. Thus, the detailed description herein ispresented for purposes of illustration only and not of limitation. Forexample, the steps recited in any of the method or process descriptionsmay be executed in any order and are not limited to the order presentedand/or other steps may be omitted altogether while still attaining thesame or a similar result.

Moreover, it should be appreciated that the particular implementationsdepicted and described herein are illustrative of the invention and itsbest mode and are not intended to otherwise limit the scope of thepresent invention in any way. Indeed, for the sake of brevity, certainsub-components of the individual operating components, conventional datanetworking, application development and other functional aspects of thesystems may not be described in detail herein. Furthermore, theconnecting lines depicted in the various figures contained herein areintended to represent exemplary functional relationships and/or physicalcouplings between the various elements. It should be noted that manyalternative or additional functional relationships or physicalconnections may be present in a practical system.

In general, the present invention facilitates the creation of testconditions and criteria for test data, in order to establish substantialsynchronicity across multiple systems. In an exemplary embodiment, thepresent invention includes process delivered test files that prove ordisprove assumptions made in creating formatting specifications for asystem. The test files also facilitate documentation of expected resultsto improve testing efficiency and quality across the multiple systemsinvolved in a test effort. While the present invention may be describedherein with respect to industries that have a relationship with variousFund Families and clearinghouses, the system and method of the presentinvention may be implemented in any industry that may benefit fromstructured testing across multiple systems.

The invention also improves the quality of a testing effort such thatthe effort is more likely to lead to the delivery of the test phase ontime and within budget. The invention also helps to reduceimplementation risk by establishing expected test results to facilitateresearch and test validation. The invention also reduces the test phaseby reducing or eliminating the unstructured testing which typicallyrequires longer periods to research issues.

As will be appreciated by one of ordinary skill in the art, the presentinvention may be embodied as a method, a data processing system, adevice for data processing, and/or a computer program product.Accordingly, the present invention may take the form of an entirelysoftware embodiment, an entirely hardware embodiment, or an embodimentcombining aspects of both software and hardware. Furthermore, thepresent invention may take the form of a computer program product on acomputer-readable storage medium having computer-readable program codemeans embodied in the storage medium. Any suitable computer-readablestorage medium may be utilized, including hard disks, CD-ROM, opticalstorage devices, magnetic storage devices, and/or the like.

With respect to the system components, in an exemplary embodiment of theinvention and with reference to FIG. 1, the system may include one ormore advisors 350.

The advisors may be the end users of the present invention and theadvisors may include any person, entity, business, hardware and/orsoftware suitably configured to offer financial planning advice.Advisors 350 may be organized into a coordinated set of personaladvisors 300 herein referred to as “FA” (financial advisors). The FA mayinteract with general public consumers to offer financial planningadvice which may include, for example, a “529 Plan” option. A “529 Plan”is a government sanctioned, financial plan more commonly referred to asa college educational savings plan which allows for money in the accountto obtain interest, free of federal taxes.

Referring to FIG. 1, a user 50 may act on behalf of a host and may beemployed or contracted to implement the present invention for thebenefit of a host. The user may be an individual, group, employee,contractor, software and/or hardware configured to execute the followingsteps or achieve the desired outcome as described by the presentinvention. The user works in coordination with the FA to carry out theobjective of the present invention. The user may execute the followingsteps or achieve the desired outcome as described by the presentinvention to facilitate the ability of the FA to offer financialplanning advice.

With respect to FIG. 1, an embodiment of the invention includes at leastone database clearinghouse 400. The database clearinghouse includes anyperson, entity, software and/or hardware suitably configured to storethird party information. In one embodiment, the third party informationmay be related to independent Fund Families. The clearinghouses are atype of electronic data warehouse used by Fund Families to store a largeamount of the Fund Family data. The clearinghouses provide an efficientand secure manner to store, send or receive Fund Family data that wouldotherwise occupy significant, internal electronic resources of the FundFamilies.

Any databases discussed herein may be any type of database, such asrelational, hierarchical, graphical, object-oriented, and/or otherdatabase configurations. Common database products that may be used toimplement the databases include DB2 by IBM (White Plains, N.Y.), variousdatabase products available from Oracle Corporation (Redwood Shores,Calif.), Microsoft Access or Microsoft SQL Server by MicrosoftCorporation (Redmond, Wash.), or any other suitable database product.Moreover, the databases may be organized in any suitable manner, forexample, as data tables or lookup tables. Each record may be a singlefile, a series of files, a linked series of data fields or any otherdata structure.

One skilled in the art can also appreciate that, for security reasons,any databases, systems, devices, servers or other components of thepresent invention may comprise of any combination thereof at a singlelocation or at multiple locations, wherein each database or systemincludes any of various suitable security features, such as firewalls,access codes, encryption, decryption, compression, decompression, and/orthe like.

As discussed herein as an exemplary embodiment, the clearinghouses mayinclude known clearinghouses such as DST 420 or DAZL 440. DST mayinclude several Fund Families, for example Fund V 425, Fund W 430, andFund Z 435, wherein V, W, and Z represent Fund Families from externalfinancial institutions. Although only three Fund Families are depictedfor illustrative purposes only, the clearinghouse may be an entity thatreceives data and information from any number of external Fund Families.Moreover, DAZL is a clearinghouse that includes Fund Families such as,for example, Fund X 445, Fund Y, 450, and Fund Z 435. Again, DAZL FundFamilies are not limited to the three depicted herein, but may compriseof any number of Fund Families. Furthermore, a clearinghouse may notonly maintain data from the Fund Families, but in some instances at thediscretion of the Fund Family, may be configured to transfer Fund Familydata from one clearinghouse to another. For example, as depicted in FIG.1, Fund Z 435, is transferred from the DST clearinghouse 420 to the DAZLclearinghouse 440.

The foregoing exemplary system components may be used to facilitate anexemplary method for testing and transferring data in accordance withthe present invention. Moreover, the various system components discussedherein may include one or more of the following: a host server or othercomputing systems including a processor for processing digital data; amemory coupled to said processor for storing digital data; an inputdigitizer coupled to the processor for inputting digital data; anapplication program stored in said memory and accessible by saidprocessor for directing processing of digital data by said processor; adisplay device coupled to the processor and memory for displayinginformation derived from digital data processed by said processor; and aplurality of databases. Various databases used herein may include:client data; financial institution data; and/or like data useful in theoperation of the present invention. As those skilled in the art willappreciate, user computer may include an operating system (e.g., WindowsNT, 95/98/2000/XP, OS2, UNIX, Linux, Solaris, MacOS, etc.) as well asvarious conventional support software and drivers typically associatedwith computers. User computer can be in a home or business environmentwith access to a network. In an exemplary embodiment, access may throughthe Internet through a commercially-available web-browser softwarepackage.

The present invention system and method may be implemented on or use anetwork wherein, the term “network” shall include any electroniccommunications means which incorporates both hardware and softwarecomponents of such. Communication among the parties in accordance withthe present invention may be accomplished through any suitablecommunication channels, such as, for example, a telephone network, anextranet, an intranet, Internet, point of interaction device (point ofsale device, personal digital assistant, cellular phone, kiosk, etc.),online communications, off-line communications, wireless communications,transponder communications, local area network (LAN), wide area network(WAN), networked or linked devices and/or the like. The invention mayalso be implemented using IPX, Appletalk, IP-6, NetBIOS, OSI or anynumber of existing or future protocols. If the network is in the natureof a public network, such as the Internet, it may be advantageous topresume the network to be insecure and open to eavesdroppers. Specificinformation related to the protocols, standards, and applicationsoftware utilized in connection with the Internet may generally known tothose skilled in the art and, as such, need not be detailed herein. See,for example, DILIP NAIK, INTERNET STANDARDS AND PROTOCOLS (1998); JAVA 2COMPLETE, various authors, (Sybex 1999); DEBORAH RAY AND ERIC RAY,MASTERING HTML 4.0 (1997); and LOSHIN, TCP/IP CLEARLY EXPLAINED (1997),the contents of which are hereby incorporated by reference.

The various system components described herein may be independently,separately or collectively suitably coupled to the network via datalinks which includes, for example, a connection to an Internet ServiceProvider (ISP) over the local loop as is typically used in connectionwith standard modem communication, cable modem, Dish networks, ISDN,Digital Subscriber Line (DSL), or various wireless communicationmethods. See, e.g., GILBERT HELD, UNDERSTANDING DATA COMMUNICATIONS(1996), hereby incorporated by reference.

In an exemplary embodiment of the present invention, a user acquires aclearinghouse data layout 100 via a secured/encrypted electronic networkcommunication and delivery system, wherein the data layout is acquiredby the user utilizing a computer interface system as described above tointeract with the clearinghouse to acquire the data. However, the datalayout may be acquired in any format or in any manner that may readilydepict an accurate layout of the data, for example; diskette, CD, hardcopy such as paper, fax, mail receipt and the like.

As depicted in FIG. 2, a user next identifies by manual or automatedfashion, desired data fields from the acquired clearinghouse data layoutas a reference to design a host database layout 200. For example, a hostdatabase layout may comprise of data fields such as, for example, name,address, account number, number of fund shares, commission due to afinancial advisor, and the like. Also, the user identifies in whatdesired manner to depict the information, for example; name followed byaddress followed by account number, and so forth. One skilled in the artcan further appreciate that the database layout may comprise of any typeof information or data piece. For example, information or data that issymbolic, numeric, alpha, alpha-numeric, auditory, cryptic, or any typeof information that may be transferred and detected.

In one aspect of the proposed invention, the user may optionally employfurther exemplary method steps to identify data fields from aclearinghouse for a host database layout and depicted in FIG. 3. Theuser may determine a test scheme 220. The test scheme may includeinformation, a data field, or data values added to the identified datafields layout to make the host's database layout more recognizable tothe host. For example, the user may add a familiar numbering, naming, orsymbolic feature to the identified data fields layout in order tofacilitate following the movement of the data fields layout as it ismanipulated by the herein described method. The factors used todetermine the test scheme are generally based upon subjective criteriadetermined by the user to facilitate the objective of the presentinvention. The test scheme is host information linked to the acquireddata fields. As the data field information is manipulated, the user canmore readily track the results of the manipulation by following thecorresponding, linked test scheme information.

Continuing with an exemplary method depicted in FIG. 3, the user mayobtain requirements from business partners 240. These requirements arethe input from FA's compliance who relay information regarding typicalfinancial details that compliments the test scheme information describedabove. An example of obtained requirements from business partners mayinclude, the amount of equity in a given account, an electronic flag toidentify a specific account if a parameter of interest develops,specific account rules, and the like.

The user may also include industry standard information specific to theindustry of current interest. For example, the proposed invention isdescribed in terms of transferring and testing data from a 529 financialplan. As such, a proper industry standard may include a CUSIP, FIG. 3,260. One skilled in the art can appreciate that a CUSIP is anine-character number that uniquely identifies a particular security.CUSIP is an acronym for the Committee on Uniform Securities andIdentification Procedures, the standards body that created and maintainsthe classification system.

Returning to the exemplary method depicted in FIG. 2, it depicts thestep wherein a user may assume values to populate data fields 300 thatwere identified and laid out in 200. Assumed values may comprise offictional information that the user may deem reasonable for therespective data field being populated. For example, the user may assumea fictitious nine digit number to populate the social security numberdata field, as the user would be expected to eventually receive a realnine digit number to represent a social security number. This stepallows the user to forego typical delays in attaining actual clientinformation. Next, a user may generate a spreadsheet using earlieridentified data fields and the assumed data values. The user may thenpopulate the spreadsheet with said assumed values in the data fields400. The spreadsheet may comprise of a computer program such as Excel,Lotus 1-2-3, VisiCalc, and the like. However, any means may be used togenerate and populate a spreadsheet, either electronic or manual.

In an exemplary embodiment of the present invention a user may forwardby any means described herein, to a clearinghouse the above generatedspreadsheet to obtain feedback from the clearinghouse 500. The feedbackfrom the clearinghouses provides comment on the overall organization ofthe generated spreadsheet, more specifically the data field placement,and assumed data format.

In a continuing embodiment of the present invention, a user may receivetest files from the client 600. The received test files contain limitedtest data to use in the present invention as a precursor to the entireclient database to be transferred and reformatted. In this manner, datamay be more efficiently manipulated using the present invention. Oneskilled in the art may appreciate that any account numbers, names,Social Security Numbers or other potentially identifiable data receivedfrom a client test file may be ‘mocked;’ that is, the test data withinthe test file may be created to comply with protection of the client'scustomer's privacy. Moreover, the client may leave some fieldsintentionally empty to protect the client's test or productionenvironments, and that data may be created and updated in the testfiles. The updates may occur at the client's company site. Moreover,test files may be received by any means described herein.

The method steps by which the user may receive test files from theclient is optionally depicted in FIGS. 4( a) and 4(b), wherein FIG. 4(a) depicts an exemplary method to receive a test file from a DSTclearinghouse and FIG. 4( b) depicts an exemplary method to receive atest file from a DAZL clearinghouse. A clearinghouse Fund Family mayassign a dummy dealer number for test files 610 and depicted in FIG. 4(a). The dummy dealer number is a number unique to a Fund Family andidentifies the Fund Family from the number of Fund Families thatmaintain their databases with the clearinghouse. The dealer number is adummy in this situation, or more particularly fictitious, and may beused to merely facilitate the execution of the method steps in thepresent invention. In a further embodiment of this exemplary methodstep, the clearinghouse is a DST clearinghouse.

The Fund Families create data for test file accounts masking clientidentifying data 620. In order to create test files for which the hostmay receive, the Fund Families create the data to be sent to the host.This data comprises information that may ultimately be reformatted bythe host from the format of the client's database to the format of thehost's database. The data may comprise general account information aswell as sensitive, client proprietary information. To protect sensitiveinformation, the Fund Families may send over test files with anysensitive information in a masked, encrypted, or deleted form.

A clearinghouse such as DST may extract the data for test files fromtheir databases and put the test files out to a test web site 630. Thetest web site may be a temporary or permanent web site used tofacilitate the transfer of data by centralizing it in a readilyaccessible location. In the present invention, a web site is used as acentral location to maintain test files to be accessed by the host,however, it should be appreciated that any means other than a web sitemay be used to allow access to a test file.

It should be appreciated that the computers discussed herein may providea suitable website or other Internet-based graphical user interfacewhich may accessible by users. In one embodiment, the Microsoft InternetInformation Server (IIS), Microsoft Transaction Server (MTS), andMicrosoft SQL Server, are used in conjunction with the Microsoftoperating system, Microsoft NT web server software, a Microsoft SQLServer database system, and a Microsoft Commerce Server. Additionally,components such as Access or Microsoft SQL Server, Oracle, Sybase,Informix MySQL, Intervase, etc., may be used to provide an Active DataObject (ADO) compliant database management system.

Any of the communications, inputs, storage, databases or displaysdiscussed herein may be facilitated through a website having web pages.The term “web page” as it is used herein is not meant to limit the typeof documents and applications that might be used to interact with theuser. For example, a typical website might include, in addition tostandard HTML documents, various forms, Java applets, JavaScript, activeserver pages (ASP), common gateway interface scripts (CGI), extensiblemarkup language (XML), dynamic HTML, cascading style sheets (CSS),helper applications, plug-ins, and the like. A server may include a webservice which receives a request from a browser which includes a URL(http://yahoo.com/stockquotes/ge) and an IP address (123.56.789). Theweb service retrieves the appropriate web pages and sends the web pagesto the IP address.

In an exemplary embodiment of the present invention, a user is assigneda test sign on 640. The test sign on is an assigned, predetermined orrandom password that allows access to a secure link on the test web sitefrom which the test files may be accessed. The test sign on is assignedby the clearinghouse and allows the user to be positively identified,promoting a secure and controllable access to the test files.

A user may access the web site and retrieve the test files for upload toa main frame 650. The data may be retrieved and uploaded viaconventional data streaming. The main frame may comprise of the host'sprimary computer processing database or network system. However, oneskilled in the art may appreciate that the retrieval and upload may notbe limited to only a mainframe. The retrieved information may optionallybe downloaded onto any media described herein for storing data.Moreover, the retrieval may occur on alternate hardware such as apersonal PC, laptop computer, palm pilots, and the like.

In an exemplary embodiment of the present invention and depicted in FIG.4( b), DAZL Fund Families are retrieved from DAZL web site 660. Themethod steps previously described herein are followed by the DAZL FundFamilies as well. However, it can be appreciated that a retrieved testfile, retrieved in the manner as described above, may additionallyemploy an executable to create a text version of the files for further670.

Returning to the exemplary embodiment of the present invention depictedin FIG. 2, a user develops a reformatting algorithm 700. Thereformatting algorithm includes a designed, structured computer programcomprised of sequential steps to carry out the object of the computerprogram. The computer program facilitates the operation wherein thereceived test file data may be entered in some existing format andsubsequently transformed by the computer program to a format consistentwith the host's database or network. The computer program may be writtenin any form recognizable by the host's computer system to carry out thenecessary operation. For example; C, C++, Java, COBOL, assembler, PERL,Visual Basic, SQL Stored Procedures, extensible markup language (XML),and the like. One skilled in the art can appreciate, that any method maybe utilized, electronic or otherwise, to carry out the transformationprocess of the data. Subsequently a user may reformat the received testfiles with the developed reformatting algorithm 800.

In an exemplary embodiment as depicted in FIG. 2, a user may compare thedata and data format of the reformatted test file to the data and dataformat of the earlier described generated spreadsheet 900. This step mayreveal any irregularities with the reformatting algorithm, wherein suchirregularities may be determined by discrepancies in comparing the data.In the exemplary embodiment of the present invention, the comparison maybe executed visually. For example, a user may visually compare the datain Field One of the reformatted test file to Field One of the generatedspreadsheet. However, one skilled in the art can appreciate that anymeans may be used to accurately execute the comparison. For example, amanual, or computer executed, system may be developed to automate thiscomparison step.

In a continuing exemplary embodiment of the present invention, the usermay identify the differences between the generated spreadsheet and thereformatted test files 1000. In order to identify the inconsistenciesbetween the reformatted test file and the generated spreadsheet, amethod may be used to identify the differences. In an exemplaryembodiment of the present invention, the inconsistencies are identifiedby highlighting cells in the spreadsheet that contain the inconsistentdata by using different colors. For example; a yellow highlighted cellindicates a change may be required for input data to map to thegenerated spreadsheet, a green highlighted cell indicates a change maybe completed on the generated spreadsheet to map to input data, and ablue highlighted cell indicates change is required for both input dataand the generated spreadsheet.

In an exemplary embodiment of the present invention, a user may updatethe reformatting algorithm 1100 wherein the updated algorithm properlyreformats the client's test data in a manner that is consistent with thedata on the host's database and/or network. Test data is generallydeemed consistent when the data is set in the proper data fields in theproper data format. For example, using a name, an address, and a socialsecurity number (SSN) for illustrative purposes. If the host's databasedepicts a name, an address and a SSN in fields A, B, and C respectively,the reformat algorithm should take the test file data and transform itso that the name, address, and SSN from the test file data are depictedin fields A, B, and C respectively as well. In a further aspect of thepresent invention, test data exists in a consistent manner if it notonly occupies the proper fields, but also if it is formatted properlywithin the field. For example, assuming a name is formatted into theproper field, it should also exist in the proper form. If the name fieldrequires alpha-numeric characters, it should transform the test datainto the proper alpha-numeric characters and in the proper order.

One example of a benefit of the present invention includes, when codingspecifications for formatting an owner's name, the test files receivedfrom the Fund Families may be reviewed following a walkthrough. If anerror is discovered in the coding specifications that could be correctedbefore the data is actually loaded, the discovery of the error mayresult in a reducing of time to discover the error after the load,sending the fix offshore, and retesting. In close connection with thisexample, if a transaction from one of the Fund Families is not containedin certain documentation and the Fund Family is in the process ofmigrating from the DST to DAZL clearinghouse, the testing of the presentinvention may uncover an error on their system, thereby allowing them tocorrect the error prior to the migration.

In reference to FIG. 2, a user may receive an input file from aclearinghouse 1200. The input files may be received by any meansdescribed herein. As described above, once the host has finalized theupdates to the reformatting algorithm, the host may request and receivethe input file from the clearinghouse to reformat the entire desiredclient database. The input file contains the actual data and/orinformation to be reformatted into the format of the host database.

In a continuing exemplary embodiment of the present invention, asdepicted in FIG. 2, the user may duplicate the input files received fromthe clearinghouse 1300. Often, in transferring data from one entity toanother, data may become distorted, erased, transformed, reformatted,etc. Method step 1300 prevents loss of original information by providingfor duplication of a received input file; more specifically a receivedinput file from a clearinghouse wherein the subsequent duplicated filemay be used for further data manipulation. The original input file maythereby be saved to protect the integrity of the original data andinformation. One skilled in the art can appreciate that the input filemay be duplicated by any means proper. For example, the input file maybe duplicated onto a secondary network or database, hard drive, DVD,CD-ROM, floppy disk, magnetic media, photo-static copy, hard copy, orany other media that has the ability to accurately depict the data andinformation contained on the original input file.

In a continuing exemplary embodiment of the present invention depictedin FIG. 2, a user may reformat the duplicate input file using theupdated algorithm 1400 to create a reformatted input file. Because thealgorithm was determined to properly reformat the client's test file bythe above method steps, the associated client database may now bereformatted in a manner that is consistent with the host's databaseand/or network.

The user may then upload the reformatted input file to the host databaseor network 1500. In this sense, the uploaded file may now exist in acondition such that it may be accessed by a FA to accurately retrievedata information in order to effectively serve a customer's needs.

In accordance with one aspect of the present invention, any suitabledata storage technique may be utilized to store data without a standardformat. Data sets may be stored using any suitable technique, including,for example, storing individual files using an ISO/IEC 7816-4 filestructure; implementing a domain whereby a dedicated file may selectedthat exposes one or more elementary files containing one or more datasets; using data sets stored in individual files using a hierarchicalfiling system; data sets stored as records in a single file (includingcompression, SQL accessible, hashed via one or more keys, numeric,alphabetical by first tuple, etc.); block of binary (BLOB); stored asungrouped data elements encoded using ISO/IEC 7816-6 data elements;stored as ungrouped data elements encoded using ISO/IEC Abstract SyntaxNotation (ASN.1) as in ISO/IEC 8824 and 8825; and/or other proprietarytechniques that may include fractal compression methods, imagecompression methods, etc.

It should be appreciated that the system and method may be realized byany number of hardware and/or software components configured to performthe specified functions. For example, the present invention may employvarious integrated circuit components, e.g., memory elements, processingelements, logic elements, look-up tables, and the like, which may carryout a variety of functions under the control of one or moremicroprocessors or other control devices. Similarly, the softwareelements of the present invention may be implemented with anyprogramming or scripting language such as C, C++, Java, COBOL,assembler, PERL, Visual Basic, SQL Stored Procedures, extensible markuplanguage (XML), with the various algorithms being implemented with anycombination of data structures, objects, processes, routines or otherprogramming elements. Further, it should be noted that the presentinvention may employ any number of conventional techniques for datatransmission, signaling, data processing, network control, and the like.

The present invention may described herein with reference to, blockdiagrams and flowchart illustrations of methods, apparatus (e.g.,systems), and computer program products according to various aspects ofthe invention. It will be understood that each functional block of theblock diagrams and the flowchart illustrations, and combinations offunctional blocks in the block diagrams and flowchart illustrations,respectively, can be implemented by computer program instructions. Thesecomputer program instructions may be loaded onto a general purposecomputer, special purpose computer, or other programmable dataprocessing apparatus to produce a machine, such that the instructionswhich execute on the computer or other programmable data processingapparatus create means for implementing the functions specified in theflowchart block or blocks.

Benefits, other advantages, and solutions to problems have beendescribed herein with regard to specific embodiments. However, thebenefits, advantages, solutions to problems, and any element(s) that maycause any benefit, advantage, or solution to occur or become morepronounced are not to be construed as critical, required, or essentialfeatures or elements of any or all the claims of the invention. As usedherein, the terms “comprises”, “comprising”, or any other variationthereof, are intended to cover a non-exclusive inclusion, such that aprocess, method, article, or apparatus that comprises a list of elementsdoes not include only those elements but may include other elements notexpressly listed or inherent to such process, method, article, orapparatus. Further, no element described herein may required for thepractice of the invention unless expressly described as “essential” or“critical”.

1. A method to facilitate transfer of data from a client database to ahost database, comprising: identifying a data field from the clientdatabase desired for the host database; incorporating the data field ina spreadsheet; populating at least a portion of the data field in thespreadsheet with test data values, wherein the test data values areformatted in accordance with format requirements of the data field;developing an algorithm configured to reformat data associated with thedata field from the client database and desired for the host database;receiving a test file from the client database; creating a reformattedtest file from the test file using the algorithm; comparing thereformatted test file to the spreadsheet; identifying a change, whereinthe change would substantially conform the reformatted test file to thespreadsheet; creating an updated algorithm from the algorithm, theupdated algorithm incorporating the change; receiving an input file fromthe client database; creating a reformatted input file by applying theupdated algorithm to the input file; and uploading the reformatted inputfile to the host database.
 2. The method of claim 1, wherein the step ofidentifying a data field includes receiving and analyzing a clientrecord layout to identify a data field desired by a host.
 3. The methodof claim 2, wherein the client record layout is received from a databaseclearinghouse.
 4. The method of claim 3, wherein the databaseclearinghouse further comprises receiving said client record layout fromat least is one of a DST clearinghouse and a DAZL databaseclearinghouse.
 5. The method of claim 1, wherein the test file is a 529plan test file.
 6. The method of claim 1, wherein the step ofincorporating the data field includes at least one of: a substep ofdetermining an order to organize data fields in the spreadsheet; asubstep of determining data field headers from the data fields andpopulating at least a portion of the data field headers in thespreadsheet in the order; and a substep of determining parameters forthe data fields and formatting the data fields using the parameters. 7.The method of claim 6, wherein the substep of determining parameters forthe data fields and formatting the data fields using the parametersincludes formatting the data fields to include at least one of: analphabetical character, a numeric character, and an alpha-numericcharacter.
 8. The method of claim 1, wherein the step of populatingincludes: generating test data in accordance with parameters of the datafield, wherein the test data simulates data of the client database,populating at least a portion of the test data into the spreadsheet, andforwarding the spreadsheet to the client database for feedback regardingaccuracy and organization of the spreadsheet.
 9. The method of claim 1,wherein the step of comparing includes substeps of: comparing datafields from the reformatted test file to data fields from thespreadsheet; comparing parameters from data fields from the reformattedtest file to parameters from the data fields from the spreadsheet;comparing data values from the data fields from the reformatted testfile to data values from the data fields from the spreadsheet; andidentifying inconsistencies between the data values from the data fieldsfrom the reformatted test file and the data values from the data fieldsfrom the spreadsheet.
 10. The method of claim 9, wherein the substep ofidentifying inconsistencies includes: identifying the inconsistencies bya visual comparison; and identifying the inconsistencies by an automatedcomparison.
 11. The method of claim 1, wherein the step of receiving aninput file includes copying at least a portion of the input file tocreate at least a portion of a duplicate input file.