

CEX
The pinnacle of technology for Digital Event Exchange

The CEX platform revolutionizes information exchange among organizations by prioritizing the exchange of dynamic events over static data. These digital events, rich in strategic value, capture significant occurrences within the digital realm and hold the potential to trigger real-time actions
Paradigm shift :
From Data Management to Event Management Automation

Data exchange is crucial for operations requiring access to detailed or historical information, though it may not always necessitate immediate action or real-time response.
Event sharing centers on the transmission of particular occurrences or actions happening at a specific moment. Unlike stagnant data, events are fluid, reflecting real-time changes or actions. This facilitates rapid organizational responses to evolving circumstances, enabling decisions grounded in past and present events, and automating specific processes or workflows accordingly.

CEX TECHNOLOGY USE CASES
FINANCIAL SERVICES

-
Fraud Alert Sharing: Banks and financial institutions share fraud alert events in real time to prevent cross-fraud attacks.
​
-
Regulatory Compliance Collaboration: Sharing of events related to suspicious transactions to comply with anti-money laundering (AML) and terrorist financing (CFT) regulations.
RETAIL

-
Cross Promotions Based on Purchase Events: Retailers share relevant shopping events to activate cross-promotions and personalized discounts between like-minded brands.
​
-
Supply Chain Optimization: Exchange of inventory events between suppliers and retailers to automate replenishment and optimize inventory management.
LOGISTICS

-
Collaboration in Last Mile Logistics: Transportation companies and retailers exchange delivery events to optimize delivery routes and improve customer experience.
​
-
Real-Time Traffic Event Management: Sharing traffic events and road conditions between government agencies and transportation companies to improve route planning and reduce delivery times.
TELECOM & UTILITIES

-
Cooperation in Infrastructure Repair: Telecommunications companies share events related to network failures and maintenance to coordinate repairs that affect multiple operators.
​
-
Exchange of Usage Events for Network Optimization: Share network usage events to optimize load distribution and quality of service between geographic areas.
HEALTH

-
Coordinated Patient Management: Hospitals, clinics and health insurance providers exchange patient health events to improve care coordination and treatment management.
​
-
Public Health Alerts: Exchange of diagnostic events between institutions to track the spread of diseases and coordinate public health responses.
MEDIA & ENTERTAINMENT

-
Audience Event Sharing: Content producers, streaming platforms, and advertisers share audience behavior events to optimize content and advertising strategies.
​
-
Coordination in Live Events : Event organizers, security services and logistics service providers exchange events in real time during live events to improve the participant experience and ensure security.
CEX Properties
ANONYMOUS
EXCHANGES
CEX uses anonymous unique identifiers for each event exchanged, ensuring that sensitive information is not exposed during the transmission process. This allows organizations to share relevant events without compromising the confidentiality of the underlying data.
SYNCHRONIZATION OF MULTIPLE SERIES OF EVENTS
CEX coordinates event sharing times to align with strategically relevant moments for all parties involved. This synchronization ensures that events are shared and acted upon at the most opportune times, maximizing their impact
EVENTS
CHAINING
The technology enables chaining of events through the generation of a new unique identifier for each exchange, making it easier to reassociate events with their original context only at the ends of the exchange. This approach protects the integrity and specific context of each event.
VIRTUALIZATION
The technology facilitates event chaining by generating a unique identifier for each exchange, simplifying the reassociation of events with their original context at both ends of the exchange. This method preserves the integrity and specific context of each event
SECURITY
CEX implements a security system that utilizes public and private keys for each end of the exchange, enhancing confidentiality and ensuring that only authorized parties can access event information.
EVENT PAIRING WITHOUT PERSISTENCE
The pairing of events within CEX takes place within a very short timeframe and without physical persistence, minimizing the risk of interception or unauthorized access to information during the pairing process.
The intermediate exchange is conducted using an anonymous identifier, with the endpoints re-chaining the event within their respective contexts

Three keys, along with chaining technology, form the foundation of the CEX platforms. The following diagram illustrates the digital structure enabling a comprehensive exchange of events, facilitating the design of business mechanisms upon it.
An innovative digital structure is built on the chaining of two components and assigning a new unique identifier to that chaining. The intermediate transmission is conducted with this anonymous identifier, and it is the endpoints that reconnect the event with their respective contexts of interest. To achieve this, three components work synchronously:
-
An internal virtualization system for source and destination data to assign unique identifiers to each event at each location.
-
A public system for the instant presence of events awaiting chaining.
-
A coordination and synchronization system for strategic timing that interprets the event at each endpoint.
Tecnología
The interpretation of the event in the public domain is meaningless; the pairing within the system itself provides the association.
At each workstation, a virtualization engine generates a list of events generated by the technological system itself. From this comprehensive list, the engine decides which events are to be sent for exchange. These specific events are mapped with the identifier agreed upon by both companies. However, this mapping is assigned a new identifier, which is the one actually transmitted to the exchange center. The other workstation follows the same sequence with its own events

When the event exchange center detects that two unique identifiers match the requested activity, it sends each workstation its identifier along with the timestamp of when the match occurred. The workstations then search for the unique identifier in their mapping table. Upon locating it, they follow the reverse path to associate it with their own operational process
In addition to the anonymity of coding, the pairing occurs within a 1ms process without physical persistence (public).
Based on the recognized confidentiality provided by a public-private key system, this format enhances confidentiality by employing different private keys for each endpoint. For instance, when both companies send their public key, their respective identifier is included within the code sent, resulting in a unique number at each end. The pairing center disregards this portion of information and solely utilizes the event identification part and timestamp to decide their association.
The association with the element that decrypts the key sent for pairing is conducted on a map that does not employ the original code of the technological system itself. Instead, a code is assigned that becomes invalid once the event of interest expires. For example, a person's code in their system remains static and permanent, but in the map, it is assigned a different identifier each time the condition exists, which is then used for the entire round-trip transaction.
Event Exchange Centers (CEX) can trace pairings subjected to security or audits back in time by utilizing identifiers stored in each system.
The concept of strategic protection of the transmitted information is upheld, as the interpretation of the events shared by both companies is handled at the code level. The specific meaning or treatment to be carried out by each event within their respective systems is not transmitted.
For instance, the code for a home sale by a real estate company may have a private event identifier such as "location change".
Monetization metrics of the event exchange system include information to quantify the number of effective pairings within the system itself, as well as to validate pairings between different types of events based on the value perceived by each endpoint.
For example, considering that the event is a full node again, the mechanism allows for the same event to have a different economic weight depending on the origin and destination of the pairing.