WO2001022305A2 - A financial risk and exposure management system - Google Patents

A financial risk and exposure management system Download PDF

Info

Publication number
WO2001022305A2
WO2001022305A2 PCT/GB2000/003671 GB0003671W WO0122305A2 WO 2001022305 A2 WO2001022305 A2 WO 2001022305A2 GB 0003671 W GB0003671 W GB 0003671W WO 0122305 A2 WO0122305 A2 WO 0122305A2
Authority
WO
WIPO (PCT)
Prior art keywords
agreement
tables
exposure
data
netting
Prior art date
Application number
PCT/GB2000/003671
Other languages
French (fr)
Other versions
WO2001022305A8 (en
Inventor
Gavin Bell
Original Assignee
Sungard Software, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sungard Software, Inc. filed Critical Sungard Software, Inc.
Priority to AU74367/00A priority Critical patent/AU7436700A/en
Publication of WO2001022305A2 publication Critical patent/WO2001022305A2/en
Publication of WO2001022305A8 publication Critical patent/WO2001022305A8/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Definitions

  • the invention relates to a system for management of financial risk or exposure.
  • close-out netting A close-out netting agreement is made between a financial institution and a counterparty. It states that in the event of counterparty default, the total position with that counterparty will be treated as the result of close-out of all qualifying contracts. Thus, the financial institution exposure in the event of counterparty default is the netted sum of all trades covered by a close-out netting agreement. Therefore, there is a single balancing amount to be paid by one party.
  • a financial risk and exposure management system comprising;
  • a dealing system interface comprising means for receiving dealing data in real time and for writing said data to a database table
  • a modelling engine comprising means for receiving user inputted attributes for a proposed netting agreement with a counterparty, and for automatically carrying out a series of validity tests according to pre-set rules, said dealing data, and said netting agreement parameters to determine if the proposal is valid.
  • the dealing system interface comprises means for receiving and storing pre-deal limit check, exposure update, and violation alert data.
  • the modelling engine comprises means for combining received attributes to determine an exposure consolidation key, said key identifying an exposure consolidation category and an associated set of rules for validity tests.
  • the database stores dynamic tables which are frequently updated and static tables of infrequently updated data, and said netting agreement tables are dynamic.
  • the static tables comprise a master agreement table of data associated with a static master agreement including data fields identifying allowed dealing product types and indicators for constraints on attributes. .
  • the netting agreement tables are related to the master agreement table with an identification code, and the netting agreement tables are partially automatically populated by the master agreement table.
  • the dynamic tables include parent tables, and subsidiary tables correlating groupings of related data for fast data access.
  • the modelling engine comprises means for applying a series of validity tests for an agreement for a relevant counterparty located in the dynamic netting tables, and for re-initiating said tests with a fresh agreement if any of said tests fail.
  • each test has an associated data access address embedded in the associated rules, for fast data access.
  • the modelling engine comprises means for automatically calculating an exposure value upon determination that a proposal is valid.
  • a financial risk and exposure management system comprising:
  • a dealing system interface comprising means for receiving dealing data including violation alerts in real time from remote dealing systems:
  • a modelling engine comprising:
  • a user interface comprising means for receiving attributes for a proposal close out netting agreement
  • said tests are carried out according to a set of rules retrieved according to an exposure consolidation key identifying an exposure consolidation category having an associated set of rules.
  • Fig. 1 is a schematic overview of a financial risk and exposure management system of the invention
  • Fig. 2 is a diagram illustrating a part of the system for processing close-out netting agreements
  • Figs 3(a) and 3(b) are together a flow diagram illustrating operation of the part of the system shown in Fig. 2; and Figs. 4 to 13 are sample display screens to illustrate operation of the system.
  • a risk and exposure management system 1 comprises a central server 2 having a global exposure and limits database 3. This database is updated in real time by geographically spread dealing systems, indicated generally by the numeral 4. Each of these systems comprises a market risk engine 5 and a reporting system 6 which both interact in real time with the central server 2 using XML protocol. In addition to real time financial data updating, the systems 4 also provide parameter values such as pre-deal limit checks, exposure updating, and violation alerts. This data is written by the server 2 to the database 3 as it is received.
  • the server 2 is programmed to manage exposures dynamically using data from the dealing systems 4 and tables in the database 3, rather than simply imposing limits. This is achieved by combining one or more contract attributes or derived values such as Counterparty, Country, Currency, or Product to form an exposure consolidation key. This key identifies an exposure consolidation category and an associated rules process.
  • a major function performed by the server 2 is close-out netting management. This functionality is performed by a sub-system 11 shown in Fig. 2.
  • a data capture interface 12 is programmed to interactively prompt user input of data for proposed agreements and transactions and other query data.
  • the sub-system 11 also comprises a modelling engine 13 which comprises a processor operating in response to rules to interrogate various datasets in the database 3 and provide outputs to the user. The rules are selected according to the exposure consolidation key.
  • the datasets comprise a current dataset 14 of user-inputted data for a particular query or proposal agreement. It also comprises a set of dynamic tables 15 and a set of static tables 16.
  • the sub-system 11 also comprises a modelling output interface 17, and a sample output 18 is illustrated in Fig. 2.
  • the static tables include a table of Master Agreements containing:- The master agreement identification code
  • MST_BRN_CD CHAR (8) not null, — branch code constraint PK_MST_CLS_BRN primary key (MST_AGR_CD, MST_BRN_CD) using index tablespace RXM INDl
  • MST_AGR_CD CHAR (8) not null, — master agreement type MST_CUR_CD CHAR(3) not null, — currency code constraint PK_MST_CLS_CUR primary key (MST_AGR_CD, MST_CUR_CD) using index tablespace RXM_1ND1 ) /
  • MST AGR_CD CHAR (8) not null, — master agreement type MST JUR_CD CHAR (3) not null, — jurisdiction code constraint PK_MST_CLS_JTJR primary key (MST_AGR_CD, MST_JUR_CD) using index tablespace RXM_IND1
  • Linking of the dynamic tables and the static tables is achieved by the master agreement identification code key.
  • This key is used to automatically populate dynamic tables including the netting agreement tables with valid data which is static.
  • An example is an identifier for branches of the bank.
  • a process comprising steps 25 to 39 is now described. This process is carried out by the modelling engine 13 operating according to rules defining a controlled process and accessing the static and dynamic tables and the dealing data. Because the dynamic tables are loaded in memory for faster access and because they are populated with some static data, most accesses are the dynamic tables to provide fast response times.
  • An important aspect of the modelling engine 13 is that it operates in a highly controlled manner to follow a test execution sequence illustrated in Figs. 3(a) and 3(b).
  • Each rule which requires data access is coded with the address of the relevant table. Because the datasets are in dynamic and static groups, and because the dynamic tables have subsidiary tables identified by parent dynamic table records there is very fast data access. Also, there are secondary tables which correlate groupings of related data. This minimises the number of accesses required. Thus, in most instances, a rule can access required data derived from a correlation of, for example, an agreement and a counterparty in a single access in which time is delayed only by a single index and table access cycle. These features allow excellent real time performance of the system, even if there are thousands of counterparties.
  • the data capture interface 12 receives user data for a proposed transaction.
  • the engine checks if the proposal is eligible for close-out netting treatment under an existing agreement with the relevant counterparty.
  • the data captured for this purpose is:-
  • Dealing data including violation alerts is also accessed.
  • a Close-out Netting Status is set to NO, as indicated by step 26. If an agreement is located, the engine 13 . then checks each agreement for this counterparty against the process steps below until it determines that the close-out status is YES. If the agreement list is exhausted before this condition is found then the close-out status is NO and a process exit is taken. If the close-out status for an agreement is set to YES the process exit is taken.
  • step 27 Location of an agreement is indicated in step 27, and in step 28 the current date is checked against the effective date. If the effective date is in the future the process returns to step 27.
  • step 29 The country of applicable law is checked in step 29 against the list of authorised jurisdictions for the designated master agreement. If the country is not included in the authorised list the process returns to step 27.
  • the country of counterparty HQ is checked in step 30 against the list of authorised jurisdictions for the designated master agreement. If the country is not included in the authorised list the process returns to step 27.
  • a sample of the code in the C language is given below.
  • the product attribute constraint indicator is checked in step 31. If a product constraint is in effect the product code is checked against the list of authorised products for this counterparty close-out agreement. If the product code is not found in this list the process returns to step 27.
  • the product attribute constraint indicator for the associated Master Agreement is checked in step 32. If a product constraint is in effect the product code is checked against the list of authorised product for this master agreement. If the product code is not found in this list the process returns to step 27.
  • the dealing branch attribute constraint indicator is checked in step 33. If a dealing branch constraint is in effect the dealing branch code is checked against the list of authorised dealing branches for this counterparty close- out agreement. If the dealing branch code is not found in this list the process returns to step 27.
  • the dealing branch country code is checked in step 34 against the list of authorised jurisdiction countries for this master agreement. If the dealing branch country code is not found in this list the process returns to step 27.
  • the counterparty branch attribute constraint indictor is checked in step 35. If a counterparty branch constraint is in effect the counterparty branch code is checked against the list of authorised counterparty branches for this counterparty close-out agreement. If the counterparty branch code is not found in this list the process returns to step 27.
  • step 36 The counterparty branch country code is checked in step 36 against the listed of authorised jurisdiction countries for this master agreement. If the counterparty branch country code is not found in this list the process returns to step 27.
  • the currency attribute constraint indicator is checked in step 37. If a currency constraint is in effect the currency code is checked against the list of authorised currencies for this counterparty close-out agreement. If the currency code is not found in this list the process returns to step 27.
  • the currency attribute constraint indicator for the associated Master Agreement is checked in step 38. If a currency constraint is in effect the currency code is checked against the list of authorised currencies for this master agreement. If the currency code is not found in this list the process returns to step 27. The close-out netting status is then set to YES and the process returns to step 27.
  • the engine 13 then updates a CLS_NET_SET table in the dynamic tables 15, as follows.
  • the engine 13 then proceeds to calculate the counterparty credit value of transactions in a proposed agreement provided the status is YES.
  • the data capture interface 12 captures the following data:-
  • PFE Transaction Potential Future Exposure value
  • a mitigating factor (MF) is calculated using the formula 0.4 + 0.6* sum of all MtM values divided by the sum of all positive values.
  • the counterparty credit risk value of all transactions which are still active for any future date is calculated by summing the MtM values and PFE values for all transactions on that date where the transaction exposure maturity date is later than the selected date.
  • a sample output 18 is shown in Fig. 2.
  • the closeout netting agreement definitions are linked to the customer by a data table field CST_ID which uniquely identifies the customer within the system 1.
  • CST_ID uniquely identifies the customer within the system 1.
  • a primary table of the dynamic tables 16 identifies the characteristics of the agreement, and the following are the main fields.
  • MST_AGR_CD CHAR not null
  • master agreement type key to master agreement
  • LGL_ENT_CD CHA not null
  • GOV_LA _CTY_CD CHAR (6) not null, — country of governing law
  • Secondary tables specify allowable values for constraints applied to branches, currencies, places, or products under the agreement. The following are examples.
  • CLS_PRD_CD CHAR(4) not null, — product code constraint PK_CLS_PRD primary key (CST_CD, CLS_AGR_CD, CLS_PRD_CD) using index tablespace RXM_IND1 )
  • a dynamic table is updated for each deal included in a uniquely identified closeout netting set to calculate the "mitigating factor" used to generate the credit risk exposure value assigned to the set of netted deals.
  • the mitigating factor is a measure of the reduction in credit risk exposure achieved by the use of the closeout netting technique.
  • NGR VL FLOAT not null computed multiplier for add-on value constraint PK_CLS_NET_SET primary key (CST_CD , CLS_AGR_CD) using index tablespace RXM IND1
  • Figs. 4 to 13 system display screens are shown to assist in understanding the composition of the tables and the manner in which the modelling engine operates. Editing of a closeout agreement table is shown i Fig. 4.
  • This table includes markers or flags for related tables for currencies (Fig. 5), products (Fig. 6), branches (Fig. 7), and locations (Fig. 8) as described in more detail above.
  • These tables are all dynamic.
  • There are also secondary dynamic tables for groupings or correlations of data such as a grouping of a particular counterparty and a particular agreement.
  • Fig. 5 illustrates entry of currency data
  • Fig. 6 shows entry of codes for netting products
  • Fig. 7 shows entry of branch codes
  • Fig. 8 shows entry of locations.
  • the primary static table is a master agreement table, editing of which is shown in Fig. 9.
  • Figs. 10 to 13 illustrate related tables as follows:
  • Fig. 12 branches
  • the invention provides for comprehensive agreement processing for risk and exposure management. This has been achieved with very fast response times to allow real time operation where workstations are widely spread geographically.
  • the invention is not limited to the embodiments described, but may be varied in construction and detail within the scope of the claims.
  • the invention may be applied to processing of agreements between counterparties other than close out netting agreements, such as general netting agreements.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

In a financial risk and exposure management system (1) a server (2) receives pre-deal limit check, exposure update, and violation alert data in real time from remote dealing systems (4). A database (3) stores static tables of data including master agreement data. Dynamic tables of data including details of existing netting agreements are linked with the master tables. The server (2) executes a modelling engine (13) to apply a series of validity tests for a proposal <i>vis-à-vis</i> a stored netting agreement. It then automatically calculates exposure.

Description

A FINANCIAL RISK AND EXPOSURE MANAGEMENT SYSTEM
BACKGROUND OF THE INVENTION
The invention relates to a system for management of financial risk or exposure.
In recent years, organisations such as financial institutions have increasingly entered into agreements with third parties in order to reduce exposure for deals such as derivatives deals. One example is close-out netting. A close-out netting agreement is made between a financial institution and a counterparty. It states that in the event of counterparty default, the total position with that counterparty will be treated as the result of close-out of all qualifying contracts. Thus, the financial institution exposure in the event of counterparty default is the netted sum of all trades covered by a close-out netting agreement. Therefore, there is a single balancing amount to be paid by one party.
While such agreements are very important instruments for financial institutions and other similar organisations, administration is particularly difficult. This is because of the financial and legal complexities involved. For example, close-out netting agreements are only legally allowable in a certain limited number of countries. Also, within these countries various constraints apply.
It is therefore an object of the invention to provide a financial risk or exposure management system which manages the creation and maintenance of agreements in a manner which is both effective and minimises user time input required.
SUMMARY OF THE INVENTION
According to the invention, there is provided a financial risk and exposure management system comprising;
a database storing tables of netting agreement parameters;
a dealing system interface comprising means for receiving dealing data in real time and for writing said data to a database table; and
a modelling engine comprising means for receiving user inputted attributes for a proposed netting agreement with a counterparty, and for automatically carrying out a series of validity tests according to pre-set rules, said dealing data, and said netting agreement parameters to determine if the proposal is valid.
In one embodiment, the dealing system interface comprises means for receiving and storing pre-deal limit check, exposure update, and violation alert data.
In one embodiment, the modelling engine comprises means for combining received attributes to determine an exposure consolidation key, said key identifying an exposure consolidation category and an associated set of rules for validity tests. In one embodiment, the database stores dynamic tables which are frequently updated and static tables of infrequently updated data, and said netting agreement tables are dynamic.
In one embodiment, the static tables comprise a master agreement table of data associated with a static master agreement including data fields identifying allowed dealing product types and indicators for constraints on attributes. .
In one embodiment, the netting agreement tables are related to the master agreement table with an identification code, and the netting agreement tables are partially automatically populated by the master agreement table.
In one embodiment, the dynamic tables include parent tables, and subsidiary tables correlating groupings of related data for fast data access.
In one embodiment, the modelling engine comprises means for applying a series of validity tests for an agreement for a relevant counterparty located in the dynamic netting tables, and for re-initiating said tests with a fresh agreement if any of said tests fail.
In one embodiment, each test has an associated data access address embedded in the associated rules, for fast data access.
In one embodiment, the modelling engine comprises means for automatically calculating an exposure value upon determination that a proposal is valid. According to another aspect, there is provided a financial risk and exposure management system comprising:
a stored set of static tables storing close out netting parameter values which change infrequently,
a stored set of dynamic tables storing close out netting parameter values which change frequently, said dynamic tables being related to said static tables and including data for existing counterparty agreements,
a dealing system interface comprising means for receiving dealing data including violation alerts in real time from remote dealing systems:
a modelling engine comprising:
a user interface comprising means for receiving attributes for a proposal close out netting agreement;
means for searching the dynamic tables to locate an existing agreement for a relevant counterparty identified in said received attributes;
means for carrying out a series of validity tests on said attributes to check if they apply to the agreement and are compatible with the dealing data; means for rejecting said agreement and for locating a further agreement if said first agreement fails a validity test and for repeating said validity tests until all agreements for that counterparty have been exhausted; and
means for automatically calculating an exposure value for the attributes according to an agreement for which the tests are positive.
In one embodiment, said tests are carried out according to a set of rules retrieved according to an exposure consolidation key identifying an exposure consolidation category having an associated set of rules.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will be more clearly understood from the following description of some embodiments thereof, given by way of example only with reference to the accompanying drawings in which:-
Fig. 1 is a schematic overview of a financial risk and exposure management system of the invention;
Fig. 2 is a diagram illustrating a part of the system for processing close-out netting agreements;
Figs 3(a) and 3(b) are together a flow diagram illustrating operation of the part of the system shown in Fig. 2; and Figs. 4 to 13 are sample display screens to illustrate operation of the system.
DETAILED DESCRIPTION OF THE INVENTION
Referring to Fig. 1, there is shown a risk and exposure management system 1. The system 1 comprises a central server 2 having a global exposure and limits database 3. This database is updated in real time by geographically spread dealing systems, indicated generally by the numeral 4. Each of these systems comprises a market risk engine 5 and a reporting system 6 which both interact in real time with the central server 2 using XML protocol. In addition to real time financial data updating, the systems 4 also provide parameter values such as pre-deal limit checks, exposure updating, and violation alerts. This data is written by the server 2 to the database 3 as it is received.
The server 2 is programmed to manage exposures dynamically using data from the dealing systems 4 and tables in the database 3, rather than simply imposing limits. This is achieved by combining one or more contract attributes or derived values such as Counterparty, Country, Currency, or Product to form an exposure consolidation key. This key identifies an exposure consolidation category and an associated rules process.
A major function performed by the server 2 is close-out netting management. This functionality is performed by a sub-system 11 shown in Fig. 2. A data capture interface 12 is programmed to interactively prompt user input of data for proposed agreements and transactions and other query data. The sub-system 11 also comprises a modelling engine 13 which comprises a processor operating in response to rules to interrogate various datasets in the database 3 and provide outputs to the user. The rules are selected according to the exposure consolidation key. The datasets comprise a current dataset 14 of user-inputted data for a particular query or proposal agreement. It also comprises a set of dynamic tables 15 and a set of static tables 16.
The sub-system 11 also comprises a modelling output interface 17, and a sample output 18 is illustrated in Fig. 2.
The static tables include a table of Master Agreements containing:- The master agreement identification code
The agreement name
Indicators for additional constraints on the attributes.
Branches of the parent bank
Dealing product types (associated with received dealing data) Currencies
The following is an example of a table defining the scope of a master agreement.
— Table: MST_CLS_AGR Master Closeout Agreement create table MST_CLS_AGR
( MST_AGR_CD CHAR(8) not null, — master agreement type
MST_AGR_NM CHAR(28) not null, — master agreement name
STR DT DATE not null, — effective date END DT DATE not null, — termination date
ALL CUR FL CHAR(l) not null, -- all currencies flag
ALL PRD FL CHAR(l) not null, — all products flag
ALL BRN FL CHAR(l) not null, — all branches flag
ALL JUR FL CHAR(l) not null, — all jurisdictions flag
DEL ST CHAR(l) not null, — delete state
MOD TS DATE not null, — audit date/time
MOD BRN CD CHAR(8) not null, — audit branch code
MOD AGT CD CHAR(8) not null, -- audit agent code constraint PK MST CLS AGR primsiry ke (MST AGR CD)
Secondary tables specify the allowable values if any constraints are to be applied on Branches, Currencies, Legal Jurisdictions or Products under this agreement.
— Table: MST_CLS_BRN Master Closeout Agreement Branch create table MST CLS BRN
(
MST_AGR_CD CHAR (8) not null, — master agreement type
MST_BRN_CD CHAR (8) not null, — branch code constraint PK_MST_CLS_BRN primary key (MST_AGR_CD, MST_BRN_CD) using index tablespace RXM INDl
) /
— Table: MST_CLS_CUR Master Closeout Agreement Currency create table MST_CLS_CUR (
MST_AGR_CD CHAR (8) not null, — master agreement type MST_CUR_CD CHAR(3) not null, — currency code constraint PK_MST_CLS_CUR primary key (MST_AGR_CD, MST_CUR_CD) using index tablespace RXM_1ND1 ) /
— Table: MST_CLS_JUR Master Closeout Agreement Jurisdiction create table MST_CLS_JUR
(
MST AGR_CD CHAR (8) not null, — master agreement type MST JUR_CD CHAR (3) not null, — jurisdiction code constraint PK_MST_CLS_JTJR primary key (MST_AGR_CD, MST_JUR_CD) using index tablespace RXM_IND1
)
/ — Table: MST_CLS_PRD Master Closeout Agreement Product create table MST_CLS_PRD
(
MST_AGR_CD CHAR(8) not null, — master agreement type MST_PRD_CD CHAR (4) not null, — product code constraint PK_MST_CLS_PRD primary key (MST_AGR_CD, MST_PRD_CD) using index tablespace RXM INDl
)
If an additional constraint is required an associated table is constructed holding the authorised values for that attribute for this master agreement. An associated table holding the authorised list of jurisdiction countries for this master agreement is maintained. These tables change relatively infrequently and are therefore referred to in this specification as "static" tables 16.
A table of counterparty close-out agreements is maintained containing:'
Counterparty identification code
Agreement identification code
Master agreement identification code Country of applicable law
Effective date of agreement
Collateral Annex Indicator
Current Collateral Value
Indicators for additional constraints on the attributes Currencies covered by this agreement
Products covered by this agreement
Branches of the parent bank covered by the agreement
Branches of the counterparty covered by this agreement If any additional constraints are required an associated table is constructed holding the authorised values for that attribute for this specific agreement. These tables are amended frequently in response to generation of new agreements and modification of existing ones. The counterparty agreement table and these subsidiary tables are therefore referred to as "dynamic" tables 15. The dynamic tables are essentially subsets of the static master agreement table and its subsidiary static tables.
Linking of the dynamic tables and the static tables is achieved by the master agreement identification code key. This key is used to automatically populate dynamic tables including the netting agreement tables with valid data which is static. An example is an identifier for branches of the bank.
Referring to Figs. 3(a) and 3(b) a process comprising steps 25 to 39 is now described. This process is carried out by the modelling engine 13 operating according to rules defining a controlled process and accessing the static and dynamic tables and the dealing data. Because the dynamic tables are loaded in memory for faster access and because they are populated with some static data, most accesses are the dynamic tables to provide fast response times.
An important aspect of the modelling engine 13 is that it operates in a highly controlled manner to follow a test execution sequence illustrated in Figs. 3(a) and 3(b). Each rule which requires data access is coded with the address of the relevant table. Because the datasets are in dynamic and static groups, and because the dynamic tables have subsidiary tables identified by parent dynamic table records there is very fast data access. Also, there are secondary tables which correlate groupings of related data. This minimises the number of accesses required. Thus, in most instances, a rule can access required data derived from a correlation of, for example, an agreement and a counterparty in a single access in which time is delayed only by a single index and table access cycle. These features allow excellent real time performance of the system, even if there are thousands of counterparties.
The data capture interface 12 receives user data for a proposed transaction. In step 25 the engine checks if the proposal is eligible for close-out netting treatment under an existing agreement with the relevant counterparty. The data captured for this purpose is:-
Counterparty Identification Code Counterparty HQ Country
Product code
Dealing branch code
Dealing Branch Country
Counterparty branch or location code Counterparty branch country
Currency code or codes of the transaction or contract
Dealing data including violation alerts is also accessed.
The following is a sample of the code in the C language for locating a matching agreement.
// Search for the first matching agreement for { int i=0; i < numAgr; i++ ) { Rx ClsNetAgreement cstAgr; cstAgr = * (agrRecordList [i] ) ; agrCode = cstAgr . CloseoutNetAg Id () ; // Get the netting product if ( cstAgr.AllProductsFlagO == true ) {
II;
} else
{
// RxmClsNetProduct clsNetProduct; if ( ! RxmClsNetProduct: .-Find (cstCode, agrCode , prdCode) ) {
// Get next agreement for the customer continue; } }
If no agreements are found then a Close-out Netting Status is set to NO, as indicated by step 26. If an agreement is located, the engine 13. then checks each agreement for this counterparty against the process steps below until it determines that the close-out status is YES. If the agreement list is exhausted before this condition is found then the close-out status is NO and a process exit is taken. If the close-out status for an agreement is set to YES the process exit is taken.
Location of an agreement is indicated in step 27, and in step 28 the current date is checked against the effective date. If the effective date is in the future the process returns to step 27.
The country of applicable law is checked in step 29 against the list of authorised jurisdictions for the designated master agreement. If the country is not included in the authorised list the process returns to step 27. The country of counterparty HQ is checked in step 30 against the list of authorised jurisdictions for the designated master agreement. If the country is not included in the authorised list the process returns to step 27. A sample of the code in the C language is given below.
// Check the urisdiction in the master agreement if ( mstAgr.AllJurisdictionsFlagO == false )
{ // Check Agreement country of governing law if ( i RxmClsNetMstJurisdiction:: ind(mstAgrCode, countryOfGovnLaw) ) {
// Get next agreement for the customer continue ; } // Check customer ultimate risk country if ( • RxmClsNetMstJurisdiction :: ind (mstAgrCode, ultimateRiskCountry) )
{
// Get next agreement for the customer continue ;
}
The product attribute constraint indicator is checked in step 31. If a product constraint is in effect the product code is checked against the list of authorised products for this counterparty close-out agreement. If the product code is not found in this list the process returns to step 27. The product attribute constraint indicator for the associated Master Agreement is checked in step 32. If a product constraint is in effect the product code is checked against the list of authorised product for this master agreement. If the product code is not found in this list the process returns to step 27.
The dealing branch attribute constraint indicator is checked in step 33. If a dealing branch constraint is in effect the dealing branch code is checked against the list of authorised dealing branches for this counterparty close- out agreement. If the dealing branch code is not found in this list the process returns to step 27. The dealing branch country code is checked in step 34 against the list of authorised jurisdiction countries for this master agreement. If the dealing branch country code is not found in this list the process returns to step 27.
The counterparty branch attribute constraint indictor is checked in step 35. If a counterparty branch constraint is in effect the counterparty branch code is checked against the list of authorised counterparty branches for this counterparty close-out agreement. If the counterparty branch code is not found in this list the process returns to step 27.
The counterparty branch country code is checked in step 36 against the listed of authorised jurisdiction countries for this master agreement. If the counterparty branch country code is not found in this list the process returns to step 27.
The currency attribute constraint indicator is checked in step 37. If a currency constraint is in effect the currency code is checked against the list of authorised currencies for this counterparty close-out agreement. If the currency code is not found in this list the process returns to step 27.
The currency attribute constraint indicator for the associated Master Agreement is checked in step 38. If a currency constraint is in effect the currency code is checked against the list of authorised currencies for this master agreement. If the currency code is not found in this list the process returns to step 27. The close-out netting status is then set to YES and the process returns to step 27. The engine 13 then updates a CLS_NET_SET table in the dynamic tables 15, as follows.
// Now this contract is a closeout nettable contract, // update the CLS_NET_SET table if it is a Deal. RxmStrmg clsNetUnqld; if ( iRxmClsNetSet: : Find (cstCode, agrCode, clsNetϋnqld) )
{ // if not found and it is not aDeal , consider it as non_nettable if ( titsADeal )
{
// return false; It is OK to create a new ID. }
// Using the contract internal Number as the ClsNetUmqueld // clsNetUnqld = IntRefNumO; // Get ClsNetSet Sequence Number as ClsNetUmqueld // RxmStrmg clsNetUnqld; if ( i xmContrac : :NextClsNetSetSeqNum (clsNetUnqld) ) {
RXML0G1 (RxmLog: : critical) « " ' ' Error m getting next ClsNetSet sequence number i i »
« endlog; retStatus = false; return false;.
The engine 13 then proceeds to calculate the counterparty credit value of transactions in a proposed agreement provided the status is YES. The data capture interface 12 captures the following data:-
Counterparty code
Close-out Netting agreement identifier Transaction Mark to Market value (MtM)
Transaction Potential Future Exposure value (PFE) Transaction exposure maturity date For all transactions with the same counterparty code and close-out netting agreement identifier code the engine calculates:-
The sum of all the MtM values and the sum of all positive MtM values.
A mitigating factor (MF) is calculated using the formula 0.4 + 0.6* sum of all MtM values divided by the sum of all positive values.
The counterparty credit risk of all transactions included in the close-out netting agreement is calculated from the formula:-
Maximum (sum of all MtM values or Zero) +sum of all PFE values multiplied by the mitigating factor.
The counterparty credit risk value of all transactions which are still active for any future date is calculated by summing the MtM values and PFE values for all transactions on that date where the transaction exposure maturity date is later than the selected date. A sample output 18 is shown in Fig. 2.
The closeout netting agreement definitions are linked to the customer by a data table field CST_ID which uniquely identifies the customer within the system 1. A primary table of the dynamic tables 16 identifies the characteristics of the agreement, and the following are the main fields.
CST_CD CHAR (12) not null, — customer code
CLS_AGR_CD CHAR (8) not null, — agreement code (id)
MST_AGR_CD CHAR (8) not null, — master agreement type — key to master agreement LGL_ENT_CD CHA (6) not null, — legal entity code
GOV_LA _CTY_CD CHAR (6) not null, — country of governing law
EFF_DT DATE not null, — effective date (start date)
ALL_CUR_FL CHAR(l) not null, — all currencies flag
ALL_PRD_FL CHAR(l) not null, -- all products flag
ALL_BRN_FL CHAR(l) not null, -- all branches flag
ALL_PLC_FL CHAR(l) not null, -- all jurisdictions flag
CLT_AL _FL CHAR(l) not null, — collateral allowed flag
DEL_ST CHAR(l) not null, -- delete state
MOD_TS DATE not null, — audit date/time
MOD_BRN_CD CHAR (8) not null, — audit branch code
MOD _AGT_CD CHAR (8) not null, — audit agent code constraint PK_CLS_AGR primary key (CST CD, CLS AGR CD) using index tablespace RXM IND1
Secondary tables specify allowable values for constraints applied to branches, currencies, places, or products under the agreement. The following are examples.
— Table: CLS BRN Closeout Agreement Branches create table CLS_BRN
(
CST_CD CHAR(12) not null, — customer code
CLS_AGR_CD CHAR (8) not null, — els netting agreement id CLS_BRN_CD CHA (8) not null, — branch code constraint PK_CLS_BRN primary key (CST_CD, CLS_AGR_CD, CLS_BRN_CD) using index tablespace RXM_IND1
)
/
Table: CLS CUR Closeout Agreement Currencies create table CLS_CUR
(
CST_CD CHAR (12) not null, — customer code
CLS_AGR_CD CHAR (8) not null, — els netting agreement id
CLS_CUR_CD CHAR (3) not null, — currency code constraint PK_CLS_CUR primary key (CST_CD, CLS AGR CD, CLS CUR CD) using index tablespace RXM_IND1
)
/
— Table: CLS PLC Closeout Agreement Places create table CLS_PLC (
CST_CD CHAR (12) not null, — customer code CLS_AGR_CD CHAR(8) not null, — els netting agreement id CLS PLC CD CHAR(6) not null, — place code constraint PK_CLS_PLC primary key (CST_CD, CLS_AGR_CD, CLS PLC CD) using index tablespace RXM_IND1 ) /
— Table: CLS_PRD Closeout Agreement Products create table CLS PRD (
CST_CD CHAR (12) not null, — customer code
CLS_AGR_CD CHAR (8) not null, — els netting agreement id
CLS_PRD_CD CHAR(4) not null, — product code constraint PK_CLS_PRD primary key (CST_CD, CLS_AGR_CD, CLS_PRD_CD) using index tablespace RXM_IND1 )
A dynamic table is updated for each deal included in a uniquely identified closeout netting set to calculate the "mitigating factor" used to generate the credit risk exposure value assigned to the set of netted deals. The mitigating factor is a measure of the reduction in credit risk exposure achieved by the use of the closeout netting technique.
— Table: CLS NET SET Closeout Netting Set create table CLS NET _SET (
CST_CD CHARU2) not null, — customer code
C CLLSS_AAGGRR_CCDD CCHHAARR((88)) not null, -- closeout agreement code agreement with customer
CLS_NET_UNQ_ID CHAR(16) not null, — unique els net set id SUM POS_MTM_VL FLOAT not null, — sum of positive risks for contracts in net set
S SUUMM AALLLL_MMTTMM_VVLL F FLLOOAATT not null, -- sum of all risks for contracts in net set
NGR VL FLOAT not null, — computed multiplier for add-on value constraint PK_CLS_NET_SET primary key (CST_CD , CLS_AGR_CD) using index tablespace RXM IND1
Referring now to Figs. 4 to 13 system display screens are shown to assist in understanding the composition of the tables and the manner in which the modelling engine operates. Editing of a closeout agreement table is shown i Fig. 4. This table includes markers or flags for related tables for currencies (Fig. 5), products (Fig. 6), branches (Fig. 7), and locations (Fig. 8) as described in more detail above. These tables are all dynamic. There are also secondary dynamic tables for groupings or correlations of data such as a grouping of a particular counterparty and a particular agreement.
The screen of Fig. 5 illustrates entry of currency data, Fig. 6 shows entry of codes for netting products, Fig. 7 shows entry of branch codes, and Fig. 8 shows entry of locations.
The primary static table is a master agreement table, editing of which is shown in Fig. 9. Figs. 10 to 13 illustrate related tables as follows:
"Tig. 10: currencies,
Fig. 11: products,
Fig. 12: branches, and
Fig. 13: jurisdiction.
These tables are updated relatively infrequently.
It will be appreciated that the invention provides for comprehensive agreement processing for risk and exposure management. This has been achieved with very fast response times to allow real time operation where workstations are widely spread geographically.
The invention is not limited to the embodiments described, but may be varied in construction and detail within the scope of the claims. For example, the invention may be applied to processing of agreements between counterparties other than close out netting agreements, such as general netting agreements.

Claims

WHAT IS CLAIMED IS:
1. A financial risk and exposure management system (1) comprising;
a database (3) storing tables of netting agreement parameters;
a dealing system interface (2, 4) comprising means for receiving dealing data in real time and for writing said data to a database table; and
a modelling engine (13) comprising means for receiving user inputted attributes for a proposed netting agreement with a counterparty, ancTfor automatically carrying out a series of validity tests according to pre-set rules, said dealing data, and said netting agreement parameters to determine if the proposal is valid.
2. A financial risk and exposure management system as claimed in claim 1, wherein the dealing system interface (2, 4) comprises means for receiving and storing pre-deal limit check, exposure update, and violation alert data.
3. A financial risk and exposure management system as claimed in claims 1 or 2, wherein the modelling engine (13) comprises means for combining received attributes to determine an exposure consolidation key, said key identifying an exposure consolidation category and an associated set of rules for validity tests.
4. A financial risk and exposure management system as claimed in any preceding claim, wherein the database stores dynamic tables which are frequently updated and static tables of infrequently updated data, and said netting agreement tables are dynamic.
5. A financial risk and exposure management system as claimed in claim 4, wherein the static tables comprise a master agreement table of data associated with a static master agreement including data fields identifying allowed dealing product types and indicators for constraints on attributes.
6. A financial risk and exposure management system as claimed in claim 5, wherein the netting agreement tables are related to the master agreement table with an identification code, and the netting agreement tables are partially automatically populated by the master agreement table.
7. A financial risk and exposure management system as claimed in claim 6, wherein the dynamic tables include parent tables, and subsidiary tables correlating groupings of related data for fast data access.
8. A financial risk and exposure management system as claimed in any preceding claim, wherein the modelling engine comprises means for applying a series of validity tests for an agreement for a relevant counterparty located in the dynamic netting tables, and for re-initiating said tests with a fresh agreement if any of said tests fail.
9. A financial risk and exposure management system as claimed in claim 8, wherein each test has an associated data access address embedded in the associated rules, for fast data access.
10. A financial risk and exposure management system as claimed in any preceding claim, wherein the modelling engine comprises means for automatically calculating an exposure value upon determination that a proposal is valid.
11. A financial risk and exposure management system comprising:
a stored set of static tables storing close out netting parameter values which change infrequently,
a stored set of dynamic tables storing close out netting parameter values which change frequently, said dynamic tables being related to said static tables and including data for existing counterparty agreements,
a dealing system interface comprising means for receiving dealing data including violation alerts in real time from remote dealing systems:
a modelling engine comprising:
a user interface comprising means for receiving attributes for a proposal close out netting agreement; means for searching the dynamic tables to locate an existing agreement for a relevant counterparty identified in said received attributes;
means for carrying out a series of validity tests on said attributes to check if they apply to the agreement and are compatible with the dealing data;
means for rejecting said agreement and for locating a further agreement if said first agreement fails a validity test and for repeating said validity tests until all agreements for that counterparty have been exhausted; and
means for automatically calculating an exposure value for the attributes according to an agreement for which the tests are positive.
12. A financial risk and exposure management systeπTas claimed in claim 11, wherein said tests are carried out according to a set of rules retrieved according to an exposure consolidation key identifying an exposure consolidation category having an associated set of rules.
PCT/GB2000/003671 1999-09-23 2000-09-25 A financial risk and exposure management system WO2001022305A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU74367/00A AU7436700A (en) 1999-09-23 2000-09-25 A financial risk and exposure management system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9922589A GB2354608A (en) 1999-09-23 1999-09-23 A financial risk and exposure management system
GB9922589.8 1999-09-23

Publications (2)

Publication Number Publication Date
WO2001022305A2 true WO2001022305A2 (en) 2001-03-29
WO2001022305A8 WO2001022305A8 (en) 2001-12-27

Family

ID=10861506

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2000/003671 WO2001022305A2 (en) 1999-09-23 2000-09-25 A financial risk and exposure management system

Country Status (3)

Country Link
AU (1) AU7436700A (en)
GB (1) GB2354608A (en)
WO (1) WO2001022305A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631047A (en) * 2016-02-17 2016-06-01 中国工商银行股份有限公司 Hierarchically-cascaded data processing method and hierarchically-cascaded data processing system

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7181428B2 (en) 2001-01-30 2007-02-20 Goldman, Sachs & Co. Automated political risk management
US7389265B2 (en) 2001-01-30 2008-06-17 Goldman Sachs & Co. Systems and methods for automated political risk management
US8121937B2 (en) 2001-03-20 2012-02-21 Goldman Sachs & Co. Gaming industry risk management clearinghouse
US7778914B1 (en) * 2002-01-14 2010-08-17 Goldman Sachs & Co. Method and apparatus for agreement netting
US8996481B2 (en) 2004-07-02 2015-03-31 Goldman, Sach & Co. Method, system, apparatus, program code and means for identifying and extracting information
US8510300B2 (en) 2004-07-02 2013-08-13 Goldman, Sachs & Co. Systems and methods for managing information associated with legal, compliance and regulatory risk
US8442953B2 (en) 2004-07-02 2013-05-14 Goldman, Sachs & Co. Method, system, apparatus, program code and means for determining a redundancy of information
US8762191B2 (en) 2004-07-02 2014-06-24 Goldman, Sachs & Co. Systems, methods, apparatus, and schema for storing, managing and retrieving information
US10102578B2 (en) 2014-03-24 2018-10-16 State Street Bank And Trust Company Techniques for automated call cross trade imbalance execution

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1994028496A1 (en) * 1993-05-28 1994-12-08 Ian Kenneth Shepherd Methods and apparatus relating to the formulation and trading of risk management contracts
US5784696A (en) * 1995-02-24 1998-07-21 Melnikoff; Meyer Methods and apparatus for evaluating portfolios based on investment risk

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
No Search *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631047A (en) * 2016-02-17 2016-06-01 中国工商银行股份有限公司 Hierarchically-cascaded data processing method and hierarchically-cascaded data processing system

Also Published As

Publication number Publication date
GB9922589D0 (en) 1999-11-24
GB2354608A (en) 2001-03-28
WO2001022305A8 (en) 2001-12-27
AU7436700A (en) 2001-04-24

Similar Documents

Publication Publication Date Title
US10719842B1 (en) Method and apparatus for performing collective validation of credential information
US11776058B2 (en) Transaction effects
US6959287B2 (en) Method and system for conducting a target audit in a high volume transaction environment
US8306888B2 (en) Table driven accounting method and system
US8032400B2 (en) Method and apparatus for performing assessments
US8825530B2 (en) Tax liability and deductions verification system
US20120330819A1 (en) System and method for locating and accessing account data
US20070136188A1 (en) System and method for managing financial account information
US20200242615A1 (en) First party fraud detection
CA2448663A1 (en) Method and system for verifying the integrity of data in a data warehouse and applying warehoused data to a plurality of predefined analysis models
JP2004500617A (en) System and method for evaluating patents
WO2001022305A2 (en) A financial risk and exposure management system
CN112732812A (en) Personal credit analysis method based on big data portrait
WO2006073551A2 (en) Method of processing investment data and making compensation determinations and associated system
Granados et al. Financial networks and structure of global financial crime
US10235719B2 (en) Centralized GAAP approach for multidimensional accounting to reduce data volume and data reconciliation processing costs
CN114897590A (en) Form checking method and device, computer equipment and storage medium
Bašić Supervisory and statistical granular data modelling at the Croatian National Bank
US20070094120A1 (en) System and method for providing integrated hedge accounting in parallel valuation areas
JP2022103593A (en) Credit management system, credit management method and credit management program
Weber et al. SecPop Version 4: Sector Population Land Fraction and Economic Estimation Program: Users? Guide Model Manual and Verification Report.
CN117151888A (en) Position data processing method for foundation products
CN112598506A (en) Method for determining false mortgage user and related device
KR20090034828A (en) System for maintaining type and/or status information for a party-communication point relationship
Colombo et al. Mercati, infrastrutture, sistemi di pagamento

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AL AU BA BB BG BR CA CN CR CU CZ DM EE GD GE GH GM HR HU ID IL IN IS JP KP KR LC LK LR LT LU LV MA MD MG MK MN MX NO NZ PL RO RU SG SI SK TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: C1

Designated state(s): AE AL AU BA BB BG BR CA CN CR CU CZ DM EE GD GE GH GM HR HU ID IL IN IS JP KP KR LC LK LR LT LU LV MA MD MG MK MN MX NO NZ PL RO RU SG SI SK TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: C1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

D17 Declaration under article 17(2)a
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP