WO2015088894A1 - Secure exchange feed market data embargo - Google Patents
Secure exchange feed market data embargo Download PDFInfo
- Publication number
- WO2015088894A1 WO2015088894A1 PCT/US2014/068710 US2014068710W WO2015088894A1 WO 2015088894 A1 WO2015088894 A1 WO 2015088894A1 US 2014068710 W US2014068710 W US 2014068710W WO 2015088894 A1 WO2015088894 A1 WO 2015088894A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- market
- data
- messages
- financial
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Definitions
- a financial instrument trading system such as a futures exchange, referred to herein also as an "Exchange”, such as the Chicago Mercantile Exchange Inc. (CME), provides a contract market where financial instruments, for example futures and options on futures, are traded. Futures is a term used to designate all contracts for the purchase or sale of financial instruments or physical commodities for future delivery or cash settlement on a commodity futures exchange.
- a futures contract is a legally binding agreement to buy or sell a commodity at a specified price at a predetermined future time.
- An option is the right, but not the obligation, to sell or buy the underlying instrument (in this case, a futures contract) at a specified price within a specified time.
- the commodity to be delivered in fulfillment of the contract is known as the contract's underlying reference or "underlier.”
- the terms and conditions of each futures contract are standardized as to the specification of the contract's underlying reference commodity, the quality of such commodity, quantity, delivery date, and means of contract settlement.
- Cash Settlement is a method of settling a futures contract whereby the parties effect final settlement when the contract expires by paying/receiving the loss/gain related to the contract in cash, rather than by effecting physical sale and purchase of the underlying reference commodity at a price determined by the futures contract, price.
- the Exchange provides for a centralized "clearing house” through which all trades made must be confirmed, matched, and settled each day until offset or delivered.
- the clearing house is an adjunct to the Exchange, and may be an operating division of the Exchange, which is responsible for settling trading accounts, clearing trades, collecting and maintaining performance bond funds, regulating delivery, and reporting trading data.
- the essential role of the clearing house is to mitigate credit risk. Clearing is the procedure through which the Clearing House becomes buyer to each seller of a futures contract, and seller to each buyer, also referred to as a novation, and assumes responsibility for protecting buyers and sellers from financial loss due to breach of contract, by assuring performance on each contract.
- a clearing member is a firm qualified to clear trades through the Clearing House.
- Electronic trading systems in contrast, ideally attempt offer a more efficient, fair and balanced market where market prices reflect a true consensus of the value of traded products among the market participants, where the intentional or unintentional influence of any one market participant is minimized if not eliminated, and where unfair or inequitable advantages with respect to information access are minimized if not eliminated.
- Figure 1 depicts an illustrative computer network system that may be used to implement aspects of the disclosed embodiments.
- Figure 2 depicts a block diagram of a message management module and a message receipt device for use in the system of Figure 1.
- Figure 3 depicts a flow chart for managing the communication of financial messages that may be implemented using the system of Figures 1 and 2.
- Figure 4 shows an illustrative embodiment of a general computer system for use with the system of Figure 1.
- Figure 5 depicts a diagram for managing the communication of market data with financial messages.
- Figure 6 depicts a message receipt device or system for use with the
- Figure 7 depicts a flow chart for the communication of financial messages that may be implemented using the system of Figures 1 and 6.
- Figure 8 depicts a flow chart for managing the communication of financial messages that may be implemented using the system of Figures 1 and 2.
- Figure 9 depicts a flow chart for the communication of financial messages that may be implemented using the system of Figures 1 and 6.
- Figure 10 depicts a diagram for managing the communication of market data with financial messages.
- the separation of private market data message generation and transmission from the generation and transmission of corresponding public market data messages may result in a situation where private data is communicated before, or the transmission thereof otherwise overtakes the transmission of, corresponding public data, thus potentially providing market information to the recipient of the private data prior to other market participants.
- This prior reception of market information may be an undesirable occurrence due to possible market information imbalances for market participants.
- the disclosed embodiments relate to communication of financial messages from an Exchange, such as the Chicago Mercantile Exchange ("CME”), to market participants whereby messages directed to particular market participants may be wholly or in part encoded, disguised, or otherwise obfuscated such that private market data contained in the messages is not recognizable by the particular market participant.
- CME Chicago Mercantile Exchange
- the obfuscation of the private market data may be designed such that data needed to remove the disguise or otherwise de-obfuscate the data is provided in another message directed to all market participants which may further contain data related to the private market data but intended for public dissemination.
- the particular market participant may receive the data needed to de-obfuscate the private market data from the message directed to all market participants, thus ensuring that the obfuscated private market data cannot be understood by the particular market participant until the message directed to all market participants is received. In this way, the advantage of the particular market participant due to receiving messages with private market data prior to other market participants receiving
- the message may be sized such that multiple packets may be needed to relay all of the information.
- market participants finding data relating to their particular activities, or other activities of interest, in earlier received packets may attempt to leverage the earlier received information to develop an advantage in the marketplace.
- the market data specific to particular market participants may be integrated into public messages with obfuscated content communicated on a public feed.
- the data needed to de-obfuscate the public messages may be communicated with a subsequent message to all market participants such that all market participants will be sent the de-obfuscation data at the same time.
- the timing of the release of the obfuscated data to all the market participants may be controlled based on the transmission of the message with the de-obfuscation data. In this way, the advantage of a particular market participant having received market data via earlier sent messages may be mitigated or removed.
- the public messages may be multiple components of a singular message containing summary data relating to market activity of particular market participants over a period of time.
- the de-obfuscation data may be included with one of the message components, and the timing of the release of the obfuscated data of the message as a whole may be controlled based on the transmission of the message component having the de-obfuscation data.
- the disclosed embodiments may be discussed in relation to futures and/or options on futures trading, it will be appreciated that the disclosed embodiments may be applicable to any equity, options or futures trading system or market now available or later developed.
- a trading environment such as a futures exchange as described herein, implements one or more economic markets where rights and obligations may be traded.
- a trading environment may be characterized by a need to maintain market integrity, transparency, predictability, fair/equitable access and participant expectations with respect thereto.
- an exchange must respond to inputs, such as trader orders, cancellation, etc., in a manner as expected by the market participants, such as based on market data, e.g. prices, available counter-orders, etc., to provide an expected level of certainty that transactions will occur in a consistent and predictable manner and without unknown or unascertainable risks.
- the disclosed embodiments may further include functionality to ensure that the expectations of market participant are met, e.g. that transactional integrity and predictable system responses are maintained.
- the outbound responses to incoming orders and requests are typically communicated via a medium, e.g. a channel or connection, referred to as a "feed,” that is separate from the market information feed which is generally broadcast to all of the market participants.
- a medium e.g. a channel or connection, referred to as a "feed”
- This generally prevents any one market participant from monitoring the specific trading activities of another market participant and prevents, for example, any one participant from influencing other market participants and/or deriving and/or undermining another participant's trading strategy and thereby garnering an unfair advantage or otherwise allowing them to skew or influence the market.
- the disclosed embodiments recognize, however, that the market data messages, e.g. order book updates, are typically responsive to incoming messages from market participants, e.g.
- a given market data message broadcast to all market participants in response to an incoming request message may be duplicative of a response message sent specifically to the sender of that request message who is also receiving the broadcasted market data message.
- a market participant submitting a request such as a new trade order, order modification, or order cancellation, which impacts the market, e.g. causes a change in price of one or more traded products, may receive confirmation of the processing of their request before the remaining market participants learn of the impact via an update to the market data.
- This discrepancy which may be on the scale of milliseconds, microseconds, or even nanoseconds, may allow the submitting market participant to unfairly take advantage of the market impact, such as by submitting additional orders, etc., before the remaining market participants can react.
- Solutions to the inefficiencies and inequities described above include generally reducing the requisite bandwidth of the communications, such as via encoding or compression mechanisms, and introducing mechanisms, such as buffers, to align, equalize or otherwise normalize the latencies of the separate communications paths.
- bandwidth required for each of the feeds attempts to address inefficiency, such reductions are system and hardware dependent in their effectiveness.
- attempts to achieve parity in terms of latency between two different data feeds publishing the same data has generally been a "best effort" solution. That is, while inherent latencies may be accounted for, it is difficult, for example, to account for transient events, such as errors or interference, which may introduce additional and likely substantially random latencies.
- regulators are motivated to seek parity between those latencies, whereas market participants seeking a trading advantage are motivated by a timing advantage in order entry timing relative to market data.
- the discrepancies lead market participants to attempt to game the market and regulators to impose onerous regulations in a counter-attempt thereto.
- a financial message refers both to messages communicated by market participants to an electronic trading system and vice versa.
- Financial messages communicated to the electronic trading system also referred to as "inbound" messages, may include request messages, such as trader orders, order modifications, order cancellations and the like, as well as other message types.
- request messages such as trader orders, order modifications, order cancellations and the like, as well as other message types.
- outbound messages may include messages responsive to inbound messages, such as confirmation messages, or other messages such as market update messages, quote messages, and the like.
- Financial messages may further be categorized as having or reflecting an impact on a market, also referred to as an "order book" or "book,” for a traded product, such as a prevailing price therefore, etc., or not having or reflecting an impact on a market or a subset or portion thereof.
- a request to place a trade may result in a response indicative of the trade either being matched with, or being rested on an order book to await a suitable counter-order.
- requests may elicit a non- impacting response, such as confirmatory response issued temporally proximate to the receipt of the request and then cause a separate market-impact reflecting response at a later time.
- a stop order, fill or kill order, aka an immediate or cancel order, or other conditional request may not have an immediate market impacting effect, if at all, until the requisite conditions are met. Accordingly, an acknowledgement or confirmation of receipt, e.g. a non-market impacting communication, may be sent to the trader simply confirming that the order was received.
- a market-impacting message may be transmitted as described herein. It will be appreciated that additional conditions may be specified, such as a time or price limit, which may cause the order to be dropped or otherwise canceled and that such an event may result in another non-market-impacting communication instead.
- market impacting communications may be
- non-market impacting communications such as via a separate communications channel or feed.
- various types of market data feeds may be provided which reflect different market or aspects thereof. Market participants may then, for example, subscribe to receive those feeds of interest to them. For example, a particular market data feed may only communicate information related to the top buy/sell prices for a particular product, referred to as "top of book" feed. In this case, a request message may be considered market-impacting only if it affects the top buy/sell prices and otherwise is considered non-market-impacting. As market impacting communications tend to be more important to market participants then non impacting communications, this separation may reduce congestion and or noise among those communications having or reflecting an impact on a market or portion thereof.
- the disclosed embodiments relate to obfuscating the market data having a market impact reflecting response messages, e.g. responsive to inbound messages, with other market impact reflecting messages as will be described.
- Market data feeds may further be characterized as providing a "view" or "overview" of a given market, an aggregation or a portion thereof.
- a market data feed may convey the entire state of a market for a particular product, e.g. all presently resting buy/sell orders and prices associated therewith as well as trade notifications, etc., only a portion of a market, e.g. only the top 10 resting buy/sell orders, and/or an aggregation of multiple markets or portions thereof.
- a market impacting request may be said to impact the "view" of the market as presented via the market data feed.
- Various types of market data feeds may be provided by electronic trading systems, such as the CME, in order to provide different types or subsets of market information or to provide such information in different formats. Examples include Market By Order, Market Depth (aka Market by Price to a designated depth of the book), e.g. CME offers a 10-deep market by price feed, Top of Book (a single depth Market by Price feed), and combinations thereof. There may also be all manner of specialized feeds in terms of the content, i.e. providing, for example, derived data, such as a calculated index).
- the disclosed embodiments create a practical impediment to consuming market information contained in messages sent only to particular market participants.
- This impediment is based on an obfuscation, or lock, of the market information, and the inability of the particular market participant to remove obfuscation without a corresponding key that is delivered in a public message delivered to all market participants. While the degree to which the obfuscation is defeatable without the corresponding key may vary, in one embodiment the obfuscation need only be sufficient so as to delay any attempts to defeat the obfuscation without the corresponding key for enough time to ensure that other market participants will have the public information before the recipient can defeat the obfuscation.
- any latencies that exist in the system that would cause a private message, or prior transmitted public message, to arrive at a particular market participant before a public message containing key data arrives at all of the market participants would be mitigated by the inability of the particular market participant to consume, use, or understand the market data of the private message, or prior transmitted public message, upon receipt.
- the private market data will be held in a knowledge embargo until the public message containing key data allows for removal thereof.
- obfuscation may be provided through encryption techniques.
- the market data intended to be disguised may be obfuscated through the use of an encryption algorithm such that the content of the data is
- the key data, or encryption key may be provided separately to control access to the obfuscated, or encrypted, data.
- the encryption key may be provided with, or as a part of, a public message transmitted by an exchange to participants of a market. A particular market participant that receives the public message may use the encryption key to un- encrypt, or decode, a previously received private or public message having market data encrypted by an algorithm designed to be decoded by the encryption key.
- private messages with encrypted data will have a particular corresponding encryption key to decode the encrypted data.
- a particular market participant may determine which public message contains the corresponding encryption key based on an identifier or other correlating indicium that is transmitted with a private message, but not obfuscated.
- the identifier may identify, or indicate, the public message that contains the corresponding key.
- the identifier may be a number, and the number matches a number provided with the public message that contains the corresponding key. It will be appreciated that there may be other ways in which the private data message may be correlated with the public data message comprising the key data therefore, and all such methods are contemplated herein.
- unique encryption keys i.e.
- dummy or decoy unique keys may be included with outbound public messages so as to further normalize the format and/or appearance of public messages. In this way, all messages may be presented with a similar appearance to the market participants, and it may be more difficult to infer market information from the mere existence of an encryption key in a public message.
- multiple encryption keys, dummy keys, or combinations thereof may be provided with a public message. For example, multiple encryption keys may be included with a public message that discloses information reflected in multiple private messages. Multiple dummy keys may then be required to normalize the appearance of public messages that do not have multiple encryption keys included. Also, random numbers of dummy keys may be generated and included with messages to further obscure the existence or intent of the actual encryption keys.
- embodiments are preferably implemented with computer devices and computer networks, such as those described with respect Figure 4, that allow users, e.g. market participants, to exchange trading information.
- users e.g. market participants
- the plurality of entities utilizing the disclosed embodiments may be referred to by other nomenclature reflecting the role that the particular entity is performing with respect to the disclosed embodiments and that a given entity may perform more than one role depending upon the implementation and the nature of the particular transaction being undertaken, as well as the entity's contractual and/or legal relationship with another market participant and/or the exchange.
- FIG. 5 A diagram for managing the communication of market data over networks 532 and 534 to a plurality of market participants 550 and 540 with financial messages 510 and 530 is shown in Figure 5.
- a particular market participant 540 may place an order with an exchange 505 using a network 532.
- the exchange 505 may respond to the order by sending a private message 510 over the private circuit network 532 to the particular market participant 540.
- the private message 510 is locked or obfuscated in a manner that does not allow the particular market participant 540 to know the content of the private message 510.
- the exchange 505 may also generate a public message 520 and send it using a multicast circuit network 534.
- the multicast circuit network 534 may be considered a public network.
- the multicast circuit network 534 may be a collection of private circuit networks for a plurality of market participants 540.
- a key designed to unlock the content of the private message 510 may be included with the public message 520.
- both the particular market participant 540 and the other market participants 550 may receive the public message 520. The particular market participant will then be able to use the key in the public message 520 to unlock the content of the private message 510.
- FIG. 10 a diagram for managing the communication of market data over a network 955 to a plurality of market participants 950 with financial messages 960, 965 is shown in Figure 10.
- the Exchange 970 may communicate market data to market participants 950 using financial messages 960, 961 , 962, 963, 965 intended for each of the market participants 950 over a multicast circuit network 955.
- a group of the financial messages 960, 961 , 962, 963 may be obfuscated.
- Another financial message 965 may contain a key that may be used to un-obfuscate the group of obfuscated financial messages 960, 961 , 962, 963.
- the market participants 950 Upon receipt of the market message 965 having the key, the market participants 950 will be able to use the key to un-obfuscate the group of obfuscated financial messages 960, 961 , 962, 963. In this way, the Exchange may be able to control the timing of the release of the obfuscated content of the group of obfuscated financial messages 960, 961 , 962, 963 through the transmission of the keyed message 965.
- all the financial messages 960, 961 , 962, 963, 965 may be considered a set of messages, with the group of obfuscated financial messages 960, 961 , 962, 963 considered a subset of the set.
- all the financial messages 960, 961 , 962, 963, 965 may be components of a larger message that has been sectioned into multiple messages sized appropriately for transmission using the network 955. Also, all the financial messages 960, 961 , 962, 963, 965 may be sent using a common feed for all the market participants 950.
- FIG. 1 An exemplary trading network environment for implementing trading systems and methods is shown in Figure 1.
- An exchange computer system 100 receives orders and transmits market data related to orders and trades to users, such as via wide area network 126 and/or local area network 124 and computer devices 1 14, 1 16, 1 18, 120 and 122, as will be described below, coupled with the exchange computer system 100.
- the phrase "coupled with” is defined to mean directly connected to or indirectly connected through one or more intermediate components. Such intermediate components may include both hardware and software based components. Further, to clarify the use in the pending claims and to hereby provide notice to the public, the phrases "at least one of ⁇ A>, ⁇ B>, ...
- ⁇ N> or "at least one of ⁇ A>, ⁇ B>, ... ⁇ N>, or combinations thereof are defined by the Applicant in the broadest sense, superseding any other implied definitions herebefore or hereinafter unless expressly asserted by the Applicant to the contrary, to mean one or more elements selected from the group comprising A, B, ... and N, that is to say, any combination of one or more of the elements A, B, ... or N including any one element alone or in combination with one or more of the other elements which may also include, in combination, additional elements not listed.
- the exchange computer system 100 may be implemented with one or more mainframe, desktop or other computers, such as the computer 400 described below with respect to Figure 4.
- a user database 102 may be provided which includes information identifying traders and other users of exchange computer system 100, such as account numbers or identifiers, user names and passwords.
- An account data module 104 may be provided which may process account information that may be used during trades.
- a match engine module 106 may be included to match bid and offer prices and may be implemented with software that executes one or more algorithms for matching bids and offers.
- a trade database 108 may be included to store information identifying trades and descriptions of trades. In particular, a trade database may store information identifying the time that a trade took place and the contract price.
- An order book module 1 10 may be included to compute or otherwise determine current bid and offer prices.
- a market data module 1 12 may be included to collect market data and prepare the data for transmission to users.
- a risk management module 134 may be included to compute and determine a user's risk utilization in relation to the user's defined risk thresholds.
- An order processing module 136 may be included to decompose delta based and bulk order types for processing by the order book module 1 10 and/or match engine module 106.
- a message management module 140 may be included to, among other things, control the rate of acceptance of mass quote messages in accordance with one or more aspects of the disclosed embodiments.
- concurrent processing limits may be defined by or imposed separately or in combination, as was described above, on one or more of the trading system components, including the user database 102, the account data module 104, the match engine module 106, the trade database 108, the order book module 1 10, the market data module 1 12, the risk management module 134, the order processing module 136, or other component of the exchange computer system 100.
- the message management module 140 may include a message generator configured to generate a first message with at least a portion of the first message obfuscated such that the obfuscated portion of the first message is incomprehensible without associated key data configured to make the obfuscated portion comprehensible, and generate the second message comprising the associated key data.
- the message management module 140 may also involve a message transmitter configured to transmit the first message to a first market participant and the second message to a plurality of market participants.
- the message management module 140 may be configured for generating for managing communication of a set of financial messages to a plurality of market participants via a network, the set of financial messages including market data intended to be received and comprehended by all of the plurality of market participants.
- the message management module 140 may include a message generator configured to generate a subset of the set of financial messages with at least a portion of the market data of the subset of the financial messages obfuscated such that the obfuscated content of the subset is incomprehensible to the plurality of market participants without associated key data configured to render the obfuscated data comprehensible thereto, and generate a message of the set of financial messages augmented with the associated key data.
- the message management module 140 may include a message transmitter configured to transmit the obfuscated subset and the augmented message to the plurality of market participants, the augmented message transmitted subsequent to the subset of the financial messages
- the trading network environment shown in Figure 1 includes exemplary computer devices 1 14, 1 16, 1 18, 120 and 122 which depict different exemplary methods or media by which a computer device may be coupled with the exchange computer system 100 or by which a user may communicate, e.g. send and receive, trade or other information therewith.
- exemplary computer devices 1 14, 1 16, 1 18, 120 and 122 depict different exemplary methods or media by which a computer device may be coupled with the exchange computer system 100 or by which a user may communicate, e.g. send and receive, trade or other information therewith.
- the types of computer devices deployed by traders and the methods and media by which they communicate with the exchange computer system 100 is implementation dependent and may vary and that not all of the depicted computer devices and/or means/media of communication may be used and that other computer devices and/or means/media of communications, now available or later developed may be used.
- Each computer device which may comprise a computer 400 described in more detail below with respect to Figure 4, may include a central processor that controls the overall operation of the computer and a system bus that connects the central processor to one or more conventional components, such as a network card or modem.
- Each computer device may also include a variety of interface units and drives for reading and writing data or files and communicating with other computer devices and with the exchange computer system 100.
- a user can interact with the computer with a keyboard, pointing device, microphone, pen device or other input device now available or later developed.
- An exemplary computer device 1 14 is shown directly connected to exchange computer system 100, such as via a Tl line, a common local area network (LAN) or other wired and/or wireless medium for connecting computer devices, such as the network 420 shown in Figure 4 and described below with respect thereto.
- the exemplary computer device 1 14 is further shown connected to a radio 132.
- the user of radio 132 which may include a cellular telephone, smart phone, or other wireless proprietary and/or nonproprietary device, may be a trader or exchange employee.
- the radio user may transmit orders or other information to the exemplary computer device 1 14 or a user thereof.
- the user of the exemplary computer device 1 14, or the exemplary computer device 1 14 alone and/or autonomously, may then transmit the trade or other information to the exchange computer system 100.
- Exemplary computer devices 1 16 and 1 18 are coupled with a local area network ("LAN") 124 which may be configured in one or more of the well-known LAN topologies, e.g. star, daisy chain, etc., and may use a variety of different protocols, such as Ethernet, TCP/IP, etc.
- LAN local area network
- the exemplary computer devices 1 16 and 1 18 may
- an exemplary wireless personal digital assistant device (“PDA") 122 such as a mobile telephone, tablet based compute device, or other wireless device, may communicate with the LAN 124 and/or the Internet 126 via radio waves, such as via WiFi, Bluetooth and/or a cellular telephone based data communications protocol. PDA 122 may also communicate with exchange computer system 100 via a conventional wireless hub 128.
- PDA personal digital assistant device
- Figure 1 also shows the LAN 124 coupled with a wide area network (“WAN") 126 which may be comprised of one or more public or private wired or wireless networks.
- the WAN 126 includes the Internet 126.
- the LAN 124 may include a router to connect LAN 124 to the Internet 126.
- Exemplary computer device 120 is shown coupled directly to the Internet 126, such as via a modem, DSL line, satellite dish or any other device for connecting a computer device to the Internet 126 via a service provider therefore as is known.
- LAN 124 and/or WAN 126 may be the same as the network 420 shown in Figure 4 and described below with respect thereto.
- the users of the exchange computer system 100 may include one or more market makers 130 which may maintain a market by providing constant bid and offer prices for a derivative or security to the exchange computer system 100, such as via one of the exemplary computer devices depicted.
- the exchange computer system 100 may also exchange information with other trade engines, such as trade engine 138.
- trade engine 138 One skilled in the art will appreciate that numerous additional computers and systems may be coupled to exchange computer system 100. Such computers and systems may include clearing, regulatory and fee systems.
- the operations of computer devices and systems shown in Figure 1 may be controlled by computer-executable instructions stored on a non-transitory computer- readable medium.
- the exemplary computer device 1 16 may include computer-executable instructions for receiving order information from a user and transmitting that order information to exchange computer system 100.
- the exemplary computer device 1 18 may include computer-executable instructions for receiving market data from exchange computer system 100 and displaying that information to a user.
- the Exchange computer system 100 further includes a message management module 140 which may implement, in conjunction with the market data module 1 12, the disclosed mechanisms for managing market messages containing financial data sent between an exchange and a plurality of market participants.
- the disclosed mechanisms may be implemented at any logical and/or physical point(s) through which the relevant message traffic, and responses thereto, flows or is otherwise accessible, including one or more gateway devices, modems, the computers or terminals of one or more traders, etc.
- Figure 2 depicts a block diagram of a message management module 140 according to one embodiment, which in an exemplary implementation, is implemented as part of the exchange computer system 100 described above.
- the embodiments described herein utilize trade related messages such as mass quote messages, individual order messages, cancellation messages, etc.
- the trading entity may have one or multiple trading terminals associated with the session.
- the financial instruments may be financial derivative products.
- Derivative products may include futures contracts, options on futures contracts, futures contracts that are functions of or related to other futures contracts, swaps, swaptions, or other financial instruments that have their price related to or derived from an underlying product, security, commodity, equity, index, or interest rate product.
- the orders are for options contracts that belong to a common option class. Orders may also be for baskets, quadrants, other combinations of financial instruments, etc.
- the option contracts may have a plurality of strike prices and/or comprise put and call contracts.
- a mass quote message may be received at an exchange.
- an exchange 100 includes a place or system that receives and/or executes orders.
- Figure 2 shows a system 200 for management of communication of a plurality of financial messages to a plurality of market participants via a network 214 which, as described above, may be the network 420 described below or network 124 or 126 described above, which may be implemented as a consolidated feed module 140 as described above.
- the plurality of messages may include a first financial message including data intended to be received and comprehended by a first market participant of a plurality of market participants, and a second financial message corresponding to the first financial message, and including data intended for all of the plurality of market participants.
- the plurality of messages may also include multiple messages, all of which are intended for the plurality of market participants.
- the disclosed embodiments may be applicable to other types of messages depending upon the implementation.
- the messages may comprise one or more data packets, datagrams or other collection of data formatted, arranged configured and/or packaged in a particular one or more protocols, e.g. the FIX protocol, TCP/IP, Ethernet, etc., suitable for transmission via a network 214 as was described, such as the message format and/or protocols described in U.S. Patent No. 7,831 ,491 and U.S. Patent Publication No. 2005/0096999 Al , both of which are incorporated by reference herein in their entirety.
- the disclosed message management system may be implemented using an open message standard
- the system 200 includes a processor 202 and a memory 204 coupled therewith which may be implemented as processor 402 and memory 404 as described below with respect to Figure 4.
- the system 200 further includes first logic 206 stored in the memory 204 and executable by the processor 202 to cause the processor 202 to obfuscate at least a portion of a first financial message such that the obfuscated portion of the first financial message is incomprehensible to the first market participant without associated key data configured to make the obfuscated portion comprehensible to the first market participant.
- the system 200 also includes a second logic 212 stored in the memory 204 and executable by the processor 202 to generate a second financial message comprising the associated key data.
- the second logic 212 may be configured to augment an existing second message with the associated key data.
- the system 200 further includes a third logic 208 stored in the memory 204 and executable by the processor 202 to cause the processor 202 to transmit, via the network 214, the obfuscated first financial message to a first market participant.
- the system 200 additionally includes a fourth logic 208 stored in the memory 204 and executable by the processor 202 to cause the processor 202 to transmit, via the network 214, the second financial message to a plurality of market participants.
- the first financial message may be in response to a trade order, trade modification, trade cancellation, or combination thereof and comprise a confirmation message, update message, rejection message, or combination thereof.
- the first financial message may be generated by the system 200 in response to a previous message submitted by the first market participant.
- the first logic 206 may be executable by the processor 202 to obfuscate at least a portion of the first financial message by transforming readable plain text into unreadable ciphertext using an encryption algorithm.
- the encryption algorithm may be a symmetric key algorithm, asymmetric algorithm, or any encryption algorithm configured to sufficiently obfuscate the portion of the first financial message such that a brute force deciphering attempt would take at least a length of time determined to be the delay between a receipt of a first financial message by a particular market participant and a receipt of a second financial message by at least one market participant of a plurality of the market participants.
- the first logic 206 may be further executable to generate key data in the form of an encryption cypher configured to make an obfuscated portion of a first message comprehensible to a first market participant.
- the second logic 212 may be further executable to generate the key data.
- the second logic 212 may also be executable to include an identifier with key data. The identifier may indicate an association between a first financial message having an obfuscated portion and key data configured to decode, or make understandable, the obfuscated portion.
- the second logic 212 may be further executable by the processor 202 to augment a second financial message with identification data
- the identification data may be an identification number that matches a number included in an un-obfuscated, or comprehensible, portion of the first message.
- the identification data may be recognizable by a first market participant to associate the decode key in the second financial message with a first financial message received by the first market participant.
- the identification data may be an identification number that matches a number included in an un-obfuscated, or comprehensible, portion of the first message.
- the identification data may be recognizable
- the second logic 212 is further executable by the processor 202 to augment a financial message with data indicating key data associated with multiple messages.
- data indicating key data associated with multiple messages For example, dummy keys, or key data not operational to decode specific data, may be included in a financial message. Dummy keys may be used to indicate the appearance of normality for financial messages that do not include key data. Also, if in an embodiment multiple sets of key data are included in a financial message to decode multiple portions of multiple messages, including multiple dummy keys such that a standard number of keys, or amount of key data, is maintained, may provide a normal appearance to a market participant.
- system 200 may include a fifth logic executable by the processor 202 to generate a third message having a dummy key not functional to decode any message or portions of any message.
- a third message would be a public financial message, intended for receipt by a plurality of market participants. This may be an additional technique to maintain a common appearance for all public messages of a messaging system.
- the first logic 206 may be executable by the processor 202 to cause the system 200 to obfuscate at least a portion of market data of a subset of financial messages such that obfuscated content of the subset is incomprehensible to the plurality of market participants without associated key data configured to render the obfuscated data comprehensible thereto.
- the second logic 212 may be executable by the processor 202 to cause the system 200 to augment a message of the set of financial messages with the associated key data.
- the third logic 208 may be executable by the processor 200 to cause the system 200 to transmit, via the network 214, the obfuscated subset and the augmented message to the plurality of market participants, the augmented message transmitted subsequent to the subset of the financial messages.
- Figure 6 shows a message receipt device 250, which may be implemented as a computer device 1 14, 1 16, 1 18, 120, or 122 of figure 1.
- the message receipt device 250 includes a processor 222 and a memory 224 coupled therewith which may be
- the message receipt device 250 further includes a first logic 226 stored in the memory 224 and configured to be executed by the processor 222 to cause the processor 222 to receive a first message that includes market data, at least a portion of which is obfuscated such that it is indecipherable without an associated key, or key data, configured to decipher the first message.
- the first logic 226 may be configured to cause the processor 222 to retrieve the first message from the system 200 using the network 214.
- the message receipt device 250 also includes a second logic 228 stored in the memory 224 and configured to be executed by the processor 222 to cause the processor 222 to retrieve a second message transmitted to a plurality of market participants by the system 200 via the network 214.
- the second message comprising market data and the associated key, or key data, configured to decipher the obfuscated market data of the first message.
- the message receipt device 250 also includes a third logic 230 stored in the memory 224 and configured to be executed by the processor 222 to cause the processor 222 to decipher the obfuscated market data of the first message using the associated key, or key data.
- message receipt device 250 includes a first logic 226 stored in the memory 224 and configured to be executed by the processor 222 to cause the processor 222 to receive a set of messages that include market data.
- the set may include a subset of messages, at least a portion of which have data obfuscated such that it is indecipherable without an associated key, or key data, configured to decipher the obfuscated message.
- the message receipt device 250 may also include a second logic 228 executable by the processor 222 to cause the system 214 to receive a message of the set of messages augmented with the key data, the augmented message having been sent subsequent to the subset of message.
- the message receipt device 250 may also include a third logic 230 executable by the processor 222 to cause the system 214 to decode the obfuscated data of the subset of message using the key data.
- Figure 3 depicts a flow chart showing operation of the system 200 of Figure 2.
- Figure 3 shows a computer implemented method for managing
- the plurality of financial messages includes a first financial message.
- the first financial message includes first market data intended to be received and comprehended by a first market participant of the plurality of market participants.
- the plurality of financial messages also includes a second financial message,
- the operation includes obfuscating at least a portion of a first message (Block 310), augmenting a second message with key data (Block 320), transmitting the first message (Block 330), and transmitting the second message (Block 340).
- the first financial message and the second financial message are considered a message pair and are generated in response to the same market activity.
- the first financial message may be an order confirmation sent to the first market participant
- the second financial message may be a market price adjustment of an underlying good or object as a result of the order.
- An embodiment involves obfuscating (Block 310), by the processor 202, at least a portion of the first market data of the first financial message such that the obfuscated portion of the first market data is incomprehensible to the first market participant without associated key data configured to render the obfuscated data comprehensible to the first market participant.
- the first financial message may be a confirmation message, update message, rejection message, or combination thereof.
- the obfuscating may be by any method operational to obscure the understanding of the portion of the first market data.
- the obfuscating (Block 310) involves transforming readable plain text into unreadable ciphertext using an encryption algorithm.
- the associated key data may include an encryption cypher sized to resist a brute force deciphering attempt for a length of time determined to be the delay between a receipt of the first financial message and receipt of the second financial message by the particular first market participant.
- Obfuscating may involve any process or method that renders data incomprehensible to humans and machines without the application of the associated key data.
- all of the first financial message may be obfuscated.
- all of any market data included in the first message may be obfuscated, and other data included in the first market message may be comprehensible.
- all the market data of a financial message may be obfuscated, but a portion of the message indicating identification data for a second financial message is not obfuscated.
- the first financial message may include a comprehensible identifier and obfuscated market data. The identifier may identify the second market message having key data configured to un-obfuscate, or make comprehensible, the first financial message market data.
- the identifier in the first message may match an identifier in the second message.
- the identifier in the first financial message may correspond to data in a second financial message, but not match the data in the second financial message.
- the first message identifier may indicate a category and/or classification directing the first market participant to the corresponding second financial message. For example, if market message feeds are assigned a color, the first financial message identifier may indicate the color and an individual message sequence number for the feed. In such an embodiment, the first message identifier may read "RED002341" thus indicating that message number 002341 of the "RED" feed is the corresponding second financial message containing the associated key data.
- the first financial message may be responsive to a message previously received from the first market participant.
- the first market participant may have submitted an order
- the first financial message may be an order confirmation to confirm that the order has been placed.
- the data of the first market message indicating what order is being confirmed may be obfuscated.
- all substantive market data may be obfuscated.
- the market data indicating the type of message, i.e. order confirmation, the corresponding order, the underlying object of the order, the volume of the order, and any other information that may indicate a potential effect to the market is obfuscated.
- only selected types of market data are obfuscated.
- only the underlying object and volume of the order may be obfuscated.
- An embodiment involves augmenting (Block 320), by the processor 202, the second financial message corresponding to the first financial message, with the associated key data.
- the key data may be an encryption cypher operable to decipher market data or messages encrypted with a corresponding encryption algorithm.
- augmenting, by the processor 202, the second financial message further involves augmenting the second financial message to include
- identification data linking the associated key data in the second financial message with the first financial message may be augmented with an identifier that matches an identifier of the first financial message.
- the second financial message may be augmented with data indicating the existence of a plurality of keys, or associated key data for multiple financial messages.
- a public message in this embodiment a second message, may involve market data related to multiple private messages, one of which may be the first message.
- the public message may include, or be augmented with, multiple keys configured to provide key data associated with the obfuscated private messages.
- the second financial message may also be augmented with dummy keys, or data resembling key data but not configured to render obfuscated data comprehensible.
- Dummy keys may be used to normalize the appearance of the second financial message in an embodiment involving multiple key augmentation.
- a third financial message that may not have a corresponding private message, or may not otherwise contain key data, may be augmented with a dummy key, or dummy key data.
- the third message may also be transmitted to a plurality of market participants.
- An embodiment involves transmitting (Block 330), by the processor 202 via the network 214, the obfuscated first financial message to the first market participant.
- An embodiment involves transmitting (Block 340), by the processor 202 via the network 214, the second financial message to the plurality of market participants.
- Figure 8 depicts a flow chart showing another operation of the system 200 of Figure 2.
- Figure 8 shows a computer implemented method for managing communication of a set of financial messages to a plurality of market participants via a network 214, the set of financial messages including market data intended to be received and comprehended by all of the plurality of market participants.
- the operation includes obfuscating at least a portion of the content of a subset of the set of financial messages (Block 910), augmenting a message of the set of financial messages with key data (Block 920), transmitting the subset of messages and the augmented message to the plurality of market participants (Block 830), and transmitting of the augmented message occurring subsequent to the transmitting of the subset of messages.
- all of the market data of the subset of messages is obfuscated, and the key data augmented into the other message of the set of messages is configured to remove the obfuscation of all the obfuscated data in the subset of messages.
- augmenting a message with associated key data may involve including or augmenting the associated key data into the header of the message.
- the augmented message may contain market data. Also, in an embodiment, at least a portion of the market data contained by the augmented message may be obfuscated.
- a set of messages may be a group of messages sharing a theme or similar content.
- the similar content may involve market data relating to the market activity of specific market participants of a plurality of market participants over a period of time.
- This type of group of messages may be considered a singular summary message.
- a summary message may contain a significant amount of information relating to market activity.
- TCP Transmission Control Protocol
- UDP User Datagram Protocol
- the amount of information that would be sent with the summary message would require multiple packets, datagrams, or messages to be sent as a singular communication.
- the multiple packets or datagrams of the communication may be considered a set of messages.
- Figure 7 depicts a flow chart showing operation of the message receipt device 250 of Figure 6.
- the operation may include receiving the first message (Block 350), receiving the second message (Block 360), and removing the obfuscation of data in the first message with key data contained in the second message (Block 370).
- An embodiment involves receiving (Block 350) the first financial message from system 200 using the network 214.
- the first financial message comprising market data, at least a portion of which is obfuscated such that the obfuscated portion of the first market data is incomprehensible without associated key data configured to decode, or render comprehensible, the obfuscated data.
- An embodiment involves retrieving (Block 360) the second message transmitted to a plurality of market participants the first financial message from system 200 using the network 214.
- the second message comprising the associated key data configured to decode, or render comprehensible, the obfuscated market data of first message.
- An embodiment involves removing (Block 370) the obfuscation of the obfuscated market data of the first financial message using the key data from the second financial message. Removing the obfuscation may involve decoding, deciphering, un- encrypting, or any other method of rendering the obfuscated market data comprehensible.
- Figure 9 depicts a flow chart showing another operation of the message receipt device 250 of Figure 6.
- the operation may include receiving a subset of a set of messages (Block 950) that has obfuscated content, receiving another message of the set of messages (Block 960) that has been augmented with key data configured to remove the obfuscation of the subset of messages, and removing the obfuscation of data in the subset of messages with key data contained in the augmented message (Block 970).
- the computer system 400 can include a set of instructions that can be executed to cause the computer system 400 to perform any one or more of the methods or computer based functions disclosed herein.
- the computer system 400 may operate as a standalone device or may be connected, e.g., using a network, to other computer systems or peripheral devices. Any of the components discussed above, such as the processor 202, may be a computer system 400 or a component in the computer system 400.
- the computer system 400 may implement a match engine, margin processing, payment or clearing function on behalf of an exchange, such as the Chicago Mercantile Exchange, of which the disclosed embodiments are a component thereof.
- the computer system 400 may operate in the capacity of a server or as a client user computer in a client-server user network environment, or as a peer computer system in a peer-to-peer (or distributed) network environment.
- the computer system 400 can also be implemented as or incorporated into various devices, such as a personal computer (PC), a tablet PC, a set-top box (STB), a personal digital assistant (PDA), a mobile device, a palmtop computer, a laptop computer, a desktop computer, a communications device, a wireless telephone, a land-line telephone, a control system, a camera, a scanner, a facsimile machine, a printer, a pager, a personal trusted device, a web appliance, a network router, switch or bridge, or any other machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
- PC personal computer
- PDA personal digital assistant
- the computer system 400 can be implemented using electronic devices that provide voice, video or data communication.
- the term "system” shall also be taken to include any collection of systems or sub-systems that individually or jointly execute a set, or multiple sets, of instructions to perform one or more computer functions.
- the computer system 400 may include a processor 402, e.g., a central processing unit (CPU), a graphics processing unit (GPU), or both.
- the processor 402 may be a component in a variety of systems.
- the processor 402 may be part of a standard personal computer or a workstation.
- the processor 402 may be one or more general processors, digital signal processors, application specific integrated circuits, field programmable gate arrays, servers, networks, digital circuits, analog circuits, combinations thereof, or other now known or later developed devices for analyzing and processing data.
- the processor 402 may implement a software program, such as code generated manually (i.e., programmed).
- the computer system 400 may include a memory 404 that can communicate via a bus 408.
- the memory 404 may be a main memory, a static memory, or a dynamic memory.
- the memory 404 may include, but is not limited to computer readable storage media such as various types of volatile and non-volatile storage media, including but not limited to random access memory, read-only memory, programmable read-only memory, electrically programmable read-only memory, electrically erasable read-only memory, flash memory, magnetic tape or disk, optical media and the like.
- the memory 404 includes a cache or random access memory for the processor 402.
- the memory 404 is separate from the processor 402, such as a cache memory of a processor, the system memory, or other memory.
- the memory 404 may be an external storage device or database for storing data. Examples include a hard drive, compact disc (“CD”), digital video disc (“DVD”), memory card, memory stick, floppy disc, universal serial bus (“USB”) memory device, or any other device operative to store data.
- the memory 404 is operable to store instructions executable by the processor 402.
- the functions, acts or tasks illustrated in the figures or described herein may be performed by the programmed processor 402 executing the instructions 412 stored in the memory 404.
- the functions, acts or tasks are independent of the particular type of instructions set, storage media, processor or processing strategy and may be performed by software, hardware, integrated circuits, firm-ware, micro-code and the like, operating alone or in combination.
- processing strategies may include multiprocessing, multitasking, parallel processing and the like.
- the computer system 400 may further include a display unit 414, such as a liquid crystal display (LCD), an organic light emitting diode (OLED), a flat panel display, a solid state display, a cathode ray tube (CRT), a projector, a printer or other now known or later developed display device for outputting determined
- a display unit 414 such as a liquid crystal display (LCD), an organic light emitting diode (OLED), a flat panel display, a solid state display, a cathode ray tube (CRT), a projector, a printer or other now known or later developed display device for outputting determined
- the display 414 may act as an interface for the user to see the functioning of the processor 402, or specifically as an interface with the software stored in the memory 404 or in the drive unit 406.
- the computer system 400 may include an input device 416 configured to allow a user to interact with any of the components of system 400.
- the input device 416 may be a number pad, a keyboard, or a cursor control device, such as a mouse, or a joystick, touch screen display, remote control or any other device operative to interact with the system 400.
- the computer system 400 may also include a disk or optical drive unit 406.
- the disk drive unit 406 may include a computer-readable medium 410 in which one or more sets of instructions 412, e.g.
- the instructions 412 may embody one or more of the methods or logic as described herein.
- the instructions 412 may reside completely, or at least partially, within the memory 404 and/or within the processor 402 during execution by the computer system 400.
- the memory 404 and the processor 402 also may include computer-readable media as discussed above.
- the present disclosure contemplates a computer-readable medium that includes instructions 412 or receives and executes instructions 412 responsive to a propagated signal, so that a device connected to a network 420 can communicate voice, video, audio, images or any other data over the network 420. Further, the instructions 412 may be transmitted or received over the network 420 via a communication interface 418.
- the communication interface 418 may be a part of the processor 402 or may be a separate component.
- the communication interface 418 may be created in software or may be a physical connection in hardware.
- the communication interface 418 is configured to connect with a network 420, external media, the display 414, or any other components in system 400, or combinations thereof.
- the connection with the network 420 may be a physical connection, such as a wired Ethernet connection or may be established wirelessly as discussed below.
- the additional connections with other components of the system 400 may be physical connections or may be established wirelessly.
- the network 420 may include wired networks, wireless networks, or combinations thereof.
- the wireless network may be a cellular telephone network, an 802.1 1 , 802.16, 802.20, or WiMax network.
- the network 420 may be a public network, such as the Internet, a private network, such as an intranet, or combinations thereof, and may utilize a variety of networking protocols now available or later developed including, but not limited to TCP/IP based networking protocols.
- Embodiments of the subject matter and the functional operations described in this specification can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them.
- Embodiments of the subject matter described in this specification can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a computer readable medium for execution by, or to control the operation of, data processing apparatus. While the computer-readable medium is shown to be a single medium, the term "computer-readable medium" includes a single medium or multiple media, such as a centralized or distributed database, and/or associated caches and servers that store one or more sets of instructions.
- the term "computer-readable medium” shall also include any medium that is capable of storing, encoding or carrying a set of instructions for execution by a processor or that cause a computer system to perform any one or more of the methods or operations disclosed herein.
- the computer readable medium can be a machine-readable storage device, a machine -readable storage substrate, a memory device, or a combination of one or more of them.
- data processing apparatus encompasses all apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, or multiple processors or computers.
- the apparatus can include, in addition to hardware, code that creates an execution environment for the computer program in question, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of one or more of them.
- the computer-readable medium can include a solid-state memory such as a memory card or other package that houses one or more non-volatile read-only memories. Further, the computer-readable medium can be a random access memory or other volatile re-writable memory.
- the computer-readable medium can include a magneto-optical or optical medium, such as a disk or tapes or other storage device to capture carrier wave signals such as a signal communicated over a transmission medium.
- a digital file attachment to an e-mail or other self-contained information archive or set of archives may be considered a distribution medium that is a tangible storage medium. Accordingly, the disclosure is considered to include any one or more of a computer-readable medium or a distribution medium and other equivalents and successor media, in which data or instructions may be stored.
- dedicated hardware implementations such as application specific integrated circuits, programmable logic arrays and other hardware devices, can be constructed to implement one or more of the methods described herein.
- Applications that may include the apparatus and systems of various embodiments can broadly include a variety of electronic and computer systems.
- One or more embodiments described herein may implement functions using two or more specific interconnected hardware modules or devices with related control and data signals that can be
- the present system encompasses software, firmware, and hardware implementations.
- the methods described herein may be implemented by software programs executable by a computer system.
- implementations can include distributed processing, component/object distributed processing, and parallel processing.
- virtual computer system processing can be constructed to implement one or more of the methods or functionality as described herein.
- a computer program also known as a program, software, software
- application, script, or code can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a standalone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
- a computer program does not necessarily correspond to a file in a file system.
- a program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple
- coordinated files e.g., files that store one or more modules, sub programs, or portions of code.
- a computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
- the processes and logic flows described in this specification can be performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output.
- the processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
- processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and anyone or more processors of any kind of digital computer.
- a processor will receive instructions and data from a read only memory or a random access memory or both.
- the essential elements of a computer are a processor for performing instructions and one or more memory devices for storing instructions and data.
- a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks.
- mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks.
- a computer need not have such devices.
- a computer can be embedded in another device, e.g., a mobile telephone, a personal digital assistant (PDA), a mobile audio player, a Global Positioning System (GPS) receiver, to name just a few.
- Computer readable media suitable for storing computer program instructions and data include all forms of non volatile memory, media and memory devices, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto optical disks; and CD ROM and DVD-ROM disks.
- the processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
- a device having a display, e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to the user and a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer.
- a display e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor
- a keyboard and a pointing device e.g., a mouse or a trackball
- Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input.
- Embodiments of the subject matter described in this specification can be implemented in a computing system that includes a back end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the subject matter described in this specification, or any combination of one or more such back end, middleware, or front end components.
- the components of the system can be
- Examples of communication networks include a local area network (“LAN”) and a wide area network (“WAN”), e.g., the Internet.
- LAN local area network
- WAN wide area network
- the computing system can include clients and servers.
- a client and server are generally remote from each other and typically interact through a communication network.
- the relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
- the illustrations of the embodiments described herein are intended to provide a general understanding of the structure of the various embodiments. The illustrations are not intended to serve as a complete description of all of the elements and features of apparatus and systems that utilize the structures or methods described herein. Many other embodiments may be apparent to those of skill in the art upon reviewing the disclosure. Other embodiments may be utilized and derived from the disclosure, such that structural and logical substitutions and changes may be made without departing from the scope of the disclosure. Additionally, the illustrations are merely representational and may not be drawn to scale. Certain proportions within the illustrations may be exaggerated, while other proportions may be minimized. Accordingly, the disclosure and the figures are to be regarded as illustrative rather than restrictive.
- inventions of the disclosure may be referred to herein, individually and/or collectively, by the term "invention" merely for convenience and without intending to voluntarily limit the scope of this application to any particular invention or inventive concept.
- inventions may be referred to herein, individually and/or collectively, by the term "invention" merely for convenience and without intending to voluntarily limit the scope of this application to any particular invention or inventive concept.
- specific embodiments have been illustrated and described herein, it should be appreciated that any subsequent arrangement designed to achieve the same or similar purpose may be substituted for the specific embodiments shown.
- This disclosure is intended to cover any and all subsequent adaptations or variations of various embodiments. Combinations of the above embodiments, and other embodiments not specifically described herein, will be apparent to those of skill in the art upon reviewing the description.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Economics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Development Economics (AREA)
- Computer Security & Cryptography (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP14869685.9A EP3080771A4 (de) | 2013-12-09 | 2014-12-05 | Marktdatenblockade mit sicherem austausch-feed |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/100,887 | 2013-12-09 | ||
US14/100,887 US20150088723A1 (en) | 2013-09-24 | 2013-12-09 | Secure exchange feed market data embargo |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015088894A1 true WO2015088894A1 (en) | 2015-06-18 |
Family
ID=53371716
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2014/068710 WO2015088894A1 (en) | 2013-12-09 | 2014-12-05 | Secure exchange feed market data embargo |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP3080771A4 (de) |
WO (1) | WO2015088894A1 (de) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7389422B2 (en) * | 2001-09-13 | 2008-06-17 | International Business Machines Corporation | System for forwarding and verifying multiple digital signatures corresponding to users and contributions of the users in electronic mail |
US8184805B2 (en) * | 2005-04-28 | 2012-05-22 | Panasonic Corporation | Program converter, encrypting device, and encrypting method |
US20120221462A1 (en) * | 2007-07-13 | 2012-08-30 | Omx Technology Ab | Method and system for trading |
US20120246055A1 (en) * | 2005-08-12 | 2012-09-27 | Boulder Capital Trading | Method for customized market data dissemination in support of hidden-book order placement and execution |
US20130218739A1 (en) * | 2012-02-17 | 2013-08-22 | Frank Kmiec | Secure Consolidated Exchange Feed for Order Entry and Market Data |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012129546A2 (en) * | 2011-03-23 | 2012-09-27 | Selerity, Inc. | Securely enabling access to information over a network across multiple protocols |
US10032219B2 (en) * | 2013-09-24 | 2018-07-24 | Chicago Mercantile Exchange Inc. | Secure exchange feed market data embargo |
US20150088723A1 (en) * | 2013-09-24 | 2015-03-26 | Chicago Mercantile Exchange Inc. | Secure exchange feed market data embargo |
-
2014
- 2014-12-05 EP EP14869685.9A patent/EP3080771A4/de not_active Withdrawn
- 2014-12-05 WO PCT/US2014/068710 patent/WO2015088894A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7389422B2 (en) * | 2001-09-13 | 2008-06-17 | International Business Machines Corporation | System for forwarding and verifying multiple digital signatures corresponding to users and contributions of the users in electronic mail |
US8184805B2 (en) * | 2005-04-28 | 2012-05-22 | Panasonic Corporation | Program converter, encrypting device, and encrypting method |
US20120246055A1 (en) * | 2005-08-12 | 2012-09-27 | Boulder Capital Trading | Method for customized market data dissemination in support of hidden-book order placement and execution |
US20120221462A1 (en) * | 2007-07-13 | 2012-08-30 | Omx Technology Ab | Method and system for trading |
US20130218739A1 (en) * | 2012-02-17 | 2013-08-22 | Frank Kmiec | Secure Consolidated Exchange Feed for Order Entry and Market Data |
Non-Patent Citations (1)
Title |
---|
See also references of EP3080771A4 * |
Also Published As
Publication number | Publication date |
---|---|
EP3080771A1 (de) | 2016-10-19 |
EP3080771A4 (de) | 2017-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10762566B2 (en) | Secure exchange feed market data embargo | |
US20210287291A1 (en) | Secure Consolidated Exchange Feed for Order Entry and Market Data | |
US11842397B2 (en) | Exchange feed for trade reporting having reduced redundancy | |
US20150088723A1 (en) | Secure exchange feed market data embargo | |
US12125100B2 (en) | Tokens, and the use thereof, for public distribution of messages having a private association with a subset of the message recipients | |
US10839459B2 (en) | Electronic market message management of temporally specific messages | |
US10637808B2 (en) | Electronic messaging management | |
US9916623B2 (en) | Electronic market message management with priority determination | |
US20180342013A1 (en) | Electronic market message management using priority determination | |
EP3813004A1 (de) | Kundenspezifische datenverteilung | |
US20170004575A1 (en) | Dissemination of order status information present on an electronic exchange | |
EP3080771A1 (de) | Marktdatenblockade mit sicherem austausch-feed |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14869685 Country of ref document: EP Kind code of ref document: A1 |
|
REEP | Request for entry into the european phase |
Ref document number: 2014869685 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014869685 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |