WO2015088894A1 - Secure exchange feed market data embargo - Google Patents

Secure exchange feed market data embargo Download PDF

Info

Publication number
WO2015088894A1
WO2015088894A1 PCT/US2014/068710 US2014068710W WO2015088894A1 WO 2015088894 A1 WO2015088894 A1 WO 2015088894A1 US 2014068710 W US2014068710 W US 2014068710W WO 2015088894 A1 WO2015088894 A1 WO 2015088894A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
market
data
messages
financial
Prior art date
Application number
PCT/US2014/068710
Other languages
French (fr)
Inventor
Jose Antonio Acuna-Rohter
Paul Callaway
Pearce Peck-Walden
Barry Galster
Original Assignee
Chicago Mercantile Exchange Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/100,887 external-priority patent/US20150088723A1/en
Application filed by Chicago Mercantile Exchange Inc. filed Critical Chicago Mercantile Exchange Inc.
Priority to EP14869685.9A priority Critical patent/EP3080771A4/en
Publication of WO2015088894A1 publication Critical patent/WO2015088894A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Definitions

  • a financial instrument trading system such as a futures exchange, referred to herein also as an "Exchange”, such as the Chicago Mercantile Exchange Inc. (CME), provides a contract market where financial instruments, for example futures and options on futures, are traded. Futures is a term used to designate all contracts for the purchase or sale of financial instruments or physical commodities for future delivery or cash settlement on a commodity futures exchange.
  • a futures contract is a legally binding agreement to buy or sell a commodity at a specified price at a predetermined future time.
  • An option is the right, but not the obligation, to sell or buy the underlying instrument (in this case, a futures contract) at a specified price within a specified time.
  • the commodity to be delivered in fulfillment of the contract is known as the contract's underlying reference or "underlier.”
  • the terms and conditions of each futures contract are standardized as to the specification of the contract's underlying reference commodity, the quality of such commodity, quantity, delivery date, and means of contract settlement.
  • Cash Settlement is a method of settling a futures contract whereby the parties effect final settlement when the contract expires by paying/receiving the loss/gain related to the contract in cash, rather than by effecting physical sale and purchase of the underlying reference commodity at a price determined by the futures contract, price.
  • the Exchange provides for a centralized "clearing house” through which all trades made must be confirmed, matched, and settled each day until offset or delivered.
  • the clearing house is an adjunct to the Exchange, and may be an operating division of the Exchange, which is responsible for settling trading accounts, clearing trades, collecting and maintaining performance bond funds, regulating delivery, and reporting trading data.
  • the essential role of the clearing house is to mitigate credit risk. Clearing is the procedure through which the Clearing House becomes buyer to each seller of a futures contract, and seller to each buyer, also referred to as a novation, and assumes responsibility for protecting buyers and sellers from financial loss due to breach of contract, by assuring performance on each contract.
  • a clearing member is a firm qualified to clear trades through the Clearing House.
  • Electronic trading systems in contrast, ideally attempt offer a more efficient, fair and balanced market where market prices reflect a true consensus of the value of traded products among the market participants, where the intentional or unintentional influence of any one market participant is minimized if not eliminated, and where unfair or inequitable advantages with respect to information access are minimized if not eliminated.
  • Figure 1 depicts an illustrative computer network system that may be used to implement aspects of the disclosed embodiments.
  • Figure 2 depicts a block diagram of a message management module and a message receipt device for use in the system of Figure 1.
  • Figure 3 depicts a flow chart for managing the communication of financial messages that may be implemented using the system of Figures 1 and 2.
  • Figure 4 shows an illustrative embodiment of a general computer system for use with the system of Figure 1.
  • Figure 5 depicts a diagram for managing the communication of market data with financial messages.
  • Figure 6 depicts a message receipt device or system for use with the
  • Figure 7 depicts a flow chart for the communication of financial messages that may be implemented using the system of Figures 1 and 6.
  • Figure 8 depicts a flow chart for managing the communication of financial messages that may be implemented using the system of Figures 1 and 2.
  • Figure 9 depicts a flow chart for the communication of financial messages that may be implemented using the system of Figures 1 and 6.
  • Figure 10 depicts a diagram for managing the communication of market data with financial messages.
  • the separation of private market data message generation and transmission from the generation and transmission of corresponding public market data messages may result in a situation where private data is communicated before, or the transmission thereof otherwise overtakes the transmission of, corresponding public data, thus potentially providing market information to the recipient of the private data prior to other market participants.
  • This prior reception of market information may be an undesirable occurrence due to possible market information imbalances for market participants.
  • the disclosed embodiments relate to communication of financial messages from an Exchange, such as the Chicago Mercantile Exchange ("CME”), to market participants whereby messages directed to particular market participants may be wholly or in part encoded, disguised, or otherwise obfuscated such that private market data contained in the messages is not recognizable by the particular market participant.
  • CME Chicago Mercantile Exchange
  • the obfuscation of the private market data may be designed such that data needed to remove the disguise or otherwise de-obfuscate the data is provided in another message directed to all market participants which may further contain data related to the private market data but intended for public dissemination.
  • the particular market participant may receive the data needed to de-obfuscate the private market data from the message directed to all market participants, thus ensuring that the obfuscated private market data cannot be understood by the particular market participant until the message directed to all market participants is received. In this way, the advantage of the particular market participant due to receiving messages with private market data prior to other market participants receiving
  • the message may be sized such that multiple packets may be needed to relay all of the information.
  • market participants finding data relating to their particular activities, or other activities of interest, in earlier received packets may attempt to leverage the earlier received information to develop an advantage in the marketplace.
  • the market data specific to particular market participants may be integrated into public messages with obfuscated content communicated on a public feed.
  • the data needed to de-obfuscate the public messages may be communicated with a subsequent message to all market participants such that all market participants will be sent the de-obfuscation data at the same time.
  • the timing of the release of the obfuscated data to all the market participants may be controlled based on the transmission of the message with the de-obfuscation data. In this way, the advantage of a particular market participant having received market data via earlier sent messages may be mitigated or removed.
  • the public messages may be multiple components of a singular message containing summary data relating to market activity of particular market participants over a period of time.
  • the de-obfuscation data may be included with one of the message components, and the timing of the release of the obfuscated data of the message as a whole may be controlled based on the transmission of the message component having the de-obfuscation data.
  • the disclosed embodiments may be discussed in relation to futures and/or options on futures trading, it will be appreciated that the disclosed embodiments may be applicable to any equity, options or futures trading system or market now available or later developed.
  • a trading environment such as a futures exchange as described herein, implements one or more economic markets where rights and obligations may be traded.
  • a trading environment may be characterized by a need to maintain market integrity, transparency, predictability, fair/equitable access and participant expectations with respect thereto.
  • an exchange must respond to inputs, such as trader orders, cancellation, etc., in a manner as expected by the market participants, such as based on market data, e.g. prices, available counter-orders, etc., to provide an expected level of certainty that transactions will occur in a consistent and predictable manner and without unknown or unascertainable risks.
  • the disclosed embodiments may further include functionality to ensure that the expectations of market participant are met, e.g. that transactional integrity and predictable system responses are maintained.
  • the outbound responses to incoming orders and requests are typically communicated via a medium, e.g. a channel or connection, referred to as a "feed,” that is separate from the market information feed which is generally broadcast to all of the market participants.
  • a medium e.g. a channel or connection, referred to as a "feed”
  • This generally prevents any one market participant from monitoring the specific trading activities of another market participant and prevents, for example, any one participant from influencing other market participants and/or deriving and/or undermining another participant's trading strategy and thereby garnering an unfair advantage or otherwise allowing them to skew or influence the market.
  • the disclosed embodiments recognize, however, that the market data messages, e.g. order book updates, are typically responsive to incoming messages from market participants, e.g.
  • a given market data message broadcast to all market participants in response to an incoming request message may be duplicative of a response message sent specifically to the sender of that request message who is also receiving the broadcasted market data message.
  • a market participant submitting a request such as a new trade order, order modification, or order cancellation, which impacts the market, e.g. causes a change in price of one or more traded products, may receive confirmation of the processing of their request before the remaining market participants learn of the impact via an update to the market data.
  • This discrepancy which may be on the scale of milliseconds, microseconds, or even nanoseconds, may allow the submitting market participant to unfairly take advantage of the market impact, such as by submitting additional orders, etc., before the remaining market participants can react.
  • Solutions to the inefficiencies and inequities described above include generally reducing the requisite bandwidth of the communications, such as via encoding or compression mechanisms, and introducing mechanisms, such as buffers, to align, equalize or otherwise normalize the latencies of the separate communications paths.
  • bandwidth required for each of the feeds attempts to address inefficiency, such reductions are system and hardware dependent in their effectiveness.
  • attempts to achieve parity in terms of latency between two different data feeds publishing the same data has generally been a "best effort" solution. That is, while inherent latencies may be accounted for, it is difficult, for example, to account for transient events, such as errors or interference, which may introduce additional and likely substantially random latencies.
  • regulators are motivated to seek parity between those latencies, whereas market participants seeking a trading advantage are motivated by a timing advantage in order entry timing relative to market data.
  • the discrepancies lead market participants to attempt to game the market and regulators to impose onerous regulations in a counter-attempt thereto.
  • a financial message refers both to messages communicated by market participants to an electronic trading system and vice versa.
  • Financial messages communicated to the electronic trading system also referred to as "inbound" messages, may include request messages, such as trader orders, order modifications, order cancellations and the like, as well as other message types.
  • request messages such as trader orders, order modifications, order cancellations and the like, as well as other message types.
  • outbound messages may include messages responsive to inbound messages, such as confirmation messages, or other messages such as market update messages, quote messages, and the like.
  • Financial messages may further be categorized as having or reflecting an impact on a market, also referred to as an "order book" or "book,” for a traded product, such as a prevailing price therefore, etc., or not having or reflecting an impact on a market or a subset or portion thereof.
  • a request to place a trade may result in a response indicative of the trade either being matched with, or being rested on an order book to await a suitable counter-order.
  • requests may elicit a non- impacting response, such as confirmatory response issued temporally proximate to the receipt of the request and then cause a separate market-impact reflecting response at a later time.
  • a stop order, fill or kill order, aka an immediate or cancel order, or other conditional request may not have an immediate market impacting effect, if at all, until the requisite conditions are met. Accordingly, an acknowledgement or confirmation of receipt, e.g. a non-market impacting communication, may be sent to the trader simply confirming that the order was received.
  • a market-impacting message may be transmitted as described herein. It will be appreciated that additional conditions may be specified, such as a time or price limit, which may cause the order to be dropped or otherwise canceled and that such an event may result in another non-market-impacting communication instead.
  • market impacting communications may be
  • non-market impacting communications such as via a separate communications channel or feed.
  • various types of market data feeds may be provided which reflect different market or aspects thereof. Market participants may then, for example, subscribe to receive those feeds of interest to them. For example, a particular market data feed may only communicate information related to the top buy/sell prices for a particular product, referred to as "top of book" feed. In this case, a request message may be considered market-impacting only if it affects the top buy/sell prices and otherwise is considered non-market-impacting. As market impacting communications tend to be more important to market participants then non impacting communications, this separation may reduce congestion and or noise among those communications having or reflecting an impact on a market or portion thereof.
  • the disclosed embodiments relate to obfuscating the market data having a market impact reflecting response messages, e.g. responsive to inbound messages, with other market impact reflecting messages as will be described.
  • Market data feeds may further be characterized as providing a "view" or "overview" of a given market, an aggregation or a portion thereof.
  • a market data feed may convey the entire state of a market for a particular product, e.g. all presently resting buy/sell orders and prices associated therewith as well as trade notifications, etc., only a portion of a market, e.g. only the top 10 resting buy/sell orders, and/or an aggregation of multiple markets or portions thereof.
  • a market impacting request may be said to impact the "view" of the market as presented via the market data feed.
  • Various types of market data feeds may be provided by electronic trading systems, such as the CME, in order to provide different types or subsets of market information or to provide such information in different formats. Examples include Market By Order, Market Depth (aka Market by Price to a designated depth of the book), e.g. CME offers a 10-deep market by price feed, Top of Book (a single depth Market by Price feed), and combinations thereof. There may also be all manner of specialized feeds in terms of the content, i.e. providing, for example, derived data, such as a calculated index).
  • the disclosed embodiments create a practical impediment to consuming market information contained in messages sent only to particular market participants.
  • This impediment is based on an obfuscation, or lock, of the market information, and the inability of the particular market participant to remove obfuscation without a corresponding key that is delivered in a public message delivered to all market participants. While the degree to which the obfuscation is defeatable without the corresponding key may vary, in one embodiment the obfuscation need only be sufficient so as to delay any attempts to defeat the obfuscation without the corresponding key for enough time to ensure that other market participants will have the public information before the recipient can defeat the obfuscation.
  • any latencies that exist in the system that would cause a private message, or prior transmitted public message, to arrive at a particular market participant before a public message containing key data arrives at all of the market participants would be mitigated by the inability of the particular market participant to consume, use, or understand the market data of the private message, or prior transmitted public message, upon receipt.
  • the private market data will be held in a knowledge embargo until the public message containing key data allows for removal thereof.
  • obfuscation may be provided through encryption techniques.
  • the market data intended to be disguised may be obfuscated through the use of an encryption algorithm such that the content of the data is
  • the key data, or encryption key may be provided separately to control access to the obfuscated, or encrypted, data.
  • the encryption key may be provided with, or as a part of, a public message transmitted by an exchange to participants of a market. A particular market participant that receives the public message may use the encryption key to un- encrypt, or decode, a previously received private or public message having market data encrypted by an algorithm designed to be decoded by the encryption key.
  • private messages with encrypted data will have a particular corresponding encryption key to decode the encrypted data.
  • a particular market participant may determine which public message contains the corresponding encryption key based on an identifier or other correlating indicium that is transmitted with a private message, but not obfuscated.
  • the identifier may identify, or indicate, the public message that contains the corresponding key.
  • the identifier may be a number, and the number matches a number provided with the public message that contains the corresponding key. It will be appreciated that there may be other ways in which the private data message may be correlated with the public data message comprising the key data therefore, and all such methods are contemplated herein.
  • unique encryption keys i.e.
  • dummy or decoy unique keys may be included with outbound public messages so as to further normalize the format and/or appearance of public messages. In this way, all messages may be presented with a similar appearance to the market participants, and it may be more difficult to infer market information from the mere existence of an encryption key in a public message.
  • multiple encryption keys, dummy keys, or combinations thereof may be provided with a public message. For example, multiple encryption keys may be included with a public message that discloses information reflected in multiple private messages. Multiple dummy keys may then be required to normalize the appearance of public messages that do not have multiple encryption keys included. Also, random numbers of dummy keys may be generated and included with messages to further obscure the existence or intent of the actual encryption keys.
  • embodiments are preferably implemented with computer devices and computer networks, such as those described with respect Figure 4, that allow users, e.g. market participants, to exchange trading information.
  • users e.g. market participants
  • the plurality of entities utilizing the disclosed embodiments may be referred to by other nomenclature reflecting the role that the particular entity is performing with respect to the disclosed embodiments and that a given entity may perform more than one role depending upon the implementation and the nature of the particular transaction being undertaken, as well as the entity's contractual and/or legal relationship with another market participant and/or the exchange.
  • FIG. 5 A diagram for managing the communication of market data over networks 532 and 534 to a plurality of market participants 550 and 540 with financial messages 510 and 530 is shown in Figure 5.
  • a particular market participant 540 may place an order with an exchange 505 using a network 532.
  • the exchange 505 may respond to the order by sending a private message 510 over the private circuit network 532 to the particular market participant 540.
  • the private message 510 is locked or obfuscated in a manner that does not allow the particular market participant 540 to know the content of the private message 510.
  • the exchange 505 may also generate a public message 520 and send it using a multicast circuit network 534.
  • the multicast circuit network 534 may be considered a public network.
  • the multicast circuit network 534 may be a collection of private circuit networks for a plurality of market participants 540.
  • a key designed to unlock the content of the private message 510 may be included with the public message 520.
  • both the particular market participant 540 and the other market participants 550 may receive the public message 520. The particular market participant will then be able to use the key in the public message 520 to unlock the content of the private message 510.
  • FIG. 10 a diagram for managing the communication of market data over a network 955 to a plurality of market participants 950 with financial messages 960, 965 is shown in Figure 10.
  • the Exchange 970 may communicate market data to market participants 950 using financial messages 960, 961 , 962, 963, 965 intended for each of the market participants 950 over a multicast circuit network 955.
  • a group of the financial messages 960, 961 , 962, 963 may be obfuscated.
  • Another financial message 965 may contain a key that may be used to un-obfuscate the group of obfuscated financial messages 960, 961 , 962, 963.
  • the market participants 950 Upon receipt of the market message 965 having the key, the market participants 950 will be able to use the key to un-obfuscate the group of obfuscated financial messages 960, 961 , 962, 963. In this way, the Exchange may be able to control the timing of the release of the obfuscated content of the group of obfuscated financial messages 960, 961 , 962, 963 through the transmission of the keyed message 965.
  • all the financial messages 960, 961 , 962, 963, 965 may be considered a set of messages, with the group of obfuscated financial messages 960, 961 , 962, 963 considered a subset of the set.
  • all the financial messages 960, 961 , 962, 963, 965 may be components of a larger message that has been sectioned into multiple messages sized appropriately for transmission using the network 955. Also, all the financial messages 960, 961 , 962, 963, 965 may be sent using a common feed for all the market participants 950.
  • FIG. 1 An exemplary trading network environment for implementing trading systems and methods is shown in Figure 1.
  • An exchange computer system 100 receives orders and transmits market data related to orders and trades to users, such as via wide area network 126 and/or local area network 124 and computer devices 1 14, 1 16, 1 18, 120 and 122, as will be described below, coupled with the exchange computer system 100.
  • the phrase "coupled with” is defined to mean directly connected to or indirectly connected through one or more intermediate components. Such intermediate components may include both hardware and software based components. Further, to clarify the use in the pending claims and to hereby provide notice to the public, the phrases "at least one of ⁇ A>, ⁇ B>, ...
  • ⁇ N> or "at least one of ⁇ A>, ⁇ B>, ... ⁇ N>, or combinations thereof are defined by the Applicant in the broadest sense, superseding any other implied definitions herebefore or hereinafter unless expressly asserted by the Applicant to the contrary, to mean one or more elements selected from the group comprising A, B, ... and N, that is to say, any combination of one or more of the elements A, B, ... or N including any one element alone or in combination with one or more of the other elements which may also include, in combination, additional elements not listed.
  • the exchange computer system 100 may be implemented with one or more mainframe, desktop or other computers, such as the computer 400 described below with respect to Figure 4.
  • a user database 102 may be provided which includes information identifying traders and other users of exchange computer system 100, such as account numbers or identifiers, user names and passwords.
  • An account data module 104 may be provided which may process account information that may be used during trades.
  • a match engine module 106 may be included to match bid and offer prices and may be implemented with software that executes one or more algorithms for matching bids and offers.
  • a trade database 108 may be included to store information identifying trades and descriptions of trades. In particular, a trade database may store information identifying the time that a trade took place and the contract price.
  • An order book module 1 10 may be included to compute or otherwise determine current bid and offer prices.
  • a market data module 1 12 may be included to collect market data and prepare the data for transmission to users.
  • a risk management module 134 may be included to compute and determine a user's risk utilization in relation to the user's defined risk thresholds.
  • An order processing module 136 may be included to decompose delta based and bulk order types for processing by the order book module 1 10 and/or match engine module 106.
  • a message management module 140 may be included to, among other things, control the rate of acceptance of mass quote messages in accordance with one or more aspects of the disclosed embodiments.
  • concurrent processing limits may be defined by or imposed separately or in combination, as was described above, on one or more of the trading system components, including the user database 102, the account data module 104, the match engine module 106, the trade database 108, the order book module 1 10, the market data module 1 12, the risk management module 134, the order processing module 136, or other component of the exchange computer system 100.
  • the message management module 140 may include a message generator configured to generate a first message with at least a portion of the first message obfuscated such that the obfuscated portion of the first message is incomprehensible without associated key data configured to make the obfuscated portion comprehensible, and generate the second message comprising the associated key data.
  • the message management module 140 may also involve a message transmitter configured to transmit the first message to a first market participant and the second message to a plurality of market participants.
  • the message management module 140 may be configured for generating for managing communication of a set of financial messages to a plurality of market participants via a network, the set of financial messages including market data intended to be received and comprehended by all of the plurality of market participants.
  • the message management module 140 may include a message generator configured to generate a subset of the set of financial messages with at least a portion of the market data of the subset of the financial messages obfuscated such that the obfuscated content of the subset is incomprehensible to the plurality of market participants without associated key data configured to render the obfuscated data comprehensible thereto, and generate a message of the set of financial messages augmented with the associated key data.
  • the message management module 140 may include a message transmitter configured to transmit the obfuscated subset and the augmented message to the plurality of market participants, the augmented message transmitted subsequent to the subset of the financial messages
  • the trading network environment shown in Figure 1 includes exemplary computer devices 1 14, 1 16, 1 18, 120 and 122 which depict different exemplary methods or media by which a computer device may be coupled with the exchange computer system 100 or by which a user may communicate, e.g. send and receive, trade or other information therewith.
  • exemplary computer devices 1 14, 1 16, 1 18, 120 and 122 depict different exemplary methods or media by which a computer device may be coupled with the exchange computer system 100 or by which a user may communicate, e.g. send and receive, trade or other information therewith.
  • the types of computer devices deployed by traders and the methods and media by which they communicate with the exchange computer system 100 is implementation dependent and may vary and that not all of the depicted computer devices and/or means/media of communication may be used and that other computer devices and/or means/media of communications, now available or later developed may be used.
  • Each computer device which may comprise a computer 400 described in more detail below with respect to Figure 4, may include a central processor that controls the overall operation of the computer and a system bus that connects the central processor to one or more conventional components, such as a network card or modem.
  • Each computer device may also include a variety of interface units and drives for reading and writing data or files and communicating with other computer devices and with the exchange computer system 100.
  • a user can interact with the computer with a keyboard, pointing device, microphone, pen device or other input device now available or later developed.
  • An exemplary computer device 1 14 is shown directly connected to exchange computer system 100, such as via a Tl line, a common local area network (LAN) or other wired and/or wireless medium for connecting computer devices, such as the network 420 shown in Figure 4 and described below with respect thereto.
  • the exemplary computer device 1 14 is further shown connected to a radio 132.
  • the user of radio 132 which may include a cellular telephone, smart phone, or other wireless proprietary and/or nonproprietary device, may be a trader or exchange employee.
  • the radio user may transmit orders or other information to the exemplary computer device 1 14 or a user thereof.
  • the user of the exemplary computer device 1 14, or the exemplary computer device 1 14 alone and/or autonomously, may then transmit the trade or other information to the exchange computer system 100.
  • Exemplary computer devices 1 16 and 1 18 are coupled with a local area network ("LAN") 124 which may be configured in one or more of the well-known LAN topologies, e.g. star, daisy chain, etc., and may use a variety of different protocols, such as Ethernet, TCP/IP, etc.
  • LAN local area network
  • the exemplary computer devices 1 16 and 1 18 may
  • an exemplary wireless personal digital assistant device (“PDA") 122 such as a mobile telephone, tablet based compute device, or other wireless device, may communicate with the LAN 124 and/or the Internet 126 via radio waves, such as via WiFi, Bluetooth and/or a cellular telephone based data communications protocol. PDA 122 may also communicate with exchange computer system 100 via a conventional wireless hub 128.
  • PDA personal digital assistant device
  • Figure 1 also shows the LAN 124 coupled with a wide area network (“WAN") 126 which may be comprised of one or more public or private wired or wireless networks.
  • the WAN 126 includes the Internet 126.
  • the LAN 124 may include a router to connect LAN 124 to the Internet 126.
  • Exemplary computer device 120 is shown coupled directly to the Internet 126, such as via a modem, DSL line, satellite dish or any other device for connecting a computer device to the Internet 126 via a service provider therefore as is known.
  • LAN 124 and/or WAN 126 may be the same as the network 420 shown in Figure 4 and described below with respect thereto.
  • the users of the exchange computer system 100 may include one or more market makers 130 which may maintain a market by providing constant bid and offer prices for a derivative or security to the exchange computer system 100, such as via one of the exemplary computer devices depicted.
  • the exchange computer system 100 may also exchange information with other trade engines, such as trade engine 138.
  • trade engine 138 One skilled in the art will appreciate that numerous additional computers and systems may be coupled to exchange computer system 100. Such computers and systems may include clearing, regulatory and fee systems.
  • the operations of computer devices and systems shown in Figure 1 may be controlled by computer-executable instructions stored on a non-transitory computer- readable medium.
  • the exemplary computer device 1 16 may include computer-executable instructions for receiving order information from a user and transmitting that order information to exchange computer system 100.
  • the exemplary computer device 1 18 may include computer-executable instructions for receiving market data from exchange computer system 100 and displaying that information to a user.
  • the Exchange computer system 100 further includes a message management module 140 which may implement, in conjunction with the market data module 1 12, the disclosed mechanisms for managing market messages containing financial data sent between an exchange and a plurality of market participants.
  • the disclosed mechanisms may be implemented at any logical and/or physical point(s) through which the relevant message traffic, and responses thereto, flows or is otherwise accessible, including one or more gateway devices, modems, the computers or terminals of one or more traders, etc.
  • Figure 2 depicts a block diagram of a message management module 140 according to one embodiment, which in an exemplary implementation, is implemented as part of the exchange computer system 100 described above.
  • the embodiments described herein utilize trade related messages such as mass quote messages, individual order messages, cancellation messages, etc.
  • the trading entity may have one or multiple trading terminals associated with the session.
  • the financial instruments may be financial derivative products.
  • Derivative products may include futures contracts, options on futures contracts, futures contracts that are functions of or related to other futures contracts, swaps, swaptions, or other financial instruments that have their price related to or derived from an underlying product, security, commodity, equity, index, or interest rate product.
  • the orders are for options contracts that belong to a common option class. Orders may also be for baskets, quadrants, other combinations of financial instruments, etc.
  • the option contracts may have a plurality of strike prices and/or comprise put and call contracts.
  • a mass quote message may be received at an exchange.
  • an exchange 100 includes a place or system that receives and/or executes orders.
  • Figure 2 shows a system 200 for management of communication of a plurality of financial messages to a plurality of market participants via a network 214 which, as described above, may be the network 420 described below or network 124 or 126 described above, which may be implemented as a consolidated feed module 140 as described above.
  • the plurality of messages may include a first financial message including data intended to be received and comprehended by a first market participant of a plurality of market participants, and a second financial message corresponding to the first financial message, and including data intended for all of the plurality of market participants.
  • the plurality of messages may also include multiple messages, all of which are intended for the plurality of market participants.
  • the disclosed embodiments may be applicable to other types of messages depending upon the implementation.
  • the messages may comprise one or more data packets, datagrams or other collection of data formatted, arranged configured and/or packaged in a particular one or more protocols, e.g. the FIX protocol, TCP/IP, Ethernet, etc., suitable for transmission via a network 214 as was described, such as the message format and/or protocols described in U.S. Patent No. 7,831 ,491 and U.S. Patent Publication No. 2005/0096999 Al , both of which are incorporated by reference herein in their entirety.
  • the disclosed message management system may be implemented using an open message standard
  • the system 200 includes a processor 202 and a memory 204 coupled therewith which may be implemented as processor 402 and memory 404 as described below with respect to Figure 4.
  • the system 200 further includes first logic 206 stored in the memory 204 and executable by the processor 202 to cause the processor 202 to obfuscate at least a portion of a first financial message such that the obfuscated portion of the first financial message is incomprehensible to the first market participant without associated key data configured to make the obfuscated portion comprehensible to the first market participant.
  • the system 200 also includes a second logic 212 stored in the memory 204 and executable by the processor 202 to generate a second financial message comprising the associated key data.
  • the second logic 212 may be configured to augment an existing second message with the associated key data.
  • the system 200 further includes a third logic 208 stored in the memory 204 and executable by the processor 202 to cause the processor 202 to transmit, via the network 214, the obfuscated first financial message to a first market participant.
  • the system 200 additionally includes a fourth logic 208 stored in the memory 204 and executable by the processor 202 to cause the processor 202 to transmit, via the network 214, the second financial message to a plurality of market participants.
  • the first financial message may be in response to a trade order, trade modification, trade cancellation, or combination thereof and comprise a confirmation message, update message, rejection message, or combination thereof.
  • the first financial message may be generated by the system 200 in response to a previous message submitted by the first market participant.
  • the first logic 206 may be executable by the processor 202 to obfuscate at least a portion of the first financial message by transforming readable plain text into unreadable ciphertext using an encryption algorithm.
  • the encryption algorithm may be a symmetric key algorithm, asymmetric algorithm, or any encryption algorithm configured to sufficiently obfuscate the portion of the first financial message such that a brute force deciphering attempt would take at least a length of time determined to be the delay between a receipt of a first financial message by a particular market participant and a receipt of a second financial message by at least one market participant of a plurality of the market participants.
  • the first logic 206 may be further executable to generate key data in the form of an encryption cypher configured to make an obfuscated portion of a first message comprehensible to a first market participant.
  • the second logic 212 may be further executable to generate the key data.
  • the second logic 212 may also be executable to include an identifier with key data. The identifier may indicate an association between a first financial message having an obfuscated portion and key data configured to decode, or make understandable, the obfuscated portion.
  • the second logic 212 may be further executable by the processor 202 to augment a second financial message with identification data
  • the identification data may be an identification number that matches a number included in an un-obfuscated, or comprehensible, portion of the first message.
  • the identification data may be recognizable by a first market participant to associate the decode key in the second financial message with a first financial message received by the first market participant.
  • the identification data may be an identification number that matches a number included in an un-obfuscated, or comprehensible, portion of the first message.
  • the identification data may be recognizable
  • the second logic 212 is further executable by the processor 202 to augment a financial message with data indicating key data associated with multiple messages.
  • data indicating key data associated with multiple messages For example, dummy keys, or key data not operational to decode specific data, may be included in a financial message. Dummy keys may be used to indicate the appearance of normality for financial messages that do not include key data. Also, if in an embodiment multiple sets of key data are included in a financial message to decode multiple portions of multiple messages, including multiple dummy keys such that a standard number of keys, or amount of key data, is maintained, may provide a normal appearance to a market participant.
  • system 200 may include a fifth logic executable by the processor 202 to generate a third message having a dummy key not functional to decode any message or portions of any message.
  • a third message would be a public financial message, intended for receipt by a plurality of market participants. This may be an additional technique to maintain a common appearance for all public messages of a messaging system.
  • the first logic 206 may be executable by the processor 202 to cause the system 200 to obfuscate at least a portion of market data of a subset of financial messages such that obfuscated content of the subset is incomprehensible to the plurality of market participants without associated key data configured to render the obfuscated data comprehensible thereto.
  • the second logic 212 may be executable by the processor 202 to cause the system 200 to augment a message of the set of financial messages with the associated key data.
  • the third logic 208 may be executable by the processor 200 to cause the system 200 to transmit, via the network 214, the obfuscated subset and the augmented message to the plurality of market participants, the augmented message transmitted subsequent to the subset of the financial messages.
  • Figure 6 shows a message receipt device 250, which may be implemented as a computer device 1 14, 1 16, 1 18, 120, or 122 of figure 1.
  • the message receipt device 250 includes a processor 222 and a memory 224 coupled therewith which may be
  • the message receipt device 250 further includes a first logic 226 stored in the memory 224 and configured to be executed by the processor 222 to cause the processor 222 to receive a first message that includes market data, at least a portion of which is obfuscated such that it is indecipherable without an associated key, or key data, configured to decipher the first message.
  • the first logic 226 may be configured to cause the processor 222 to retrieve the first message from the system 200 using the network 214.
  • the message receipt device 250 also includes a second logic 228 stored in the memory 224 and configured to be executed by the processor 222 to cause the processor 222 to retrieve a second message transmitted to a plurality of market participants by the system 200 via the network 214.
  • the second message comprising market data and the associated key, or key data, configured to decipher the obfuscated market data of the first message.
  • the message receipt device 250 also includes a third logic 230 stored in the memory 224 and configured to be executed by the processor 222 to cause the processor 222 to decipher the obfuscated market data of the first message using the associated key, or key data.
  • message receipt device 250 includes a first logic 226 stored in the memory 224 and configured to be executed by the processor 222 to cause the processor 222 to receive a set of messages that include market data.
  • the set may include a subset of messages, at least a portion of which have data obfuscated such that it is indecipherable without an associated key, or key data, configured to decipher the obfuscated message.
  • the message receipt device 250 may also include a second logic 228 executable by the processor 222 to cause the system 214 to receive a message of the set of messages augmented with the key data, the augmented message having been sent subsequent to the subset of message.
  • the message receipt device 250 may also include a third logic 230 executable by the processor 222 to cause the system 214 to decode the obfuscated data of the subset of message using the key data.
  • Figure 3 depicts a flow chart showing operation of the system 200 of Figure 2.
  • Figure 3 shows a computer implemented method for managing
  • the plurality of financial messages includes a first financial message.
  • the first financial message includes first market data intended to be received and comprehended by a first market participant of the plurality of market participants.
  • the plurality of financial messages also includes a second financial message,
  • the operation includes obfuscating at least a portion of a first message (Block 310), augmenting a second message with key data (Block 320), transmitting the first message (Block 330), and transmitting the second message (Block 340).
  • the first financial message and the second financial message are considered a message pair and are generated in response to the same market activity.
  • the first financial message may be an order confirmation sent to the first market participant
  • the second financial message may be a market price adjustment of an underlying good or object as a result of the order.
  • An embodiment involves obfuscating (Block 310), by the processor 202, at least a portion of the first market data of the first financial message such that the obfuscated portion of the first market data is incomprehensible to the first market participant without associated key data configured to render the obfuscated data comprehensible to the first market participant.
  • the first financial message may be a confirmation message, update message, rejection message, or combination thereof.
  • the obfuscating may be by any method operational to obscure the understanding of the portion of the first market data.
  • the obfuscating (Block 310) involves transforming readable plain text into unreadable ciphertext using an encryption algorithm.
  • the associated key data may include an encryption cypher sized to resist a brute force deciphering attempt for a length of time determined to be the delay between a receipt of the first financial message and receipt of the second financial message by the particular first market participant.
  • Obfuscating may involve any process or method that renders data incomprehensible to humans and machines without the application of the associated key data.
  • all of the first financial message may be obfuscated.
  • all of any market data included in the first message may be obfuscated, and other data included in the first market message may be comprehensible.
  • all the market data of a financial message may be obfuscated, but a portion of the message indicating identification data for a second financial message is not obfuscated.
  • the first financial message may include a comprehensible identifier and obfuscated market data. The identifier may identify the second market message having key data configured to un-obfuscate, or make comprehensible, the first financial message market data.
  • the identifier in the first message may match an identifier in the second message.
  • the identifier in the first financial message may correspond to data in a second financial message, but not match the data in the second financial message.
  • the first message identifier may indicate a category and/or classification directing the first market participant to the corresponding second financial message. For example, if market message feeds are assigned a color, the first financial message identifier may indicate the color and an individual message sequence number for the feed. In such an embodiment, the first message identifier may read "RED002341" thus indicating that message number 002341 of the "RED" feed is the corresponding second financial message containing the associated key data.
  • the first financial message may be responsive to a message previously received from the first market participant.
  • the first market participant may have submitted an order
  • the first financial message may be an order confirmation to confirm that the order has been placed.
  • the data of the first market message indicating what order is being confirmed may be obfuscated.
  • all substantive market data may be obfuscated.
  • the market data indicating the type of message, i.e. order confirmation, the corresponding order, the underlying object of the order, the volume of the order, and any other information that may indicate a potential effect to the market is obfuscated.
  • only selected types of market data are obfuscated.
  • only the underlying object and volume of the order may be obfuscated.
  • An embodiment involves augmenting (Block 320), by the processor 202, the second financial message corresponding to the first financial message, with the associated key data.
  • the key data may be an encryption cypher operable to decipher market data or messages encrypted with a corresponding encryption algorithm.
  • augmenting, by the processor 202, the second financial message further involves augmenting the second financial message to include
  • identification data linking the associated key data in the second financial message with the first financial message may be augmented with an identifier that matches an identifier of the first financial message.
  • the second financial message may be augmented with data indicating the existence of a plurality of keys, or associated key data for multiple financial messages.
  • a public message in this embodiment a second message, may involve market data related to multiple private messages, one of which may be the first message.
  • the public message may include, or be augmented with, multiple keys configured to provide key data associated with the obfuscated private messages.
  • the second financial message may also be augmented with dummy keys, or data resembling key data but not configured to render obfuscated data comprehensible.
  • Dummy keys may be used to normalize the appearance of the second financial message in an embodiment involving multiple key augmentation.
  • a third financial message that may not have a corresponding private message, or may not otherwise contain key data, may be augmented with a dummy key, or dummy key data.
  • the third message may also be transmitted to a plurality of market participants.
  • An embodiment involves transmitting (Block 330), by the processor 202 via the network 214, the obfuscated first financial message to the first market participant.
  • An embodiment involves transmitting (Block 340), by the processor 202 via the network 214, the second financial message to the plurality of market participants.
  • Figure 8 depicts a flow chart showing another operation of the system 200 of Figure 2.
  • Figure 8 shows a computer implemented method for managing communication of a set of financial messages to a plurality of market participants via a network 214, the set of financial messages including market data intended to be received and comprehended by all of the plurality of market participants.
  • the operation includes obfuscating at least a portion of the content of a subset of the set of financial messages (Block 910), augmenting a message of the set of financial messages with key data (Block 920), transmitting the subset of messages and the augmented message to the plurality of market participants (Block 830), and transmitting of the augmented message occurring subsequent to the transmitting of the subset of messages.
  • all of the market data of the subset of messages is obfuscated, and the key data augmented into the other message of the set of messages is configured to remove the obfuscation of all the obfuscated data in the subset of messages.
  • augmenting a message with associated key data may involve including or augmenting the associated key data into the header of the message.
  • the augmented message may contain market data. Also, in an embodiment, at least a portion of the market data contained by the augmented message may be obfuscated.
  • a set of messages may be a group of messages sharing a theme or similar content.
  • the similar content may involve market data relating to the market activity of specific market participants of a plurality of market participants over a period of time.
  • This type of group of messages may be considered a singular summary message.
  • a summary message may contain a significant amount of information relating to market activity.
  • TCP Transmission Control Protocol
  • UDP User Datagram Protocol
  • the amount of information that would be sent with the summary message would require multiple packets, datagrams, or messages to be sent as a singular communication.
  • the multiple packets or datagrams of the communication may be considered a set of messages.
  • Figure 7 depicts a flow chart showing operation of the message receipt device 250 of Figure 6.
  • the operation may include receiving the first message (Block 350), receiving the second message (Block 360), and removing the obfuscation of data in the first message with key data contained in the second message (Block 370).
  • An embodiment involves receiving (Block 350) the first financial message from system 200 using the network 214.
  • the first financial message comprising market data, at least a portion of which is obfuscated such that the obfuscated portion of the first market data is incomprehensible without associated key data configured to decode, or render comprehensible, the obfuscated data.
  • An embodiment involves retrieving (Block 360) the second message transmitted to a plurality of market participants the first financial message from system 200 using the network 214.
  • the second message comprising the associated key data configured to decode, or render comprehensible, the obfuscated market data of first message.
  • An embodiment involves removing (Block 370) the obfuscation of the obfuscated market data of the first financial message using the key data from the second financial message. Removing the obfuscation may involve decoding, deciphering, un- encrypting, or any other method of rendering the obfuscated market data comprehensible.
  • Figure 9 depicts a flow chart showing another operation of the message receipt device 250 of Figure 6.
  • the operation may include receiving a subset of a set of messages (Block 950) that has obfuscated content, receiving another message of the set of messages (Block 960) that has been augmented with key data configured to remove the obfuscation of the subset of messages, and removing the obfuscation of data in the subset of messages with key data contained in the augmented message (Block 970).
  • the computer system 400 can include a set of instructions that can be executed to cause the computer system 400 to perform any one or more of the methods or computer based functions disclosed herein.
  • the computer system 400 may operate as a standalone device or may be connected, e.g., using a network, to other computer systems or peripheral devices. Any of the components discussed above, such as the processor 202, may be a computer system 400 or a component in the computer system 400.
  • the computer system 400 may implement a match engine, margin processing, payment or clearing function on behalf of an exchange, such as the Chicago Mercantile Exchange, of which the disclosed embodiments are a component thereof.
  • the computer system 400 may operate in the capacity of a server or as a client user computer in a client-server user network environment, or as a peer computer system in a peer-to-peer (or distributed) network environment.
  • the computer system 400 can also be implemented as or incorporated into various devices, such as a personal computer (PC), a tablet PC, a set-top box (STB), a personal digital assistant (PDA), a mobile device, a palmtop computer, a laptop computer, a desktop computer, a communications device, a wireless telephone, a land-line telephone, a control system, a camera, a scanner, a facsimile machine, a printer, a pager, a personal trusted device, a web appliance, a network router, switch or bridge, or any other machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
  • PC personal computer
  • PDA personal digital assistant
  • the computer system 400 can be implemented using electronic devices that provide voice, video or data communication.
  • the term "system” shall also be taken to include any collection of systems or sub-systems that individually or jointly execute a set, or multiple sets, of instructions to perform one or more computer functions.
  • the computer system 400 may include a processor 402, e.g., a central processing unit (CPU), a graphics processing unit (GPU), or both.
  • the processor 402 may be a component in a variety of systems.
  • the processor 402 may be part of a standard personal computer or a workstation.
  • the processor 402 may be one or more general processors, digital signal processors, application specific integrated circuits, field programmable gate arrays, servers, networks, digital circuits, analog circuits, combinations thereof, or other now known or later developed devices for analyzing and processing data.
  • the processor 402 may implement a software program, such as code generated manually (i.e., programmed).
  • the computer system 400 may include a memory 404 that can communicate via a bus 408.
  • the memory 404 may be a main memory, a static memory, or a dynamic memory.
  • the memory 404 may include, but is not limited to computer readable storage media such as various types of volatile and non-volatile storage media, including but not limited to random access memory, read-only memory, programmable read-only memory, electrically programmable read-only memory, electrically erasable read-only memory, flash memory, magnetic tape or disk, optical media and the like.
  • the memory 404 includes a cache or random access memory for the processor 402.
  • the memory 404 is separate from the processor 402, such as a cache memory of a processor, the system memory, or other memory.
  • the memory 404 may be an external storage device or database for storing data. Examples include a hard drive, compact disc (“CD”), digital video disc (“DVD”), memory card, memory stick, floppy disc, universal serial bus (“USB”) memory device, or any other device operative to store data.
  • the memory 404 is operable to store instructions executable by the processor 402.
  • the functions, acts or tasks illustrated in the figures or described herein may be performed by the programmed processor 402 executing the instructions 412 stored in the memory 404.
  • the functions, acts or tasks are independent of the particular type of instructions set, storage media, processor or processing strategy and may be performed by software, hardware, integrated circuits, firm-ware, micro-code and the like, operating alone or in combination.
  • processing strategies may include multiprocessing, multitasking, parallel processing and the like.
  • the computer system 400 may further include a display unit 414, such as a liquid crystal display (LCD), an organic light emitting diode (OLED), a flat panel display, a solid state display, a cathode ray tube (CRT), a projector, a printer or other now known or later developed display device for outputting determined
  • a display unit 414 such as a liquid crystal display (LCD), an organic light emitting diode (OLED), a flat panel display, a solid state display, a cathode ray tube (CRT), a projector, a printer or other now known or later developed display device for outputting determined
  • the display 414 may act as an interface for the user to see the functioning of the processor 402, or specifically as an interface with the software stored in the memory 404 or in the drive unit 406.
  • the computer system 400 may include an input device 416 configured to allow a user to interact with any of the components of system 400.
  • the input device 416 may be a number pad, a keyboard, or a cursor control device, such as a mouse, or a joystick, touch screen display, remote control or any other device operative to interact with the system 400.
  • the computer system 400 may also include a disk or optical drive unit 406.
  • the disk drive unit 406 may include a computer-readable medium 410 in which one or more sets of instructions 412, e.g.
  • the instructions 412 may embody one or more of the methods or logic as described herein.
  • the instructions 412 may reside completely, or at least partially, within the memory 404 and/or within the processor 402 during execution by the computer system 400.
  • the memory 404 and the processor 402 also may include computer-readable media as discussed above.
  • the present disclosure contemplates a computer-readable medium that includes instructions 412 or receives and executes instructions 412 responsive to a propagated signal, so that a device connected to a network 420 can communicate voice, video, audio, images or any other data over the network 420. Further, the instructions 412 may be transmitted or received over the network 420 via a communication interface 418.
  • the communication interface 418 may be a part of the processor 402 or may be a separate component.
  • the communication interface 418 may be created in software or may be a physical connection in hardware.
  • the communication interface 418 is configured to connect with a network 420, external media, the display 414, or any other components in system 400, or combinations thereof.
  • the connection with the network 420 may be a physical connection, such as a wired Ethernet connection or may be established wirelessly as discussed below.
  • the additional connections with other components of the system 400 may be physical connections or may be established wirelessly.
  • the network 420 may include wired networks, wireless networks, or combinations thereof.
  • the wireless network may be a cellular telephone network, an 802.1 1 , 802.16, 802.20, or WiMax network.
  • the network 420 may be a public network, such as the Internet, a private network, such as an intranet, or combinations thereof, and may utilize a variety of networking protocols now available or later developed including, but not limited to TCP/IP based networking protocols.
  • Embodiments of the subject matter and the functional operations described in this specification can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them.
  • Embodiments of the subject matter described in this specification can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a computer readable medium for execution by, or to control the operation of, data processing apparatus. While the computer-readable medium is shown to be a single medium, the term "computer-readable medium" includes a single medium or multiple media, such as a centralized or distributed database, and/or associated caches and servers that store one or more sets of instructions.
  • the term "computer-readable medium” shall also include any medium that is capable of storing, encoding or carrying a set of instructions for execution by a processor or that cause a computer system to perform any one or more of the methods or operations disclosed herein.
  • the computer readable medium can be a machine-readable storage device, a machine -readable storage substrate, a memory device, or a combination of one or more of them.
  • data processing apparatus encompasses all apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, or multiple processors or computers.
  • the apparatus can include, in addition to hardware, code that creates an execution environment for the computer program in question, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of one or more of them.
  • the computer-readable medium can include a solid-state memory such as a memory card or other package that houses one or more non-volatile read-only memories. Further, the computer-readable medium can be a random access memory or other volatile re-writable memory.
  • the computer-readable medium can include a magneto-optical or optical medium, such as a disk or tapes or other storage device to capture carrier wave signals such as a signal communicated over a transmission medium.
  • a digital file attachment to an e-mail or other self-contained information archive or set of archives may be considered a distribution medium that is a tangible storage medium. Accordingly, the disclosure is considered to include any one or more of a computer-readable medium or a distribution medium and other equivalents and successor media, in which data or instructions may be stored.
  • dedicated hardware implementations such as application specific integrated circuits, programmable logic arrays and other hardware devices, can be constructed to implement one or more of the methods described herein.
  • Applications that may include the apparatus and systems of various embodiments can broadly include a variety of electronic and computer systems.
  • One or more embodiments described herein may implement functions using two or more specific interconnected hardware modules or devices with related control and data signals that can be
  • the present system encompasses software, firmware, and hardware implementations.
  • the methods described herein may be implemented by software programs executable by a computer system.
  • implementations can include distributed processing, component/object distributed processing, and parallel processing.
  • virtual computer system processing can be constructed to implement one or more of the methods or functionality as described herein.
  • a computer program also known as a program, software, software
  • application, script, or code can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a standalone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
  • a computer program does not necessarily correspond to a file in a file system.
  • a program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple
  • coordinated files e.g., files that store one or more modules, sub programs, or portions of code.
  • a computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
  • the processes and logic flows described in this specification can be performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output.
  • the processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
  • processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and anyone or more processors of any kind of digital computer.
  • a processor will receive instructions and data from a read only memory or a random access memory or both.
  • the essential elements of a computer are a processor for performing instructions and one or more memory devices for storing instructions and data.
  • a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks.
  • mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks.
  • a computer need not have such devices.
  • a computer can be embedded in another device, e.g., a mobile telephone, a personal digital assistant (PDA), a mobile audio player, a Global Positioning System (GPS) receiver, to name just a few.
  • Computer readable media suitable for storing computer program instructions and data include all forms of non volatile memory, media and memory devices, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto optical disks; and CD ROM and DVD-ROM disks.
  • the processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
  • a device having a display, e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to the user and a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer.
  • a display e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor
  • a keyboard and a pointing device e.g., a mouse or a trackball
  • Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input.
  • Embodiments of the subject matter described in this specification can be implemented in a computing system that includes a back end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the subject matter described in this specification, or any combination of one or more such back end, middleware, or front end components.
  • the components of the system can be
  • Examples of communication networks include a local area network (“LAN”) and a wide area network (“WAN”), e.g., the Internet.
  • LAN local area network
  • WAN wide area network
  • the computing system can include clients and servers.
  • a client and server are generally remote from each other and typically interact through a communication network.
  • the relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
  • the illustrations of the embodiments described herein are intended to provide a general understanding of the structure of the various embodiments. The illustrations are not intended to serve as a complete description of all of the elements and features of apparatus and systems that utilize the structures or methods described herein. Many other embodiments may be apparent to those of skill in the art upon reviewing the disclosure. Other embodiments may be utilized and derived from the disclosure, such that structural and logical substitutions and changes may be made without departing from the scope of the disclosure. Additionally, the illustrations are merely representational and may not be drawn to scale. Certain proportions within the illustrations may be exaggerated, while other proportions may be minimized. Accordingly, the disclosure and the figures are to be regarded as illustrative rather than restrictive.
  • inventions of the disclosure may be referred to herein, individually and/or collectively, by the term "invention" merely for convenience and without intending to voluntarily limit the scope of this application to any particular invention or inventive concept.
  • inventions may be referred to herein, individually and/or collectively, by the term "invention" merely for convenience and without intending to voluntarily limit the scope of this application to any particular invention or inventive concept.
  • specific embodiments have been illustrated and described herein, it should be appreciated that any subsequent arrangement designed to achieve the same or similar purpose may be substituted for the specific embodiments shown.
  • This disclosure is intended to cover any and all subsequent adaptations or variations of various embodiments. Combinations of the above embodiments, and other embodiments not specifically described herein, will be apparent to those of skill in the art upon reviewing the description.

Abstract

Methods, devices, and systems for communicating market data with market participants may involve obfuscating at least a portion of financial messages. Communicating the market data also involves augmenting a financial message with a key configured to remove the obfuscation from the obfuscated portion of the financial messages. The market data is ultimately communicated by transmitting the financial messages to a plurality of participants. The plurality of participants may then use the key from the financial message to remove the obfuscation of the other financial messages.

Description

SECURE EXCHANGE FEED MARKET DATA EMBARGO
REFERENCE TO RELATED APPLICATIONS
[0001] This application is a continuation-in-part under 37 C.F.R. § 1.53(b) of U.S. Pat. Application Ser. No. 14/034,742 filed September 24, 2013 (Attorney Docket No.
4672/13009 AUS) now U.S. Pat. No. , the entire disclosure of which is hereby incorporated by reference.
BACKGROUND
[0002] A financial instrument trading system, such as a futures exchange, referred to herein also as an "Exchange", such as the Chicago Mercantile Exchange Inc. (CME), provides a contract market where financial instruments, for example futures and options on futures, are traded. Futures is a term used to designate all contracts for the purchase or sale of financial instruments or physical commodities for future delivery or cash settlement on a commodity futures exchange. A futures contract is a legally binding agreement to buy or sell a commodity at a specified price at a predetermined future time. An option is the right, but not the obligation, to sell or buy the underlying instrument (in this case, a futures contract) at a specified price within a specified time. The commodity to be delivered in fulfillment of the contract, or alternatively the commodity for which the cash market price shall determine the final settlement price of the futures contract, is known as the contract's underlying reference or "underlier." The terms and conditions of each futures contract are standardized as to the specification of the contract's underlying reference commodity, the quality of such commodity, quantity, delivery date, and means of contract settlement. Cash Settlement is a method of settling a futures contract whereby the parties effect final settlement when the contract expires by paying/receiving the loss/gain related to the contract in cash, rather than by effecting physical sale and purchase of the underlying reference commodity at a price determined by the futures contract, price.
[0003] Typically, the Exchange provides for a centralized "clearing house" through which all trades made must be confirmed, matched, and settled each day until offset or delivered. The clearing house is an adjunct to the Exchange, and may be an operating division of the Exchange, which is responsible for settling trading accounts, clearing trades, collecting and maintaining performance bond funds, regulating delivery, and reporting trading data. The essential role of the clearing house is to mitigate credit risk. Clearing is the procedure through which the Clearing House becomes buyer to each seller of a futures contract, and seller to each buyer, also referred to as a novation, and assumes responsibility for protecting buyers and sellers from financial loss due to breach of contract, by assuring performance on each contract. A clearing member is a firm qualified to clear trades through the Clearing House.
[0004] Current financial instrument trading systems allow traders to submit orders and receive confirmations, market data, and other information electronically via a network. These "electronic" marketplaces have largely supplanted the pit based trading systems whereby the traders, or their representatives, all physically stand in a designated location, i.e. a trading pit, and trade with each other via oral and hand based communication. Anyone standing in or near the trading pit may be privy to the trades taking place, i.e. both who is trading and what they are trading, allowing, for example, one participant to derive and/or undermine another participant's trading strategy and thereby garner an unfair advantage or otherwise skew the market. Electronic trading systems, in contrast, ideally attempt offer a more efficient, fair and balanced market where market prices reflect a true consensus of the value of traded products among the market participants, where the intentional or unintentional influence of any one market participant is minimized if not eliminated, and where unfair or inequitable advantages with respect to information access are minimized if not eliminated.
[0005] Electronic marketplaces attempt to achieve these goals by separating and restricting the communication of private data, e.g. orders and the responses thereto, from public data, e.g. market data, prices, etc. published to all participants. However, as more traders place more trades, the volume of data being communicated increases as well, increasing the burden on the communication infrastructure and supporting resources that are used to generate and transmit the communications in this manner.
BRIEF DESCRIPTION OF THE DRAWINGS
[0006] Figure 1 depicts an illustrative computer network system that may be used to implement aspects of the disclosed embodiments. [0007] Figure 2 depicts a block diagram of a message management module and a message receipt device for use in the system of Figure 1.
[0008] Figure 3 depicts a flow chart for managing the communication of financial messages that may be implemented using the system of Figures 1 and 2.
[0009] Figure 4 shows an illustrative embodiment of a general computer system for use with the system of Figure 1.
[0010] Figure 5 depicts a diagram for managing the communication of market data with financial messages.
[0011] Figure 6 depicts a message receipt device or system for use with the
communication of financial messages.
[0012] Figure 7 depicts a flow chart for the communication of financial messages that may be implemented using the system of Figures 1 and 6.
[0013] Figure 8 depicts a flow chart for managing the communication of financial messages that may be implemented using the system of Figures 1 and 2.
[0014] Figure 9 depicts a flow chart for the communication of financial messages that may be implemented using the system of Figures 1 and 6.
[0015] Figure 10 depicts a diagram for managing the communication of market data with financial messages.
DETAILED DESCRIPTION
[0016] The separation of private market data message generation and transmission from the generation and transmission of corresponding public market data messages may result in a situation where private data is communicated before, or the transmission thereof otherwise overtakes the transmission of, corresponding public data, thus potentially providing market information to the recipient of the private data prior to other market participants. This prior reception of market information may be an undesirable occurrence due to possible market information imbalances for market participants. The disclosed embodiments relate to communication of financial messages from an Exchange, such as the Chicago Mercantile Exchange ("CME"), to market participants whereby messages directed to particular market participants may be wholly or in part encoded, disguised, or otherwise obfuscated such that private market data contained in the messages is not recognizable by the particular market participant. The obfuscation of the private market data may be designed such that data needed to remove the disguise or otherwise de-obfuscate the data is provided in another message directed to all market participants which may further contain data related to the private market data but intended for public dissemination. The particular market participant may receive the data needed to de-obfuscate the private market data from the message directed to all market participants, thus ensuring that the obfuscated private market data cannot be understood by the particular market participant until the message directed to all market participants is received. In this way, the advantage of the particular market participant due to receiving messages with private market data prior to other market participants receiving
corresponding public market data is removed.
[0017] Further, if market data relating to the specific activity of multiple market participants was accumulated into a summary message to provide all participants with the same data at the same time, the message may be sized such that multiple packets may be needed to relay all of the information. As such, market participants finding data relating to their particular activities, or other activities of interest, in earlier received packets may attempt to leverage the earlier received information to develop an advantage in the marketplace.
[0018] Alternatively, or in addition thereto, the market data specific to particular market participants may be integrated into public messages with obfuscated content communicated on a public feed. The data needed to de-obfuscate the public messages may be communicated with a subsequent message to all market participants such that all market participants will be sent the de-obfuscation data at the same time. As such, the timing of the release of the obfuscated data to all the market participants may be controlled based on the transmission of the message with the de-obfuscation data. In this way, the advantage of a particular market participant having received market data via earlier sent messages may be mitigated or removed.
[0019] In one embodiment, the public messages may be multiple components of a singular message containing summary data relating to market activity of particular market participants over a period of time. As such, the de-obfuscation data may be included with one of the message components, and the timing of the release of the obfuscated data of the message as a whole may be controlled based on the transmission of the message component having the de-obfuscation data. [0020] While the disclosed embodiments may be discussed in relation to futures and/or options on futures trading, it will be appreciated that the disclosed embodiments may be applicable to any equity, options or futures trading system or market now available or later developed. It will be appreciated that a trading environment, such as a futures exchange as described herein, implements one or more economic markets where rights and obligations may be traded. As such, a trading environment may be characterized by a need to maintain market integrity, transparency, predictability, fair/equitable access and participant expectations with respect thereto. For example, an exchange must respond to inputs, such as trader orders, cancellation, etc., in a manner as expected by the market participants, such as based on market data, e.g. prices, available counter-orders, etc., to provide an expected level of certainty that transactions will occur in a consistent and predictable manner and without unknown or unascertainable risks. In addition, it will be appreciated that electronic trading systems further impose additional expectations and demands by market participants as to transaction processing speed, latency, capacity and response time, while creating additional complexities relating thereto. Accordingly, as will be described, the disclosed embodiments may further include functionality to ensure that the expectations of market participant are met, e.g. that transactional integrity and predictable system responses are maintained.
[0021] As was discussed above, electronic trading systems ideally attempt to offer an efficient, fair and balanced market where market prices reflect a true consensus of the value of products traded among the market participants, where the intentional or unintentional influence of any one market participant is minimized if not eliminated, and where unfair or inequitable advantages with respect to information access are minimized if not eliminated.
[0022] The outbound responses to incoming orders and requests are typically communicated via a medium, e.g. a channel or connection, referred to as a "feed," that is separate from the market information feed which is generally broadcast to all of the market participants. This generally prevents any one market participant from monitoring the specific trading activities of another market participant and prevents, for example, any one participant from influencing other market participants and/or deriving and/or undermining another participant's trading strategy and thereby garnering an unfair advantage or otherwise allowing them to skew or influence the market. [0023] The disclosed embodiments recognize, however, that the market data messages, e.g. order book updates, are typically responsive to incoming messages from market participants, e.g. price update messages sent in response to trade orders, etc., which may have been received at any prior time. Accordingly, a given market data message broadcast to all market participants in response to an incoming request message may be duplicative of a response message sent specifically to the sender of that request message who is also receiving the broadcasted market data message. For example, a market participant submitting a request, such as a new trade order, order modification, or order cancellation, which impacts the market, e.g. causes a change in price of one or more traded products, may receive confirmation of the processing of their request before the remaining market participants learn of the impact via an update to the market data. This discrepancy, which may be on the scale of milliseconds, microseconds, or even nanoseconds, may allow the submitting market participant to unfairly take advantage of the market impact, such as by submitting additional orders, etc., before the remaining market participants can react.
[0024] Solutions to the inefficiencies and inequities described above include generally reducing the requisite bandwidth of the communications, such as via encoding or compression mechanisms, and introducing mechanisms, such as buffers, to align, equalize or otherwise normalize the latencies of the separate communications paths. However, while reducing the bandwidth required for each of the feeds attempts to address inefficiency, such reductions are system and hardware dependent in their effectiveness. Further, attempts to achieve parity in terms of latency between two different data feeds publishing the same data has generally been a "best effort" solution. That is, while inherent latencies may be accounted for, it is difficult, for example, to account for transient events, such as errors or interference, which may introduce additional and likely substantially random latencies. Further, it will be appreciated that regulators are motivated to seek parity between those latencies, whereas market participants seeking a trading advantage are motivated by a timing advantage in order entry timing relative to market data. The discrepancies lead market participants to attempt to game the market and regulators to impose onerous regulations in a counter-attempt thereto.
[0025] As used herein, a financial message refers both to messages communicated by market participants to an electronic trading system and vice versa. Financial messages communicated to the electronic trading system, also referred to as "inbound" messages, may include request messages, such as trader orders, order modifications, order cancellations and the like, as well as other message types. Financial messages
communicated from the electronic trading system, referred to as "outbound" messages, may include messages responsive to inbound messages, such as confirmation messages, or other messages such as market update messages, quote messages, and the like.
[0026] Financial messages may further be categorized as having or reflecting an impact on a market, also referred to as an "order book" or "book," for a traded product, such as a prevailing price therefore, etc., or not having or reflecting an impact on a market or a subset or portion thereof. For example a request to place a trade may result in a response indicative of the trade either being matched with, or being rested on an order book to await a suitable counter-order. In some cases, requests may elicit a non- impacting response, such as confirmatory response issued temporally proximate to the receipt of the request and then cause a separate market-impact reflecting response at a later time. For example, a stop order, fill or kill order, aka an immediate or cancel order, or other conditional request may not have an immediate market impacting effect, if at all, until the requisite conditions are met. Accordingly, an acknowledgement or confirmation of receipt, e.g. a non-market impacting communication, may be sent to the trader simply confirming that the order was received. Upon the conditions being met and a market impacting result thereof occurring, a market-impacting message may be transmitted as described herein. It will be appreciated that additional conditions may be specified, such as a time or price limit, which may cause the order to be dropped or otherwise canceled and that such an event may result in another non-market-impacting communication instead. In some implementations market impacting communications may be
communicated separately from non-market impacting communications, such as via a separate communications channel or feed. It will be further appreciated that various types of market data feeds may be provided which reflect different market or aspects thereof. Market participants may then, for example, subscribe to receive those feeds of interest to them. For example, a particular market data feed may only communicate information related to the top buy/sell prices for a particular product, referred to as "top of book" feed. In this case, a request message may be considered market-impacting only if it affects the top buy/sell prices and otherwise is considered non-market-impacting. As market impacting communications tend to be more important to market participants then non impacting communications, this separation may reduce congestion and or noise among those communications having or reflecting an impact on a market or portion thereof. Generally, the disclosed embodiments relate to obfuscating the market data having a market impact reflecting response messages, e.g. responsive to inbound messages, with other market impact reflecting messages as will be described.
[0027] Market data feeds may further be characterized as providing a "view" or "overview" of a given market, an aggregation or a portion thereof. For example, a market data feed may convey the entire state of a market for a particular product, e.g. all presently resting buy/sell orders and prices associated therewith as well as trade notifications, etc., only a portion of a market, e.g. only the top 10 resting buy/sell orders, and/or an aggregation of multiple markets or portions thereof. As used herein, a market impacting request may be said to impact the "view" of the market as presented via the market data feed.
[0028] Various types of market data feeds may be provided by electronic trading systems, such as the CME, in order to provide different types or subsets of market information or to provide such information in different formats. Examples include Market By Order, Market Depth (aka Market by Price to a designated depth of the book), e.g. CME offers a 10-deep market by price feed, Top of Book (a single depth Market by Price feed), and combinations thereof. There may also be all manner of specialized feeds in terms of the content, i.e. providing, for example, derived data, such as a calculated index). It will be appreciated that number, type and manner of market data feeds provided by an electronic trading system are implementation dependent and may vary depending upon the types of products traded by the electronic trading system, customer/trader preferences, bandwidth and data processing limitations, etc. and that all such feeds, now available of later developed, are contemplated herein.
[0029] Generally, the disclosed embodiments create a practical impediment to consuming market information contained in messages sent only to particular market participants. This impediment is based on an obfuscation, or lock, of the market information, and the inability of the particular market participant to remove obfuscation without a corresponding key that is delivered in a public message delivered to all market participants. While the degree to which the obfuscation is defeatable without the corresponding key may vary, in one embodiment the obfuscation need only be sufficient so as to delay any attempts to defeat the obfuscation without the corresponding key for enough time to ensure that other market participants will have the public information before the recipient can defeat the obfuscation. Therefore, any latencies that exist in the system that would cause a private message, or prior transmitted public message, to arrive at a particular market participant before a public message containing key data arrives at all of the market participants would be mitigated by the inability of the particular market participant to consume, use, or understand the market data of the private message, or prior transmitted public message, upon receipt. Essentially, the private market data will be held in a knowledge embargo until the public message containing key data allows for removal thereof.
[0030] In one embodiment, obfuscation may be provided through encryption techniques. For example, the market data intended to be disguised may be obfuscated through the use of an encryption algorithm such that the content of the data is
incomprehensible to any human or machine without the use of key data configured to decrypt, or make comprehensible, the obfuscated market data. The key data, or encryption key, may be provided separately to control access to the obfuscated, or encrypted, data. For example, the encryption key may be provided with, or as a part of, a public message transmitted by an exchange to participants of a market. A particular market participant that receives the public message may use the encryption key to un- encrypt, or decode, a previously received private or public message having market data encrypted by an algorithm designed to be decoded by the encryption key.
[0031] In an embodiment, private messages with encrypted data will have a particular corresponding encryption key to decode the encrypted data. A particular market participant may determine which public message contains the corresponding encryption key based on an identifier or other correlating indicium that is transmitted with a private message, but not obfuscated. The identifier may identify, or indicate, the public message that contains the corresponding key. For example, the identifier may be a number, and the number matches a number provided with the public message that contains the corresponding key. It will be appreciated that there may be other ways in which the private data message may be correlated with the public data message comprising the key data therefore, and all such methods are contemplated herein. [0032] In one embodiment, unique encryption keys, i.e. dummy or decoy unique keys, may be included with outbound public messages so as to further normalize the format and/or appearance of public messages. In this way, all messages may be presented with a similar appearance to the market participants, and it may be more difficult to infer market information from the mere existence of an encryption key in a public message. Also, multiple encryption keys, dummy keys, or combinations thereof may be provided with a public message. For example, multiple encryption keys may be included with a public message that discloses information reflected in multiple private messages. Multiple dummy keys may then be required to normalize the appearance of public messages that do not have multiple encryption keys included. Also, random numbers of dummy keys may be generated and included with messages to further obscure the existence or intent of the actual encryption keys.
[0033] In accordance with aspects of the disclosure, systems and methods are disclosed for managing communication of financial messages. The disclosed
embodiments are preferably implemented with computer devices and computer networks, such as those described with respect Figure 4, that allow users, e.g. market participants, to exchange trading information. It will be appreciated that the plurality of entities utilizing the disclosed embodiments, e.g. the market participants, may be referred to by other nomenclature reflecting the role that the particular entity is performing with respect to the disclosed embodiments and that a given entity may perform more than one role depending upon the implementation and the nature of the particular transaction being undertaken, as well as the entity's contractual and/or legal relationship with another market participant and/or the exchange.
[0034] A diagram for managing the communication of market data over networks 532 and 534 to a plurality of market participants 550 and 540 with financial messages 510 and 530 is shown in Figure 5. For example, a particular market participant 540 may place an order with an exchange 505 using a network 532. The exchange 505 may respond to the order by sending a private message 510 over the private circuit network 532 to the particular market participant 540. The private message 510 is locked or obfuscated in a manner that does not allow the particular market participant 540 to know the content of the private message 510. The exchange 505 may also generate a public message 520 and send it using a multicast circuit network 534. In an embodiment, the multicast circuit network 534 may be considered a public network. In another embodiment, the multicast circuit network 534 may be a collection of private circuit networks for a plurality of market participants 540. A key designed to unlock the content of the private message 510 may be included with the public message 520. When the public message 520 is transmitted using the multicast network 534, both the particular market participant 540 and the other market participants 550 may receive the public message 520. The particular market participant will then be able to use the key in the public message 520 to unlock the content of the private message 510.
[0035] Similarly, a diagram for managing the communication of market data over a network 955 to a plurality of market participants 950 with financial messages 960, 965 is shown in Figure 10. For example, the Exchange 970 may communicate market data to market participants 950 using financial messages 960, 961 , 962, 963, 965 intended for each of the market participants 950 over a multicast circuit network 955. A group of the financial messages 960, 961 , 962, 963 may be obfuscated. Another financial message 965 may contain a key that may be used to un-obfuscate the group of obfuscated financial messages 960, 961 , 962, 963. Upon receipt of the market message 965 having the key, the market participants 950 will be able to use the key to un-obfuscate the group of obfuscated financial messages 960, 961 , 962, 963. In this way, the Exchange may be able to control the timing of the release of the obfuscated content of the group of obfuscated financial messages 960, 961 , 962, 963 through the transmission of the keyed message 965. In an embodiment, all the financial messages 960, 961 , 962, 963, 965 may be considered a set of messages, with the group of obfuscated financial messages 960, 961 , 962, 963 considered a subset of the set. Further, in an embodiment all the financial messages 960, 961 , 962, 963, 965 may be components of a larger message that has been sectioned into multiple messages sized appropriately for transmission using the network 955. Also, all the financial messages 960, 961 , 962, 963, 965 may be sent using a common feed for all the market participants 950.
[0036] An exemplary trading network environment for implementing trading systems and methods is shown in Figure 1. An exchange computer system 100 receives orders and transmits market data related to orders and trades to users, such as via wide area network 126 and/or local area network 124 and computer devices 1 14, 1 16, 1 18, 120 and 122, as will be described below, coupled with the exchange computer system 100. [0037] Herein, the phrase "coupled with" is defined to mean directly connected to or indirectly connected through one or more intermediate components. Such intermediate components may include both hardware and software based components. Further, to clarify the use in the pending claims and to hereby provide notice to the public, the phrases "at least one of <A>, <B>, ... and <N>" or "at least one of <A>, <B>, ... <N>, or combinations thereof are defined by the Applicant in the broadest sense, superseding any other implied definitions herebefore or hereinafter unless expressly asserted by the Applicant to the contrary, to mean one or more elements selected from the group comprising A, B, ... and N, that is to say, any combination of one or more of the elements A, B, ... or N including any one element alone or in combination with one or more of the other elements which may also include, in combination, additional elements not listed.
[0038] The exchange computer system 100 may be implemented with one or more mainframe, desktop or other computers, such as the computer 400 described below with respect to Figure 4. A user database 102 may be provided which includes information identifying traders and other users of exchange computer system 100, such as account numbers or identifiers, user names and passwords. An account data module 104 may be provided which may process account information that may be used during trades. A match engine module 106 may be included to match bid and offer prices and may be implemented with software that executes one or more algorithms for matching bids and offers. A trade database 108 may be included to store information identifying trades and descriptions of trades. In particular, a trade database may store information identifying the time that a trade took place and the contract price. An order book module 1 10 may be included to compute or otherwise determine current bid and offer prices. A market data module 1 12 may be included to collect market data and prepare the data for transmission to users. A risk management module 134 may be included to compute and determine a user's risk utilization in relation to the user's defined risk thresholds. An order processing module 136 may be included to decompose delta based and bulk order types for processing by the order book module 1 10 and/or match engine module 106. A message management module 140 may be included to, among other things, control the rate of acceptance of mass quote messages in accordance with one or more aspects of the disclosed embodiments. It will be appreciated that concurrent processing limits may be defined by or imposed separately or in combination, as was described above, on one or more of the trading system components, including the user database 102, the account data module 104, the match engine module 106, the trade database 108, the order book module 1 10, the market data module 1 12, the risk management module 134, the order processing module 136, or other component of the exchange computer system 100.
[0039] In an embodiment, the message management module 140 may include a message generator configured to generate a first message with at least a portion of the first message obfuscated such that the obfuscated portion of the first message is incomprehensible without associated key data configured to make the obfuscated portion comprehensible, and generate the second message comprising the associated key data. The message management module 140 may also involve a message transmitter configured to transmit the first message to a first market participant and the second message to a plurality of market participants.
[0040] In another embodiment, the message management module 140 may be configured for generating for managing communication of a set of financial messages to a plurality of market participants via a network, the set of financial messages including market data intended to be received and comprehended by all of the plurality of market participants. The message management module 140 may include a message generator configured to generate a subset of the set of financial messages with at least a portion of the market data of the subset of the financial messages obfuscated such that the obfuscated content of the subset is incomprehensible to the plurality of market participants without associated key data configured to render the obfuscated data comprehensible thereto, and generate a message of the set of financial messages augmented with the associated key data. The message management module 140 may include a message transmitter configured to transmit the obfuscated subset and the augmented message to the plurality of market participants, the augmented message transmitted subsequent to the subset of the financial messages
[0041] The trading network environment shown in Figure 1 includes exemplary computer devices 1 14, 1 16, 1 18, 120 and 122 which depict different exemplary methods or media by which a computer device may be coupled with the exchange computer system 100 or by which a user may communicate, e.g. send and receive, trade or other information therewith. It will be appreciated that the types of computer devices deployed by traders and the methods and media by which they communicate with the exchange computer system 100 is implementation dependent and may vary and that not all of the depicted computer devices and/or means/media of communication may be used and that other computer devices and/or means/media of communications, now available or later developed may be used. Each computer device, which may comprise a computer 400 described in more detail below with respect to Figure 4, may include a central processor that controls the overall operation of the computer and a system bus that connects the central processor to one or more conventional components, such as a network card or modem. Each computer device may also include a variety of interface units and drives for reading and writing data or files and communicating with other computer devices and with the exchange computer system 100. Depending on the type of computer device, a user can interact with the computer with a keyboard, pointing device, microphone, pen device or other input device now available or later developed.
[0042] An exemplary computer device 1 14 is shown directly connected to exchange computer system 100, such as via a Tl line, a common local area network (LAN) or other wired and/or wireless medium for connecting computer devices, such as the network 420 shown in Figure 4 and described below with respect thereto. The exemplary computer device 1 14 is further shown connected to a radio 132. The user of radio 132, which may include a cellular telephone, smart phone, or other wireless proprietary and/or nonproprietary device, may be a trader or exchange employee. The radio user may transmit orders or other information to the exemplary computer device 1 14 or a user thereof. The user of the exemplary computer device 1 14, or the exemplary computer device 1 14 alone and/or autonomously, may then transmit the trade or other information to the exchange computer system 100.
[0043] Exemplary computer devices 1 16 and 1 18 are coupled with a local area network ("LAN") 124 which may be configured in one or more of the well-known LAN topologies, e.g. star, daisy chain, etc., and may use a variety of different protocols, such as Ethernet, TCP/IP, etc. The exemplary computer devices 1 16 and 1 18 may
communicate with each other and with other computer and other devices which are coupled with the LAN 124. Computer and other devices may be coupled with the LAN 124 via twisted pair wires, coaxial cable, fiber optics or other wired or wireless media. As shown in Figure 1 , an exemplary wireless personal digital assistant device ("PDA") 122, such as a mobile telephone, tablet based compute device, or other wireless device, may communicate with the LAN 124 and/or the Internet 126 via radio waves, such as via WiFi, Bluetooth and/or a cellular telephone based data communications protocol. PDA 122 may also communicate with exchange computer system 100 via a conventional wireless hub 128.
[0044] Figure 1 also shows the LAN 124 coupled with a wide area network ("WAN") 126 which may be comprised of one or more public or private wired or wireless networks. In one embodiment, the WAN 126 includes the Internet 126. The LAN 124 may include a router to connect LAN 124 to the Internet 126. Exemplary computer device 120 is shown coupled directly to the Internet 126, such as via a modem, DSL line, satellite dish or any other device for connecting a computer device to the Internet 126 via a service provider therefore as is known. LAN 124 and/or WAN 126 may be the same as the network 420 shown in Figure 4 and described below with respect thereto.
[0045] As was described above, the users of the exchange computer system 100 may include one or more market makers 130 which may maintain a market by providing constant bid and offer prices for a derivative or security to the exchange computer system 100, such as via one of the exemplary computer devices depicted. The exchange computer system 100 may also exchange information with other trade engines, such as trade engine 138. One skilled in the art will appreciate that numerous additional computers and systems may be coupled to exchange computer system 100. Such computers and systems may include clearing, regulatory and fee systems.
[0046] The operations of computer devices and systems shown in Figure 1 may be controlled by computer-executable instructions stored on a non-transitory computer- readable medium. For example, the exemplary computer device 1 16 may include computer-executable instructions for receiving order information from a user and transmitting that order information to exchange computer system 100. In another example, the exemplary computer device 1 18 may include computer-executable instructions for receiving market data from exchange computer system 100 and displaying that information to a user.
[0047] Of course, numerous additional servers, computers, handheld devices, personal digital assistants, telephones and other devices may also be connected to exchange computer system 100. Moreover, one skilled in the art will appreciate that the topology shown in Figure 1 is merely an example and that the components shown in Figure 1 may include other components not shown and be connected by numerous alternative topologies.
[0048] As shown in Figure 1 , the Exchange computer system 100 further includes a message management module 140 which may implement, in conjunction with the market data module 1 12, the disclosed mechanisms for managing market messages containing financial data sent between an exchange and a plurality of market participants. However, as was discussed above, the disclosed mechanisms may be implemented at any logical and/or physical point(s) through which the relevant message traffic, and responses thereto, flows or is otherwise accessible, including one or more gateway devices, modems, the computers or terminals of one or more traders, etc.
[0049] Figure 2 depicts a block diagram of a message management module 140 according to one embodiment, which in an exemplary implementation, is implemented as part of the exchange computer system 100 described above.
[0050] The embodiments described herein utilize trade related messages such as mass quote messages, individual order messages, cancellation messages, etc. The trading entity may have one or multiple trading terminals associated with the session.
Furthermore, the financial instruments may be financial derivative products. Derivative products may include futures contracts, options on futures contracts, futures contracts that are functions of or related to other futures contracts, swaps, swaptions, or other financial instruments that have their price related to or derived from an underlying product, security, commodity, equity, index, or interest rate product. In one embodiment, the orders are for options contracts that belong to a common option class. Orders may also be for baskets, quadrants, other combinations of financial instruments, etc. The option contracts may have a plurality of strike prices and/or comprise put and call contracts. A mass quote message may be received at an exchange. As used herein, an exchange 100 includes a place or system that receives and/or executes orders.
[0051] Figure 2 shows a system 200 for management of communication of a plurality of financial messages to a plurality of market participants via a network 214 which, as described above, may be the network 420 described below or network 124 or 126 described above, which may be implemented as a consolidated feed module 140 as described above. The plurality of messages may include a first financial message including data intended to be received and comprehended by a first market participant of a plurality of market participants, and a second financial message corresponding to the first financial message, and including data intended for all of the plurality of market participants. The plurality of messages may also include multiple messages, all of which are intended for the plurality of market participants.
[0052] It will be appreciated that the disclosed embodiments may be applicable to other types of messages depending upon the implementation. Further, the messages may comprise one or more data packets, datagrams or other collection of data formatted, arranged configured and/or packaged in a particular one or more protocols, e.g. the FIX protocol, TCP/IP, Ethernet, etc., suitable for transmission via a network 214 as was described, such as the message format and/or protocols described in U.S. Patent No. 7,831 ,491 and U.S. Patent Publication No. 2005/0096999 Al , both of which are incorporated by reference herein in their entirety. Further, the disclosed message management system may be implemented using an open message standard
implementation, such as FIX or FIX/FAST, or by an Exchange-provided API.
[0053] The system 200 includes a processor 202 and a memory 204 coupled therewith which may be implemented as processor 402 and memory 404 as described below with respect to Figure 4. In an embodiment, the system 200 further includes first logic 206 stored in the memory 204 and executable by the processor 202 to cause the processor 202 to obfuscate at least a portion of a first financial message such that the obfuscated portion of the first financial message is incomprehensible to the first market participant without associated key data configured to make the obfuscated portion comprehensible to the first market participant. The system 200 also includes a second logic 212 stored in the memory 204 and executable by the processor 202 to generate a second financial message comprising the associated key data. Alternatively, the second logic 212 may be configured to augment an existing second message with the associated key data. The system 200 further includes a third logic 208 stored in the memory 204 and executable by the processor 202 to cause the processor 202 to transmit, via the network 214, the obfuscated first financial message to a first market participant. The system 200 additionally includes a fourth logic 208 stored in the memory 204 and executable by the processor 202 to cause the processor 202 to transmit, via the network 214, the second financial message to a plurality of market participants. The first financial message may be in response to a trade order, trade modification, trade cancellation, or combination thereof and comprise a confirmation message, update message, rejection message, or combination thereof. The first financial message may be generated by the system 200 in response to a previous message submitted by the first market participant.
[0054] In one embodiment, the first logic 206 may be executable by the processor 202 to obfuscate at least a portion of the first financial message by transforming readable plain text into unreadable ciphertext using an encryption algorithm. The encryption algorithm may be a symmetric key algorithm, asymmetric algorithm, or any encryption algorithm configured to sufficiently obfuscate the portion of the first financial message such that a brute force deciphering attempt would take at least a length of time determined to be the delay between a receipt of a first financial message by a particular market participant and a receipt of a second financial message by at least one market participant of a plurality of the market participants. The first logic 206 may be further executable to generate key data in the form of an encryption cypher configured to make an obfuscated portion of a first message comprehensible to a first market participant. As an alternative, the second logic 212 may be further executable to generate the key data. The second logic 212 may also be executable to include an identifier with key data. The identifier may indicate an association between a first financial message having an obfuscated portion and key data configured to decode, or make understandable, the obfuscated portion.
[0055] In one embodiment, the second logic 212 may be further executable by the processor 202 to augment a second financial message with identification data
recognizable by a first market participant to associate the decode key in the second financial message with a first financial message received by the first market participant. For example, the identification data may be an identification number that matches a number included in an un-obfuscated, or comprehensible, portion of the first message. In another embodiment, the identification data may be recognizable
[0056] In one embodiment, the second logic 212 is further executable by the processor 202 to augment a financial message with data indicating key data associated with multiple messages. For example, dummy keys, or key data not operational to decode specific data, may be included in a financial message. Dummy keys may be used to indicate the appearance of normality for financial messages that do not include key data. Also, if in an embodiment multiple sets of key data are included in a financial message to decode multiple portions of multiple messages, including multiple dummy keys such that a standard number of keys, or amount of key data, is maintained, may provide a normal appearance to a market participant.
[0057] In one embodiment, system 200 may include a fifth logic executable by the processor 202 to generate a third message having a dummy key not functional to decode any message or portions of any message. Typically, a third message would be a public financial message, intended for receipt by a plurality of market participants. This may be an additional technique to maintain a common appearance for all public messages of a messaging system.
[0058] In an embodiment, the first logic 206 may be executable by the processor 202 to cause the system 200 to obfuscate at least a portion of market data of a subset of financial messages such that obfuscated content of the subset is incomprehensible to the plurality of market participants without associated key data configured to render the obfuscated data comprehensible thereto. The second logic 212 may be executable by the processor 202 to cause the system 200 to augment a message of the set of financial messages with the associated key data. Further, the third logic 208 may be executable by the processor 200 to cause the system 200 to transmit, via the network 214, the obfuscated subset and the augmented message to the plurality of market participants, the augmented message transmitted subsequent to the subset of the financial messages.
[0059] Figure 6 shows a message receipt device 250, which may be implemented as a computer device 1 14, 1 16, 1 18, 120, or 122 of figure 1. The message receipt device 250 includes a processor 222 and a memory 224 coupled therewith which may be
implemented a processor 402 and memory 404 as described below with respect to Figure 4. In an embodiment, the message receipt device 250 further includes a first logic 226 stored in the memory 224 and configured to be executed by the processor 222 to cause the processor 222 to receive a first message that includes market data, at least a portion of which is obfuscated such that it is indecipherable without an associated key, or key data, configured to decipher the first message.
[0060] Alternatively the first logic 226 may be configured to cause the processor 222 to retrieve the first message from the system 200 using the network 214. The message receipt device 250 also includes a second logic 228 stored in the memory 224 and configured to be executed by the processor 222 to cause the processor 222 to retrieve a second message transmitted to a plurality of market participants by the system 200 via the network 214. The second message comprising market data and the associated key, or key data, configured to decipher the obfuscated market data of the first message. The message receipt device 250 also includes a third logic 230 stored in the memory 224 and configured to be executed by the processor 222 to cause the processor 222 to decipher the obfuscated market data of the first message using the associated key, or key data.
[0061] In an embodiment, message receipt device 250 includes a first logic 226 stored in the memory 224 and configured to be executed by the processor 222 to cause the processor 222 to receive a set of messages that include market data. The set may include a subset of messages, at least a portion of which have data obfuscated such that it is indecipherable without an associated key, or key data, configured to decipher the obfuscated message. The message receipt device 250 may also include a second logic 228 executable by the processor 222 to cause the system 214 to receive a message of the set of messages augmented with the key data, the augmented message having been sent subsequent to the subset of message. The message receipt device 250 may also include a third logic 230 executable by the processor 222 to cause the system 214 to decode the obfuscated data of the subset of message using the key data.
[0062] Figure 3 depicts a flow chart showing operation of the system 200 of Figure 2. In particular Figure 3 shows a computer implemented method for managing
communication a plurality of financial messages to a plurality of market participants via a network 214 wherein the plurality of financial messages includes a first financial message. The first financial message includes first market data intended to be received and comprehended by a first market participant of the plurality of market participants. The plurality of financial messages also includes a second financial message,
corresponding to the first financial message, and including second market data intended to be received and comprehended by all of the plurality of market participants. The operation includes obfuscating at least a portion of a first message (Block 310), augmenting a second message with key data (Block 320), transmitting the first message (Block 330), and transmitting the second message (Block 340).
[0063] In an embodiment, the first financial message and the second financial message are considered a message pair and are generated in response to the same market activity. For example, the first financial message may be an order confirmation sent to the first market participant, and the second financial message may be a market price adjustment of an underlying good or object as a result of the order.
[0064] An embodiment involves obfuscating (Block 310), by the processor 202, at least a portion of the first market data of the first financial message such that the obfuscated portion of the first market data is incomprehensible to the first market participant without associated key data configured to render the obfuscated data comprehensible to the first market participant. The first financial message may be a confirmation message, update message, rejection message, or combination thereof. The obfuscating may be by any method operational to obscure the understanding of the portion of the first market data. In an embodiment, the obfuscating (Block 310) involves transforming readable plain text into unreadable ciphertext using an encryption algorithm. Also, the associated key data may include an encryption cypher sized to resist a brute force deciphering attempt for a length of time determined to be the delay between a receipt of the first financial message and receipt of the second financial message by the particular first market participant. Obfuscating may involve any process or method that renders data incomprehensible to humans and machines without the application of the associated key data.
[0065] In an embodiment, all of the first financial message may be obfuscated. In another embodiment, all of any market data included in the first message may be obfuscated, and other data included in the first market message may be comprehensible. In an embodiment, all the market data of a financial message may be obfuscated, but a portion of the message indicating identification data for a second financial message is not obfuscated. For example, the first financial message may include a comprehensible identifier and obfuscated market data. The identifier may identify the second market message having key data configured to un-obfuscate, or make comprehensible, the first financial message market data. In an embodiment the identifier in the first message may match an identifier in the second message. In another embodiment, the identifier in the first financial message may correspond to data in a second financial message, but not match the data in the second financial message. In an embodiment, the first message identifier may indicate a category and/or classification directing the first market participant to the corresponding second financial message. For example, if market message feeds are assigned a color, the first financial message identifier may indicate the color and an individual message sequence number for the feed. In such an embodiment, the first message identifier may read "RED002341" thus indicating that message number 002341 of the "RED" feed is the corresponding second financial message containing the associated key data.
[0066] In an embodiment, the first financial message may be responsive to a message previously received from the first market participant. For example, the first market participant may have submitted an order, and the first financial message may be an order confirmation to confirm that the order has been placed. Further, in such an embodiment, the data of the first market message indicating what order is being confirmed may be obfuscated. In another embodiment, all substantive market data may be obfuscated. For example, the market data indicating the type of message, i.e. order confirmation, the corresponding order, the underlying object of the order, the volume of the order, and any other information that may indicate a potential effect to the market is obfuscated. In other embodiments, only selected types of market data are obfuscated. For example, only the underlying object and volume of the order may be obfuscated.
[0067] An embodiment involves augmenting (Block 320), by the processor 202, the second financial message corresponding to the first financial message, with the associated key data. The key data may be an encryption cypher operable to decipher market data or messages encrypted with a corresponding encryption algorithm.
[0068] In an embodiment, augmenting, by the processor 202, the second financial message further involves augmenting the second financial message to include
identification data linking the associated key data in the second financial message with the first financial message. For example, the second financial message may be augmented with an identifier that matches an identifier of the first financial message.
[0069] In an embodiment, the second financial message may be augmented with data indicating the existence of a plurality of keys, or associated key data for multiple financial messages. For example, a public message, in this embodiment a second message, may involve market data related to multiple private messages, one of which may be the first message. As multiple private messages may be partially or wholly obfuscated, the public message may include, or be augmented with, multiple keys configured to provide key data associated with the obfuscated private messages. In an embodiment, the second financial message may also be augmented with dummy keys, or data resembling key data but not configured to render obfuscated data comprehensible. Dummy keys may be used to normalize the appearance of the second financial message in an embodiment involving multiple key augmentation. In another embodiment, a third financial message that may not have a corresponding private message, or may not otherwise contain key data, may be augmented with a dummy key, or dummy key data. The third message may also be transmitted to a plurality of market participants.
[0070] An embodiment involves transmitting (Block 330), by the processor 202 via the network 214, the obfuscated first financial message to the first market participant.
[0071] An embodiment involves transmitting (Block 340), by the processor 202 via the network 214, the second financial message to the plurality of market participants.
[0072] Figure 8 depicts a flow chart showing another operation of the system 200 of Figure 2. In particular Figure 8 shows a computer implemented method for managing communication of a set of financial messages to a plurality of market participants via a network 214, the set of financial messages including market data intended to be received and comprehended by all of the plurality of market participants. The operation includes obfuscating at least a portion of the content of a subset of the set of financial messages (Block 910), augmenting a message of the set of financial messages with key data (Block 920), transmitting the subset of messages and the augmented message to the plurality of market participants (Block 830), and transmitting of the augmented message occurring subsequent to the transmitting of the subset of messages.
[0073] In an embodiment, all of the market data of the subset of messages is obfuscated, and the key data augmented into the other message of the set of messages is configured to remove the obfuscation of all the obfuscated data in the subset of messages.
[0074] In an embodiment, augmenting a message with associated key data may involve including or augmenting the associated key data into the header of the message. Further, in an embodiment, the augmented message may contain market data. Also, in an embodiment, at least a portion of the market data contained by the augmented message may be obfuscated.
[0075] In an embodiment, a set of messages may be a group of messages sharing a theme or similar content. The similar content may involve market data relating to the market activity of specific market participants of a plurality of market participants over a period of time. This type of group of messages may be considered a singular summary message. For example, a summary message may contain a significant amount of information relating to market activity. Using some messaging communication protocols, such as the Transmission Control Protocol ("TCP") or the User Datagram Protocol ("UDP"), the amount of information that would be sent with the summary message would require multiple packets, datagrams, or messages to be sent as a singular communication. In such an embodiment, the multiple packets or datagrams of the communication may be considered a set of messages.
[0076] Figure 7 depicts a flow chart showing operation of the message receipt device 250 of Figure 6. The operation may include receiving the first message (Block 350), receiving the second message (Block 360), and removing the obfuscation of data in the first message with key data contained in the second message (Block 370).
[0077] An embodiment involves receiving (Block 350) the first financial message from system 200 using the network 214. The first financial message comprising market data, at least a portion of which is obfuscated such that the obfuscated portion of the first market data is incomprehensible without associated key data configured to decode, or render comprehensible, the obfuscated data.
[0078] An embodiment involves retrieving (Block 360) the second message transmitted to a plurality of market participants the first financial message from system 200 using the network 214. The second message comprising the associated key data configured to decode, or render comprehensible, the obfuscated market data of first message.
[0079] An embodiment involves removing (Block 370) the obfuscation of the obfuscated market data of the first financial message using the key data from the second financial message. Removing the obfuscation may involve decoding, deciphering, un- encrypting, or any other method of rendering the obfuscated market data comprehensible.
[0080] Figure 9 depicts a flow chart showing another operation of the message receipt device 250 of Figure 6. The operation may include receiving a subset of a set of messages (Block 950) that has obfuscated content, receiving another message of the set of messages (Block 960) that has been augmented with key data configured to remove the obfuscation of the subset of messages, and removing the obfuscation of data in the subset of messages with key data contained in the augmented message (Block 970). [0081] It will be understood that at least a portion of the flow chart of Figure 3 (collection of blocks 380) and the flow chart of Figure 8 (collection of blocks 880) may be implemented using the system 200 of Figure 2, and at least a portion of Figure 7 (collection of blocks 390) and the flow chart of Figure 9 (collection of blocks 990) may be implemented using the message retrieval device 250 of Figure 6. One skilled in the art will appreciate that one or more modules described herein may be implemented using, among other things, a tangible computer-readable medium comprising computer- executable instructions (e.g., executable software code). Alternatively, modules may be implemented as software code, firmware code, hardware, and/or a combination of the aforementioned. For example the modules may be embodied as part of an exchange 100 for financial instruments.
[0082] Referring to Figure 4, an illustrative embodiment of a general computer system 400 is shown. The computer system 400 can include a set of instructions that can be executed to cause the computer system 400 to perform any one or more of the methods or computer based functions disclosed herein. The computer system 400 may operate as a standalone device or may be connected, e.g., using a network, to other computer systems or peripheral devices. Any of the components discussed above, such as the processor 202, may be a computer system 400 or a component in the computer system 400. The computer system 400 may implement a match engine, margin processing, payment or clearing function on behalf of an exchange, such as the Chicago Mercantile Exchange, of which the disclosed embodiments are a component thereof.
[0083] In a networked deployment, the computer system 400 may operate in the capacity of a server or as a client user computer in a client-server user network environment, or as a peer computer system in a peer-to-peer (or distributed) network environment. The computer system 400 can also be implemented as or incorporated into various devices, such as a personal computer (PC), a tablet PC, a set-top box (STB), a personal digital assistant (PDA), a mobile device, a palmtop computer, a laptop computer, a desktop computer, a communications device, a wireless telephone, a land-line telephone, a control system, a camera, a scanner, a facsimile machine, a printer, a pager, a personal trusted device, a web appliance, a network router, switch or bridge, or any other machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. In a particular embodiment, the computer system 400 can be implemented using electronic devices that provide voice, video or data communication. Further, while a single computer system 400 is illustrated, the term "system" shall also be taken to include any collection of systems or sub-systems that individually or jointly execute a set, or multiple sets, of instructions to perform one or more computer functions.
[0084] As illustrated in Figure 4, the computer system 400 may include a processor 402, e.g., a central processing unit (CPU), a graphics processing unit (GPU), or both. The processor 402 may be a component in a variety of systems. For example, the processor 402 may be part of a standard personal computer or a workstation. The processor 402 may be one or more general processors, digital signal processors, application specific integrated circuits, field programmable gate arrays, servers, networks, digital circuits, analog circuits, combinations thereof, or other now known or later developed devices for analyzing and processing data. The processor 402 may implement a software program, such as code generated manually (i.e., programmed).
[0085] The computer system 400 may include a memory 404 that can communicate via a bus 408. The memory 404 may be a main memory, a static memory, or a dynamic memory. The memory 404 may include, but is not limited to computer readable storage media such as various types of volatile and non-volatile storage media, including but not limited to random access memory, read-only memory, programmable read-only memory, electrically programmable read-only memory, electrically erasable read-only memory, flash memory, magnetic tape or disk, optical media and the like. In one embodiment, the memory 404 includes a cache or random access memory for the processor 402. In alternative embodiments, the memory 404 is separate from the processor 402, such as a cache memory of a processor, the system memory, or other memory. The memory 404 may be an external storage device or database for storing data. Examples include a hard drive, compact disc ("CD"), digital video disc ("DVD"), memory card, memory stick, floppy disc, universal serial bus ("USB") memory device, or any other device operative to store data. The memory 404 is operable to store instructions executable by the processor 402. The functions, acts or tasks illustrated in the figures or described herein may be performed by the programmed processor 402 executing the instructions 412 stored in the memory 404. The functions, acts or tasks are independent of the particular type of instructions set, storage media, processor or processing strategy and may be performed by software, hardware, integrated circuits, firm-ware, micro-code and the like, operating alone or in combination. Likewise, processing strategies may include multiprocessing, multitasking, parallel processing and the like.
[0086] As shown, the computer system 400 may further include a display unit 414, such as a liquid crystal display (LCD), an organic light emitting diode (OLED), a flat panel display, a solid state display, a cathode ray tube (CRT), a projector, a printer or other now known or later developed display device for outputting determined
information. The display 414 may act as an interface for the user to see the functioning of the processor 402, or specifically as an interface with the software stored in the memory 404 or in the drive unit 406.
[0087] Additionally, the computer system 400 may include an input device 416 configured to allow a user to interact with any of the components of system 400. The input device 416 may be a number pad, a keyboard, or a cursor control device, such as a mouse, or a joystick, touch screen display, remote control or any other device operative to interact with the system 400.
[0088] In a particular embodiment, as depicted in Figure 4, the computer system 400 may also include a disk or optical drive unit 406. The disk drive unit 406 may include a computer-readable medium 410 in which one or more sets of instructions 412, e.g.
software, can be embedded. Further, the instructions 412 may embody one or more of the methods or logic as described herein. In a particular embodiment, the instructions 412 may reside completely, or at least partially, within the memory 404 and/or within the processor 402 during execution by the computer system 400. The memory 404 and the processor 402 also may include computer-readable media as discussed above.
[0089] The present disclosure contemplates a computer-readable medium that includes instructions 412 or receives and executes instructions 412 responsive to a propagated signal, so that a device connected to a network 420 can communicate voice, video, audio, images or any other data over the network 420. Further, the instructions 412 may be transmitted or received over the network 420 via a communication interface 418. The communication interface 418 may be a part of the processor 402 or may be a separate component. The communication interface 418 may be created in software or may be a physical connection in hardware. The communication interface 418 is configured to connect with a network 420, external media, the display 414, or any other components in system 400, or combinations thereof. The connection with the network 420 may be a physical connection, such as a wired Ethernet connection or may be established wirelessly as discussed below. Likewise, the additional connections with other components of the system 400 may be physical connections or may be established wirelessly.
[0090] The network 420 may include wired networks, wireless networks, or combinations thereof. The wireless network may be a cellular telephone network, an 802.1 1 , 802.16, 802.20, or WiMax network. Further, the network 420 may be a public network, such as the Internet, a private network, such as an intranet, or combinations thereof, and may utilize a variety of networking protocols now available or later developed including, but not limited to TCP/IP based networking protocols.
[0091] Embodiments of the subject matter and the functional operations described in this specification can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them. Embodiments of the subject matter described in this specification can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a computer readable medium for execution by, or to control the operation of, data processing apparatus. While the computer-readable medium is shown to be a single medium, the term "computer-readable medium" includes a single medium or multiple media, such as a centralized or distributed database, and/or associated caches and servers that store one or more sets of instructions. The term "computer-readable medium" shall also include any medium that is capable of storing, encoding or carrying a set of instructions for execution by a processor or that cause a computer system to perform any one or more of the methods or operations disclosed herein. The computer readable medium can be a machine-readable storage device, a machine -readable storage substrate, a memory device, or a combination of one or more of them. The term "data processing apparatus" encompasses all apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, or multiple processors or computers. The apparatus can include, in addition to hardware, code that creates an execution environment for the computer program in question, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of one or more of them.
[0092] In a particular non-limiting, exemplary embodiment, the computer-readable medium can include a solid-state memory such as a memory card or other package that houses one or more non-volatile read-only memories. Further, the computer-readable medium can be a random access memory or other volatile re-writable memory.
Additionally, the computer-readable medium can include a magneto-optical or optical medium, such as a disk or tapes or other storage device to capture carrier wave signals such as a signal communicated over a transmission medium. A digital file attachment to an e-mail or other self-contained information archive or set of archives may be considered a distribution medium that is a tangible storage medium. Accordingly, the disclosure is considered to include any one or more of a computer-readable medium or a distribution medium and other equivalents and successor media, in which data or instructions may be stored.
[0093] In an alternative embodiment, dedicated hardware implementations, such as application specific integrated circuits, programmable logic arrays and other hardware devices, can be constructed to implement one or more of the methods described herein. Applications that may include the apparatus and systems of various embodiments can broadly include a variety of electronic and computer systems. One or more embodiments described herein may implement functions using two or more specific interconnected hardware modules or devices with related control and data signals that can be
communicated between and through the modules, or as portions of an application-specific integrated circuit. Accordingly, the present system encompasses software, firmware, and hardware implementations.
[0094] In accordance with various embodiments of the present disclosure, the methods described herein may be implemented by software programs executable by a computer system. Further, in an exemplary, non-limited embodiment, implementations can include distributed processing, component/object distributed processing, and parallel processing. Alternatively, virtual computer system processing can be constructed to implement one or more of the methods or functionality as described herein.
[0095] Although the present specification describes components and functions that may be implemented in particular embodiments with reference to particular standards and protocols, the invention is not limited to such standards and protocols. For example, standards for Internet and other packet switched network transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP, HTTPS) represent examples of the state of the art. Such standards are periodically superseded by faster or more efficient equivalents having essentially the same functions. Accordingly, replacement standards and protocols having the same or similar functions as those disclosed herein are considered equivalents thereof.
[0096] A computer program (also known as a program, software, software
application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a standalone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program does not necessarily correspond to a file in a file system. A program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple
coordinated files (e.g., files that store one or more modules, sub programs, or portions of code). A computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
[0097] The processes and logic flows described in this specification can be performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output. The processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
[0098] Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and anyone or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read only memory or a random access memory or both. The essential elements of a computer are a processor for performing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks. However, a computer need not have such devices. Moreover, a computer can be embedded in another device, e.g., a mobile telephone, a personal digital assistant (PDA), a mobile audio player, a Global Positioning System (GPS) receiver, to name just a few. Computer readable media suitable for storing computer program instructions and data include all forms of non volatile memory, media and memory devices, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto optical disks; and CD ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
[0099] To provide for interaction with a user, embodiments of the subject matter described in this specification can be implemented on a device having a display, e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to the user and a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer. Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input.
[00100] Embodiments of the subject matter described in this specification can be implemented in a computing system that includes a back end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the subject matter described in this specification, or any combination of one or more such back end, middleware, or front end components. The components of the system can be
interconnected by any form or medium of digital data communication, e.g., a
communication network. Examples of communication networks include a local area network ("LAN") and a wide area network ("WAN"), e.g., the Internet.
[00101] The computing system can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. [00102] The illustrations of the embodiments described herein are intended to provide a general understanding of the structure of the various embodiments. The illustrations are not intended to serve as a complete description of all of the elements and features of apparatus and systems that utilize the structures or methods described herein. Many other embodiments may be apparent to those of skill in the art upon reviewing the disclosure. Other embodiments may be utilized and derived from the disclosure, such that structural and logical substitutions and changes may be made without departing from the scope of the disclosure. Additionally, the illustrations are merely representational and may not be drawn to scale. Certain proportions within the illustrations may be exaggerated, while other proportions may be minimized. Accordingly, the disclosure and the figures are to be regarded as illustrative rather than restrictive.
[00103] While this specification contains many specifics, these should not be construed as limitations on the scope of the invention or of what may be claimed, but rather as descriptions of features specific to particular embodiments of the invention. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment.
Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a sub-combination or variation of a sub-combination.
[00104] Similarly, while operations are depicted in the drawings and described herein in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products. [00105] One or more embodiments of the disclosure may be referred to herein, individually and/or collectively, by the term "invention" merely for convenience and without intending to voluntarily limit the scope of this application to any particular invention or inventive concept. Moreover, although specific embodiments have been illustrated and described herein, it should be appreciated that any subsequent arrangement designed to achieve the same or similar purpose may be substituted for the specific embodiments shown. This disclosure is intended to cover any and all subsequent adaptations or variations of various embodiments. Combinations of the above embodiments, and other embodiments not specifically described herein, will be apparent to those of skill in the art upon reviewing the description.
[00106] The Abstract of the Disclosure is provided to comply with 37 C.F.R.
§ 1.72(b) and is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed
Description, various features may be grouped together or described in a single embodiment for the purpose of streamlining the disclosure. This disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter may be directed to less than all of the features of any of the disclosed embodiments. Thus, the following claims are incorporated into the Detailed Description, with each claim standing on its own as defining separately claimed subject matter.
[00107] It is therefore intended that the foregoing detailed description be regarded as illustrative rather than limiting, and that it be understood that it is the following claims, including all equivalents, that are intended to define the spirit and scope of this invention.

Claims

WHAT IS CLAIMED IS:
1. A computer implemented method for managing communication of a set of financial messages to a plurality of market participants via a network, the set of financial messages including market data intended to be received and comprehended by all of the plurality of market participants, the method comprising:
obfuscating, by a processor, at least a portion of the market data of each of a subset of the financial messages such that the obfuscated content of each of the subset of financial messages is incomprehensible to the plurality of market participants without associated key data configured to render the obfuscated content comprehensible thereto; augmenting, by the processor, a message of the set of financial messages with the associated key data; and
transmitting, by the processor via the network, the augmented message subsequent to a transmission of the subset of the obfuscated financial messages.
2. The computer implemented method of claim 1, wherein obfuscating at least a portion of the market data of each of the subset of financial messages comprises transforming readable plain text into unreadable ciphertext using an encryption algorithm.
3. The computer implemented method of claim 2, wherein the associated key data comprises an encryption cypher sized to resist a brute force deciphering attempt for at least a length of time determined to be a delay between a receipt of a first message of the subset and receipt of the augmented message by at least one of the plurality of market participants.
4. The computer implemented method of claim 1 , wherein all of the market data of each of the subset of financial messages is obfuscated.
5. The computer implemented method of claim 1 , wherein augmenting the message comprises augmenting a header of the message with the associated key data.
6. The computer implemented method of claim 1, wherein the augmented message comprises market data.
7. The computer implemented method of claim 6, wherein at least a portion of the market data of the augmented message is obfuscated.
8. The computer implemented method of claim 1 , wherein the set of messages comprise a summary message, and the market data comprises data indicating market activity of particular recipients of the plurality of market participants over a period of time.
9. A system for managing communication of a set of financial messages to a plurality of market participants via a network, the set of financial messages including market data intended to be received and comprehended by all of the plurality of market participants, the system comprising:
a first logic stored in a memory and configured to be executed by a processor to cause the system to obfuscate at least a portion of the market data of a subset of the financial messages such that the obfuscated data of the subset is incomprehensible to the plurality of market participants without associated key data configured to render the obfuscated data comprehensible thereto;
a second logic stored in the memory and configured to be executed by a processor to cause the system to augment a message of the set of financial messages with the associated key data; and
a third logic stored in a memory and configured to be executed by a processor to cause the system to transmit, via a network, the augmented message to the plurality of market participants subsequent to transmission of the obfuscated subset of the financial messages to the plurality of market participants.
10. The system of claim 9, wherein obfuscating at least a portion of the market data of each of the subset of financial messages comprises transforming readable plain text into unreadable ciphertext using an encryption algorithm.
11. The system of claim 10, wherein the associated key data comprises an encryption cypher sized to resist a brute force deciphering attempt for at least a length of time determined to be a delay between a receipt of a first message of the subset and receipt of the augmented message by at least one of the plurality of market participants.
12. The system of claim 9, wherein all of the market data of each of the subset of financial messages is obfuscated.
13. The system of claim 9, wherein the second logic is configured to be executed by a processor to cause the system to augment a header of the message with the associated key data.
14. The system of claim 9, wherein the augmented message comprises market data.
15. The system of claim 14, wherein the second logic is further configured to be executed by a processor to cause the system to obfuscate at least a portion of the market data of the augmented message.
16. The system of claim 9, wherein the set of messages comprise a summary message, and the market data comprises data indicating market activity of particular recipients of the plurality of market participants over a period of time.
17. A system for generating and managing communication of a set of financial messages to a plurality of market participants via a network, the set of financial messages including market data intended to be received and comprehended by all of the plurality of market participants, the system comprising:
a message generator configured to generate a subset of the financial messages with at least a portion of the market data of the subset of the financial messages obfuscated such that the obfuscated content of the subset is incomprehensible to the plurality of market participants without associated key data configured to render the obfuscated content comprehensible thereto, and generate a message of the set of financial messages augmented with the associated key data; and a message transmitter configured to transmit the obfuscated subset to the plurality of market participants prior to a transmission of the augmented message to the plurality of market participants.
18. The system of claim 17, wherein obfuscating at least a portion of the market data of each of the subset of financial messages comprises transforming readable plain text into unreadable ciphertext using an encryption algorithm.
19. The system of claim 18, wherein the associated key data comprises an encryption cypher sized to resist a brute force deciphering attempt for at least a length of time determined to be a delay between a receipt of a first message of the subset and receipt of the augmented message by at least one of the plurality of market participants.
20. The system of claim 17, wherein the message generator is configured to obfuscate all of the market data of each of the subset of financial messages.
21. The system of claim 17, wherein the message generator is configured to augment the a header of the message with the associated key data.
22. The system of claim 17, wherein the augmented message comprises market data.
23. The system of claim 22, wherein the message generator is further configured to obfuscate at least a portion of the market data of the augmented message.
24. The system of claim 17, wherein the set of messages comprise a summary message, and the market data comprises data indicating market activity of particular recipients of the plurality of market participants over a period of time.
PCT/US2014/068710 2013-12-09 2014-12-05 Secure exchange feed market data embargo WO2015088894A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP14869685.9A EP3080771A4 (en) 2013-12-09 2014-12-05 Secure exchange feed market data embargo

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/100,887 US20150088723A1 (en) 2013-09-24 2013-12-09 Secure exchange feed market data embargo
US14/100,887 2013-12-09

Publications (1)

Publication Number Publication Date
WO2015088894A1 true WO2015088894A1 (en) 2015-06-18

Family

ID=53371716

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2014/068710 WO2015088894A1 (en) 2013-12-09 2014-12-05 Secure exchange feed market data embargo

Country Status (2)

Country Link
EP (1) EP3080771A4 (en)
WO (1) WO2015088894A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7389422B2 (en) * 2001-09-13 2008-06-17 International Business Machines Corporation System for forwarding and verifying multiple digital signatures corresponding to users and contributions of the users in electronic mail
US8184805B2 (en) * 2005-04-28 2012-05-22 Panasonic Corporation Program converter, encrypting device, and encrypting method
US20120221462A1 (en) * 2007-07-13 2012-08-30 Omx Technology Ab Method and system for trading
US20120246055A1 (en) * 2005-08-12 2012-09-27 Boulder Capital Trading Method for customized market data dissemination in support of hidden-book order placement and execution
US20130218739A1 (en) * 2012-02-17 2013-08-22 Frank Kmiec Secure Consolidated Exchange Feed for Order Entry and Market Data

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120250865A1 (en) * 2011-03-23 2012-10-04 Selerity, Inc Securely enabling access to information over a network across multiple protocols
US10032219B2 (en) * 2013-09-24 2018-07-24 Chicago Mercantile Exchange Inc. Secure exchange feed market data embargo
US20150088723A1 (en) * 2013-09-24 2015-03-26 Chicago Mercantile Exchange Inc. Secure exchange feed market data embargo

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7389422B2 (en) * 2001-09-13 2008-06-17 International Business Machines Corporation System for forwarding and verifying multiple digital signatures corresponding to users and contributions of the users in electronic mail
US8184805B2 (en) * 2005-04-28 2012-05-22 Panasonic Corporation Program converter, encrypting device, and encrypting method
US20120246055A1 (en) * 2005-08-12 2012-09-27 Boulder Capital Trading Method for customized market data dissemination in support of hidden-book order placement and execution
US20120221462A1 (en) * 2007-07-13 2012-08-30 Omx Technology Ab Method and system for trading
US20130218739A1 (en) * 2012-02-17 2013-08-22 Frank Kmiec Secure Consolidated Exchange Feed for Order Entry and Market Data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3080771A4 *

Also Published As

Publication number Publication date
EP3080771A4 (en) 2017-05-03
EP3080771A1 (en) 2016-10-19

Similar Documents

Publication Publication Date Title
US10762566B2 (en) Secure exchange feed market data embargo
US20210287291A1 (en) Secure Consolidated Exchange Feed for Order Entry and Market Data
US11842397B2 (en) Exchange feed for trade reporting having reduced redundancy
US20150088723A1 (en) Secure exchange feed market data embargo
US20220129987A1 (en) Tokens, and the use thereof, for public distribution of messages having a private association with a subset of the message recipients
US10839459B2 (en) Electronic market message management of temporally specific messages
US10637808B2 (en) Electronic messaging management
US9916623B2 (en) Electronic market message management with priority determination
US20180342013A1 (en) Electronic market message management using priority determination
EP3813004A1 (en) Client specific data distribution
US20170004575A1 (en) Dissemination of order status information present on an electronic exchange
WO2015088894A1 (en) Secure exchange feed market data embargo
US20240127340A1 (en) Exchange feed for trade reporting having reduced redundancy

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14869685

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2014869685

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2014869685

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE