Bilateral trade negotiation and matching is often a manual process involving a hodgepodge-like mixture of tools and practices. For instance, brokers may use a combination of spreadsheets, instant messaging, chat platforms, phone calls and handwritten notes to negotiate a transaction. These characteristics of the negotiations result in substantial throwaway work performed by the brokers and other participants in the negotiations.
Bilateral trade negotiations also typically involve one-to-one communications and fragmented individual networks. Markets involving such negotiations can suffer from limited liquidity and lack of competitive pricing.
For the foregoing reasons, bilateral trade negotiations often exhibit fractured communication sequences. Audit requirements are thus a challenge. Making matters worse, a central authority for trade clearing (e.g., a clearing house) is not privy to the negotiation and trade matching processes occurring between these parties. As a result, brokers are forced to self-report the results of the negotiations to satisfy regulatory obligations. Unfortunately, reporting is also a fractured, manual process, with potential for gaps and non-compliance.
The self-reporting notwithstanding, the negotiations remain opaque to the clearing house and regulator. While some information and other data is captured in, for instance, chat logs, much of the negotiation data is not readily or at all available for an audit trail or other investigation (e.g., to scrutinize trade irregularities).
Methods and systems for message data recordation and other processing of a sequence of communication events are described. The disclosed methods and systems may implement an iterative process for recordation and other processing of the sequence of communication events. The nature of the communication events may vary. In some cases, the communication events may be directed to, or otherwise involve, bilateral trade negotiations, matching, or other transactional procedures related to trading. In this context, the disclosed methods and systems are capable of expanding a participant's (e.g., a broker's) reach to further (e.g., all) liquidity providers. The disclosed methods and systems also remove the labor-intensive steps of tracking multiple negotiations manually, and eliminate, reduce, or minimize delays in reporting and compliance issues implicated by the negotiation process.
The message data recordation and processing of the sequence of communication events is configured to adjust visibility permissions for participants in their respective communication events. The permissions may thus address the visibility of the message data for each communication event. The visibility of the message data accordingly varies across the sequence of communication events.
The disclosed methods and systems may employ blockchain or other distributed ledger data structures to provide for the recordation and reporting of the information or other data representative of the sequence of communication events in immutable fashion. Multiple chains or other data structures are created to allow the visibility of message data to be adjusted. For instance, a subsidiary chain or other data structure may be created to support part of the sequence of communication events. The disclosed methods and systems are thus capable of providing privacy for those involved in an individual negotiation, while still binding the participants who ultimately finalize or complete the trade as part of an agreed upon transaction. As described below, the visibility permissioning provided by the disclosed methods and systems also supports informing the original group of participants (e.g., the rest of the market) that the transaction is completed while maintaining the privacy of the transaction details. Thus, any participant initially or otherwise solicited for a transaction has its market interest protected and receives a notification in the event that someone else completes (e.g., wins) the bidding process. With completed deals reported to the broader network immediately, regulatory and/or other reporting requirements are satisfied and market participants not party to the deal receive notice of the completed transactions more quickly, without being able to see any sensitive negotiation information.
Although described below in connection with bilateral transactions, the nature of the message data processed by the disclosed methods and systems need not involve negotiations, transactions or trading. A variety of different message types and contexts may be addressed by the disclosed methods and systems. Examples of other types of messaging include data indicative of allocations and claims of already-matched trades, transfers of open trading positions, average pricing of batched transactions, and other post-trade processes.
Although described below in connection with examples involving blockchain-based messaging, the disclosed methods and systems are well suited for use with a variety of communication platforms and media. In some cases, different platforms and media may be used by different participants in the same sequence of communication events. The disclosed methods and systems may use keywords to capture message data for each message or communication event. The keywords may be preceded or otherwise denoted with hashtags or other standardized or predetermined symbols or characters.
Although described herein in connection with bilateral trade negotiations, the disclosed embodiments are well suited for use with other types of negotiations, transactions and financial instruments. For example, transactions such as block trades, exchange for related positions (EFRPs), and other privately negotiated transactions (PNTs) may benefit from the message data recordation and visibility permissioning provided by the disclosed methods and systems.
The blockchains, replicated ledgers and other data structures created, managed, and used by the disclosed methods and systems may be configured, created, managed, and used as described in U.S. Patent Publication No. 2017/0295023 (“Bilateral Assertion Model and Ledger Implementation Thereof”) and U.S. patent application Ser. No. 16/196,257 (“Selectively Replicated Trustless Persistent Store”), the entire disclosures of which are hereby incorporated by reference. The blockchains and other data structures may use consensus rules, and the rules may be changed in accordance with the synchronization techniques described in U.S. Patent Publication No. 2018/0039667 (“Systems and Methods for Blockchain Rule Synchronization”), the entire disclosure of which is hereby incorporated by reference. The messages and communication events may be configured as, or otherwise incorporate hashtag and other features of the communication protocol, described in U.S. patent application Ser. No. 15/854,365 (“Integration Application Utilizing a Communications Protocol”), the entire disclosure of which is hereby incorporated by reference.
In some cases, the disclosed methods and systems are implemented by a clearing house or exchange. For instance, a computer system of the clearing house or the exchange (i.e., an exchange computer system) may include one or more aspects of, or be configured as, the disclosed systems and/or be configured to implement one or more aspects of the disclosed methods. The clearing house may be an adjunct to an exchange responsible for settling trading accounts, clearing trades, collecting and maintaining performance bond funds, regulating delivery, and reporting trading data. Clearing is the procedure through which the clearing house becomes buyer to each seller of an instrument, and seller to each buyer, and assumes responsibility for protecting buyers and sellers from financial loss by assuring performance on each contract. This is effected through the clearing process.
The disclosed methods and systems may provide an exchange computer system or other trading-related computer system a new technique for recording the details of each negotiation and each transaction. The replication of the data structure establishes the irrefutable and immutable nature of the recorded details for enforcement by the exchange or clearing house.
A subsidiary data structure is created in connection with a response to the originating message. In the example of
In the example of
The message data for each of the messages or communication events may be captured by parsing the messages to capture keywords or other predefined text strings. As described below, the keywords may be used to indicate bids and offers, solicit and respond to bids and offers, and identify the recipient data. Automating the message data capture using the keywords is capable of reducing or eliminating ambiguity, manual work, and opportunity for error. For these and other reasons, implementation of the disclosed methods and systems may automate the bidding, negotiation, and matching steps of bilateral trades and transactions, while scaling to any size network, and preserving the negotiation and execution steps for regulatory reporting in an immutable fashion.
A responsive message to the originating message is generated or received (block 206). In either case, the responsive message includes responsive message data that, in turn, includes recipient data that permissions a second group of participants to which the responsive message is visible. The second group differs from the first group. For instance, the second group may be a subset of the first group. Alternatively or additionally, the second group may include additional participants. In some cases, the responsive message is or includes an acknowledgement. For example, an exchange or other third party may generate an acknowledgement confirming that the third party has received an originating or other message, received a response from the other parties in the negotiation, or a match between two of the parties. An acknowledgement may alternatively be sent from the other parties in the negotiation.
A subsidiary data structure of the data structure is created in connection with the responsive message (block 208). In this case, the subsidiary data structure is created to address and support the adjustment in visibility permissioning. The responsive message data is stored in the subsidiary data structure (block 210). The recipient data for the responsive message data is also stored.
The responsive message is transmitted via the network interface to the second group of participants (block 212). The receipt of the responsive message causes the subsidiary data structure to be replicated by the respective communication processor of each participant in the second group of participants.
A decision block 214 then determines whether the sequence is complete as a result of the responsive message. For example, the sequence may be complete if the responsive message has accepted an offer. The determination may include a detection of a keyword indicative of such acceptance. The determination may be made by a processor at the exchange or another third party and/or by processors at each party involved in the sequence. If the sequence is complete, control passes to a block 216 in which the subsidiary data structure is anchored or otherwise incorporated into the primary data structure for the originating message. For example, a hash or Merkle root of the subsidiary data structure may be incorporated into the primary data structure upon completion of the sequence of communication events. In the example of
The negotiation cycles in the example of
These hashtags or keywords may be predefined as, for instance, part of a predefined protocol. The hashtags or keywords allow any participant receiving the initial bid invitation to respond in kind and enter an ad hoc, secure negotiation phase whose contents are preserved, but protected from others in the broader network. Because the messaging and data structures are implemented via distributed ledgers, other parties are capable of confirming that negotiations were taking place and untampered, but not see the parties, prices, or quantities involved.
With the hashtags acting as a “call and response”, parties may solicit offers, respond with counter-offers, and ultimately accept a broker's terms. This accept message closes the negotiation phase, ending further entries on the sub-chain and returning the final value to the main ledger, where the broader network would be able to see the outcome. Regulators are then able to view both the finished transaction, and audit the intermediate steps leading up to it, without any additional work or trust required from brokers or other participants.
In the example of
In the example of
Subsidiary data structures are created in connection with the responsive messages from Speculator S2 and Hedger H1, each of whom respond with a bid via a #bid keyword and the details as shown. The responsive messages also specify that only Broker B1 is permissioned to view the responsive messages. Respective subsidiary data structures are accordingly created for storing the ensuing message data for each negotiation. In this example, the negotiations end using a keyword #accept.
The example of
The example of
With the disclosed methods and systems, deal initiators are capable of proposing bilateral transactions in a targeted broadcast, reaching any or all eligible participants of a given market. Speculators and other participants can respond to the proposals, initiating a negotiation cycle visible to both parties but kept private from the broader market, with bids/offers preserved for exchange or regulator review to satisfy reporting requirements. Agreement by one party to the other's bid/offer will trigger an immutable transaction on the public ledger, where visibility can be permissioned to all or a subset of the market, as well as regulators and the clearing house to satisfy existing reporting requirements.
In addition to the immutable features of a distributed ledger, the distributed ledger of the disclosed methods and systems allows the lineage of each transaction to be preserved, and non-repudiation of agreed upon transactions through the use of digital signatures on the chained transaction hashes. In other words, if a deal is questioned then the specifics of its bid/offer and response can be summoned. Should a regulator suspect irregularities, the entire negotiation sequence can be audited, as well as related interactions with other parties which can be linked by timestamp and tagging.
Permissioned private distributed ledgers allow selective replication (only transmitting data relevant to the parties) of transactions on bilateral or multilateral basis. The disclosed methods and systems alleviate the need for costly encryption solutions while improving security.
Additional transaction integrity guarantees may be achieved by the disclosed methods and systems if external anchors are used for completed transactions. As described herein, evidence of an attested transaction evidence may be written to an external source, which may be public, because the evidence itself does not contain any private data. In other words, the broader market may thus see that a deal has taken place without its details being revealed.
The permissioned distributed ledger of the disclosed methods and systems may be applied in other transaction workflows or communication sequences. For instance, the transaction workflow may be a one-to-one bilateral transaction. The permissioned ledger may be used to carve out a single private negotiation from broader market visibility, while providing the lineage associated with the negotiation to thereby ensure non-repudiation. Various multilateral (e.g., one-to-many) negotiations may be handled in which one party permissions multiple parties to the same request. Multiple private negotiations or a single public group negotiation may thus be recorded. The number of resulting transactions may vary.
The disclosed methods and systems are capable of expanding a participant's reach to more (e.g., all) liquidity providers, removing the labor-intensive steps of tracking multiple negotiations manually, and minimizing delays in reporting. The disclosed methods and systems also minimize compliance issues surrounding the negotiation process, by guaranteeing tamper-resistance and the lineage of each negotiation.
As described above, the ability to provide selective replication improves security and reduces the need for encryption. Additionally, leveraging external anchors provides a declaration of an event/trade without disclosing the details associated therewith. These aspects of the disclosed methods and systems allow any party solicited for a deal to have its market interest protected and receive notification should someone else complete the transaction process. Moreover, with completed deals distributed to the broader network immediately, reporting requirements are satisfied and market participants not party to the deal receive notice of those transactions more quickly, without being able to see any sensitive negotiation information.
With reference to
The system 400 includes a communication event processor 402, which may correspond with any one of the processors referenced herein. The communication event processor 402 is configured to record message data for a sequence of communication events on a memory 404. As described herein, the message data is recorded using an arrangement of multiple data structures 406, including a primary or main data structure and a number of subsidiary data structures.
The system 400 includes a network interface 408 to support receipt and transmission of the messages of each communication event. The system 400 further includes a display or other user interface 410 to facilitate entry and viewing of message content.
In the example of
The network interface processor 412 is configured to receive, via the network interface 408, an originating message for an initial communication event of the sequence of communication events. The message processor 416 is configured to parse the originating message for the initial communication event to extract message data for the initial communication event, the extracted message data specifying a first group of participants to which the originating message for the initial commmunication event is visible. The data structure manager 414 is a data structure management processor configured to store the extracted message data in the data structure, the data structure being replicated by a respective communication processor of each participant of the first group of participants. The message processor 416 is further configured to generate a responsive message to the originating message, the responsive message including responsive message data, the responsive message data including recipient data, the recipient data permissioning a second group of participants to which the responsive message is visible, the second group differing from the first group. The data structure manager 414 is further configured to create, in the memory 404, a subsidiary data structure of the data structure and store the responsive message data in the subsidiary data structure. The network interface processor 412 is further configured to transmit, via the network interface 408 to the second group of participants, the responsive message such that receipt of the responsive message causes the subsidiary data structure to be replicated by the respective communication processor of each participant in the second group of participants.
The system 500 includes first logic 506 stored in the memory 504 and executable by the processor 502 to receive, via a network interface, an originating message for an initial communication event of the sequence of communication events, second logic 508, stored in the memory 504 and executable by the processor 502 to parse, the originating message for the initial communication event to extract message data for the initial communication event, the extracted message data specifying a first group of participants to which the originating message for the initial communication event is visible, third logic 510, stored in the memory 504 and executable by the processor 502 to store the extracted message data in a data structure for the sequence of communication events, the data structure being replicated by a respective communication processor of each participant of the first group of participants, fourth logic 512 stored in the memory 504 and executable by the processor 502 to generate or receive a responsive message to the originating message, the responsive message comprising responsive message data, the responsive message data comprising recipient data, the recipient data permissioning a second group of participants to which the responsive message is visible, the second group differing from the first group, fifth logic 514 stored in the memory 504 and executable by the processor 502, to create a subsidiary data structure of the data structure, sixth logic 516 stored in the memory 504 and executable by the processor 502 to store the responsive message data in the subsidiary data structure, and seventh logic 518 stored in the memory 504 and executable by the processor 502 to transmit, via the network interface to the second group of participants, the responsive message such that receipt of the responsive message causes the subsidiary data structure to be replicated by the respective communication processor of each participant in the second group of participants.
Referring to
In a networked deployment, the computer system 600 may operate in the capacity of a server or as a client user computer in a client-server user network environment, or as a peer computer system in a peer-to-peer (or distributed) network environment. The computer system 600 can also be implemented as or incorporated into various devices, such as a personal computer (PC), a server computer, a tablet PC, a set-top box (STB), a personal digital assistant (PDA), a mobile device, a palmtop computer, a laptop computer, a desktop computer, a communications device, a wireless telephone, a land-line telephone, a control system, a camera, a scanner, a facsimile machine, a printer, a pager, a personal trusted device, a web appliance, a network router, switch or bridge, or any other machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. In a particular embodiment, the computer system 600 can be implemented using electronic devices that provide voice, video or data communication. Further, while a single computer system 600 is illustrated, the term “system” shall also be taken to include any collection of systems or sub-systems that individually or jointly execute a set, or multiple sets, of instructions to perform one or more computer functions.
As illustrated in
The computer system 600 may include a memory 604 that can communicate via a bus 608. The memory 604 may be a main memory, a static memory, or a dynamic memory. The memory 604 may include, but is not limited to computer readable storage media such as various types of volatile and non-volatile storage media, including but not limited to random access memory, read-only memory, programmable read-only memory, electrically programmable read-only memory, electrically erasable read-only memory, flash memory, magnetic tape or disk, optical media and the like. In one or more embodiments, the memory 604 includes a cache or random access memory for the processor 602. In alternative embodiments, the memory 604 is separate from the processor 602, such as a cache memory of a processor, the system memory, or other memory. The memory 604 may be an external storage device or database for storing data. Examples include a hard drive, compact disc (“CD”), digital versatile disc (“DVD”), memory card, memory stick, floppy disc, universal serial bus (“USB”) memory device, or any other device operative to store data. The memory 604 is operable to store instructions executable by the processor 602. The functions, acts or tasks illustrated in the figures or described herein may be performed by the programmed processor 602 executing the instructions 624 stored in the memory 604. The functions, acts or tasks are independent of the particular type of instructions set, storage media, processor or processing strategy and may be performed by software, hardware, integrated circuits, firmware, microcode and the like, operating alone or in combination. Likewise, processing strategies may include multiprocessing, multitasking, parallel processing and the like.
As shown, the computer system 600 may further include a display unit 614, such as a liquid crystal display (LCD), an organic light emitting diode (OLED), a flat panel display, a solid state display, a cathode ray tube (CRT), a projector, a printer or other now known or later developed display device for outputting determined information. The display 614 may act as an interface for the user to see the functioning of the processor 602, or specifically as an interface with the software stored in the memory 604 or in the drive unit 606.
Additionally, the computer system 600 may include an input device 616 configured to allow a user to interact with any of the components of system 600. The input device 616 may be a number pad, a keyboard, or a cursor control device, such as a mouse, or a joystick, touch screen display, remote control or any other device operative to interact with the system 600.
In a particular embodiment, as depicted in
The present disclosure contemplates a computer-readable medium that includes instructions 624 or receives and executes instructions 624 responsive to a propagated signal, so that a device connected to a network 635 can communicate voice, video, audio, images or any other data over the network 635. Further, the instructions 624 may be transmitted or received over the network 635 via a communication interface 618. The communication interface 618 may be a part of the processor 602 or may be a separate component. The communication interface 618 may be created in software or may be a physical connection in hardware. The communication interface 618 is configured to connect with a network 635 , external media, the display 614, or any other components in system 600, or combinations thereof. The connection with the network 635 may be a physical connection, such as a wired Ethernet connection or may be established wirelessly as discussed below. Likewise, the additional connections with other components of the system 600 may be physical connections or may be established wirelessly.
The network 635 may include wired networks, wireless networks, or combinations thereof. The wireless network may be a cellular telephone network, an 802.11, 802.16, 802.20, or WiMax network. Further, the network 635 may be a public network, such as the Internet, a private network, such as an intranet, or combinations thereof, and may utilize a variety of networking protocols now available or later developed including, but not limited to TCP/IP based networking protocols.
Embodiments of the subject matter and the functional operations described in this specification can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them. Embodiments of the subject matter described in this specification can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a computer readable medium for execution by, or to control the operation of, data processing apparatus. While the computer-readable medium is shown to be a single medium, the term “computer-readable medium” includes a single medium or multiple media, such as a centralized or distributed database, and/or associated caches and servers that store one or more sets of instructions. The term “computer-readable medium” shall also include any medium that is capable of storing, encoding or carrying a set of instructions for execution by a processor or that cause a computer system to perform any one or more of the methods or operations disclosed herein. The computer readable medium can be a machine-readable storage device, a machine-readable storage substrate, a memory device, or a combination of one or more of them. The term “data processing apparatus” encompasses all apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, or multiple processors or computers. The apparatus can include, in addition to hardware, code that creates an execution environment for the computer program in question, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of one or more of them.
In a particular non-limiting, exemplary embodiment, the computer-readable medium can include a solid-state memory such as a memory card or other package that houses one or more non-volatile read-only memories. Further, the computer-readable medium can be a random access memory or other volatile re-writable memory. Additionally, the computer-readable medium can include a magneto-optical or optical medium, such as a disk or tapes or other storage device to capture carrier wave signals such as a signal communicated over a transmission medium. A digital file attachment to an e-mail or other self-contained information archive or set of archives may be considered a distribution medium that is a tangible storage medium. Accordingly, the disclosure is considered to include any one or more of a computer-readable medium or a distribution medium and other equivalents and successor media, in which data or instructions may be stored.
In an alternative embodiment, dedicated hardware implementations, such as application specific integrated circuits, programmable logic arrays and other hardware devices, can be constructed to implement one or more of the methods described herein. Applications that may include the apparatus and systems of various embodiments can broadly include a variety of electronic and computer systems. One or more embodiments described herein may implement functions using two or more specific interconnected hardware modules or devices with related control and data signals that can be communicated between and through the modules, or as portions of an application-specific integrated circuit. Accordingly, the present system encompasses software, firmware, and hardware implementations.
In accordance with various embodiments of the present disclosure, the methods described herein may be implemented by software programs executable by a computer system. Further, in an exemplary, non-limited embodiment, implementations can include distributed processing, component/object distributed processing, and parallel processing. Alternatively, virtual computer system processing can be constructed to implement one or more of the methods or functionality as described herein.
Although the present specification describes components and functions that may be implemented in particular embodiments with reference to particular standards and protocols, the invention is not limited to such standards and protocols. For example, standards for Internet and other packet switched network transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP, HTTPS) represent examples of the state of the art. Such standards are periodically superseded by faster or more efficient equivalents having essentially the same functions. Accordingly, replacement standards and protocols having the same or similar functions as those disclosed herein are considered equivalents thereof.
The disclosed computer programs (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages. The disclosed computer programs can be deployed in any form, including as a standalone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. Such computer programs do not necessarily correspond to a file in a file system. Such programs can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code). Such computer programs can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
The processes and logic flows described in this specification can be performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output. The processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and anyone or more processors of any kind of digital computer. Generally, a processor may receive instructions and data from a read only memory or a random access memory or both. The essential elements of a computer are a processor for performing instructions and one or more memory devices for storing instructions and data. Generally, a computer may also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks. However, a computer need not have such devices. Moreover, a computer can be embedded in another device, e.g., a mobile telephone, a personal digital assistant (PDA), a mobile audio player, a Global Positioning System (GPS) receiver, to name just a few. Computer readable media suitable for storing computer program instructions and data include all forms of non volatile memory, media and memory devices, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto optical disks; and CD ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
To provide for interaction with a user, embodiments of the subject matter described in this specification can be implemented on a device having a display, e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to the user and a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer. Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input.
Embodiments of the subject matter described in this specification can be implemented in a computing system that includes a back end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the subject matter described in this specification, or any combination of one or more such back end, middleware, or front end components. The components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network (“LAN”) and a wide area network (“WAN”), e.g., the Internet.
The computing system can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
Referring now to
The clearing house 708 provides a system 724 that implements the functions of buy/sell 710 transactions, clearing 712 those transactions, settling 714 those transactions and managing risk 716 among the market participants 704, 706 and between the market participants and the clearing house 708, as well as administration functionality 728 for, e.g., administering transactions between delivery and redemption. In an alternate embodiment, collateral management 722 and/or request-for-quote functionality (not shown) or netting functionality (not shown) may also be provided, as is discussed in more detail below. The clearing house 708 may be include or be coupled with one or more database(s) 720 or other record keeping system which stores data related to orders.
The illustrations of the embodiments described herein are intended to provide a general understanding of the structure of the various embodiments. The illustrations are not intended to serve as a complete description of all of the elements and features of apparatus and systems that utilize the structures or methods described herein. Many other embodiments may be apparent to those of skill in the art upon reviewing the disclosure. Other embodiments may be utilized and derived from the disclosure, such that structural and logical substitutions and changes may be made without departing from the scope of the disclosure. Additionally, the illustrations are merely representational and may not be drawn to scale. Certain proportions within the illustrations may be exaggerated, while other proportions may be minimized. Accordingly, the disclosure and the figures are to be regarded as illustrative rather than restrictive.
While this specification contains many specifics, these should not be construed as limitations on the scope of the invention or of what may be claimed, but rather as descriptions of features specific to particular embodiments of the invention. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable sub-combination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a sub-combination or variation of a sub-combination.
Similarly, while operations are depicted in the drawings and described herein in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
It will be appreciated that one or more of the processors, memories, logic and/or components described above may be combined or further sub-divided into discrete components thereof, and that all such implementations, accomplishing the disclosed functionality, are contemplated. Further, operation of the above components/functions may be performed on a periodic or batch basis, such as at the close of trading, and/or in real-time continuously throughout the trading day or other window of time.
To clarify the use in the pending claims and to hereby provide notice to the public, the phrases “at least one of <A>, <B>, . . . and <N>” or “at least one of <A>, <B>, . . . <N>, or combinations thereof” are defined by the Applicant in the broadest sense, superseding any other implied definitions herebefore or hereinafter unless expressly asserted by the Applicant to the contrary, to mean one or more elements selected from the group comprising A, B, . . . and N, that is to say, any combination of one or more of the elements A, B, . . . or N including any one element alone or in combination with one or more of the other elements which may also include, in combination, additional elements not listed.
It is therefore intended that the foregoing detailed description and drawings be regarded as illustrative rather than limiting, and that it be understood that it is the following claims, including all equivalents, that are intended to define the spirit and scope of this invention.