WO2000068857A1 - Secure system for trading fungible commodities - Google Patents
Secure system for trading fungible commodities Download PDFInfo
- Publication number
- WO2000068857A1 WO2000068857A1 PCT/US2000/012918 US0012918W WO0068857A1 WO 2000068857 A1 WO2000068857 A1 WO 2000068857A1 US 0012918 W US0012918 W US 0012918W WO 0068857 A1 WO0068857 A1 WO 0068857A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- transaction
- entries
- user
- indication
- prospective
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Definitions
- This invention relates to a secure networked communication and information management system to protect the proprietary interests of principals while providing these principals with an opportunity to anonymously and confidentially find natural counter-parties to their potential transactional interests in fungible properties. More particularly, this invention relates to a computerized networked communication and processing system wherein the identification, pairing and alerting of pre-qualified counter-parties with indications of potential transactional interest in certain fungible properties is effectuated automatically, anonymously and securely without prior disclosure of those interests.
- Previous systems require one or both parties to unilaterally display, divulge and/or broadcast their proprietary transactional interests in the hopes of eliciting a response from natural counter-parties.
- a principal's interests can be, and often are, jeopardized when the transactional interest information representing its desire to put a proprietary investment decision into action is divulged ahead of locating and contacting a qualified counter-party.
- Previous systems also require a firm order to transact an item that potentially commits parties to execute a transaction before any negotiation can occur. Resulting executions without the opportunity for prior negotiations are often not in the principals' best interests and are often highly inefficient in fulfilling their investment objectives.
- Unfulfilled transaction interest information has value for a number of reasons: First, unfulfilled transactional interest information typically represents a proprietary investment idea generated through work and analysis of the principal.
- this interest if divulged ahead of fulfillment, can often adversely affect the liquidity (availability and price) of the item.
- the larger the transactional interest and/or the less liquid of an item the greater the probability that the unilateral exposure of transactional interest will affect its price adversely.
- pre-fulfillment disclosure of the identity of the principal often has an adverse impact if, for example, the principal is known to be an intelligent, large and/or aggressive investor.
- latent or contingent transaction interest types can become actual orders to transact when certain specific conditions exist (anonymity, confidentiality, qualified natural counter-party identification, etc.).
- This system is proposed to increase the efficiency of capital allocation and provide those specific conditions whereby principals with contingent and/or latent transactional interests can more readily pursue their investment interests.
- investors need a system that affords an opportunity to anonymously and confidentially locate a natural counter-party interested in transacting the same specific investment item without either side having to disclose its proprietary transactional interest information beforehand in order to obtain such an opportunity. Furthermore, investors need a system that does not require principals to subject themselves to the risk of having to commit to an unwanted execution in order to potentially find the other side.
- a system that could efficiently, anonymously and confidentially locate and set-up communications between natural parties with counter-side interests would be helpful and therefore of interest to many investors. Furthermore, this system would ensure that all users of the system could receive alerts to a pairing of counter-side transactional interests simultaneously so that all would be treated equally by the system.
- This system should make full use of recent advances in information management; communications; networking security; the Internet; The Financial Information Exchange (FIX) protocol; Virtual Private Networks; Web-based personal page publishing; data transmission encryption.
- FIX Financial Information Exchange
- a secure system for treating fungible commodities has a network including a secure station and a plurality of remote user terminals having respective user identities and communicatively linked to the secure station for data transmission between the secure station and the user terminals.
- a memory of the secure station stores user data including the user identities, and stores transaction data in the form of multiple prospective transaction entries received from the user terminals. Each entry includes a fungible item indication and a transaction side indication identifying one of two opposing transaction sides.
- a search component is operatively coupled to the memory and adapted to perform a comparison of the stored entries with respect to the fungible item indications and the transaction side indications.
- the search component selects sets of two or more stored entries as matching entries having the same fungible item indication and together including transaction side indications identifying the opposing transaction sides.
- a message sending component is operatively associated with the search component and the memory. The message sending component is adapted, in response to the selection of each set of matching entries, to generate a prospective transaction message including the transaction indication and the user identity corresponding to each of the matching entries. The message sending component further is adapted to provide the prospective transaction message to the user terminals associated with the corresponding user identities, thus to facilitate an interaction among users associated with the user identities to complete a transaction involving the fungible item.
- a data security component is provided for restricting access to any given prospective transaction entry stored in the memory to (i) the user identity corresponding to the given entry; and (ii) the user identities corresponding to the other entries in any of the sets of entries that includes the given entry.
- the remote user terminals can be linked to the secure station for either wireless data transmission or by direct lines.
- users provide prospective transaction entries by entering fungible item indications directly, or by gaining access to a menu, from which a particular fungible item indication (code) can be selected and entered. While the most frequently used transaction side indications are "buy” and "sell,” other pairs of transaction sides are contemplated, e.g., "borrow/lend.”
- the search component compares the entered fungible item indication codes. For a potential set of entries having the same fungible item indication, a set of matching entries is realized if the members of the potential set include at least one entry on each side of the transaction. While sets most frequently involve pairs of entries, either side of the transaction may include two or more entries.
- the selection of a set of matching entries triggers the message sending component to generate and send the prospective transaction message to all matched users.
- the user information includes instructions that govern notification, e.g., whether a principal or agent is to be notified, instructions to other parties in the set regarding individuals to contact, and telephone numbers, e-mail addresses, or other information to facilitate contact.
- a secure networked communication and information management system is made available by which investors can communicate their transaction interest indications anonymously and confidentially via a network connection to a central messaging/communications and database/processing server array with the purpose of anonymously and confidentially locating a potential natural counter-party to their transactional interests in certain investment items.
- alert message Only in the event of a synapse will an alert message be generated and sent. These messages are sent onlv to the users who have paired-off. These messages are sent in the same secure environment used for the entry of transaction interests.
- the contents of the alert message may vary according to the application and user options but it essentially conveys information to onlv the parties or agents who have been matched as follows: 1. A message indicating that a pair-off (synapse) in a certain item has occurred;
- A-C typically including a name and phone number, e-mail, fax or point-to-point network routing addresses, etc.:
- A. Principal Direct Each principal receives contact information allowing each to communicate with the counter-party;
- Agents designated by principals receive parts 1 and 2 above, the client's identity, and the contact information allowing each counterparty agent to communicate with the other on the client's behalf;
- the system is based on a network with a secure central station coupled to remote stations used by parties to enter transaction interest information and receive alerts. Use of the application and system is illustrated below using numismatic coins as the item of transactional interest.
- Each party can enter a transactional interest or indication including an item identity and side (buyer or seller).
- the indication can be withdrawn from the system at any time.
- Current price monitoring is the responsibility of each entering party.
- a party can enter price or time limits that permit automatic changes in the activation state.
- the secure central station compares entries to find a synapse (or coincidence event) involving a buyer and a seller (or perhaps more than one of either) of the same item.
- a synapse or coincidence event
- all matched buyers and sellers (or their appointed agents) are informed simultaneously that a synapse has occurred.
- none of the parties knows the identity of the other party (or parties) involved.
- the contra-parties (or their agents) are put in communication with one another. The transaction is then negotiated between the matched parties or their agents.
- This invention is not a deal-making or execution system. It is an information management system allowing interested counter-parties to securely find one another without divulging their transactional interests ahead of time. Any negotiations potentially leading to a deal or execution resulting from a pair-off in the system are done away from and without the system.
- the system efficiently and confidentially identifies and puts natural counter-parties expressing an opposing interest in transacting a particular item together so that they can then proceed outside of the system and negotiate a mutually desired transaction.
- this system Unlike current transaction interest location systems, this system divulges neither principal identities nor their proprietary transaction interest information as a prerequisite to potentially finding a qualified natural party with concurrent counter-side interests in transacting a specific item.
- FIG. 1 is a block diagram of a system according to the invention.
- FIG. 2 A and 2B are block diagrams of security /communications features, and a host server array, respectively.
- FIG. 3 is a block diagram of the software environment for one embodiment of the present invention.
- FIGS. 4 A to 4B are respective illustrations of records, fields, and database tables used in the system.
- FIGS. 5 A and 5B show a high-level flow chart describing operation of the present system.
- FIGS. 6 A to 6D comprise a flow chart describing online communication and data transfer between a host server array and remote users.
- FIGS. 7 A to 7C are respective top-level flow charts illustrating options by which remote users use the host server array and further illustrating the communications, processing, messaging, and alerting functions of the present system.
- FIG. 8 is a schematic view of system components.
- FIG. 9 is a diagram of a stock transaction indication according to the invention.
- Transaction Interest A principal's proprietary interest in potentially transacting (buy, sell, trade, swap, barter, etc.) a specific item to realize their particular investment objective.
- Item of Transaction Interest An identifiable object or property that may be transacted.
- Transaction Interest Indication An expression of a potential interest in transacting a certain item.
- Transaction Interest Information Details concerning the identity of the principal and the dimensions of the transaction interest, such as: side of interest (buyer/seller); item; quantity of item desired; special parameters; and contingent factors.
- Contingent Factors of Interest Specified conditions necessary to the validity of a transaction interest, such as when a qualified counter-party is located, or with the assurance that a minimum quantity will be wanted or available at a certain price level, etc.
- Order to Transact A set of instructions from a principal directing that a transaction in a certain item be actively initiated and pursued.
- a transaction order may be given to an agent, or committed directly, to any number of exchange or marketplace mechanisms.
- FIG. 1 is a block diagram of the primary elements of a system 40 according to the invention.
- a host server array 42 exchanges data with a plurality of remote user nodes or terminals 44 and 46, optionally 48-52, through data transmission typically across communications links such as telephone/data transmission lines or frequencies (schematically represented).
- the host communications server 42 acts as a gateway which securely interfaces the host database server 56 to a network for transmitting data via a common protocol utilized at user terminals.
- the system can be connected to users over a network such as the internet; the world wide web (Web); private virtual networks; private dedicated networks; etc., which can allow a multitude of remote users to potentially access the system simultaneously.
- the host communications server 42 also supports secure direct line modem connections to users. Thus, a variety of user connections and modalities are implied when reference is made to the "net” or "network.”
- the host database server 42 is connected to the network.
- the host communications server's web server 58 publishes at least an initial first login page accessible to a prospective user. This login page permits pre- authorized users to enter their username/password combinations to gain access to a personalized user page published by the server 58. This personalized user page allows users to enter, modify, monitor, and delete indications of transaction interest.
- This contact is typically established on a network by sending data packets to an electronic address associated with the host communications server. Security measures and safeguards are initiated and implemented as this initial contact is established.
- FIG. 2A shows one security and communications scheme to establish protected connections for users accessing the host communications server array 42 and to protect the contents of the host database server 56. Users typically have similar security measures as those outlined for the host communications server array 42. Communications links are usually established using a secure socket layer from user site router 60 to system site router 62, or directly from user modem 64 to host modem 66.
- Router connections are normally carried over a wide area network (WAN) and contain their own port identification and authentication security routines.
- WAN links 68 can be established over the Web, the Internet, a private shared network, a virtual private network, or a dedicated circuit (frame relay, 56 kb leased line, ISDN, ATM, etc.).
- Point to point or simple TCP/IP connections will typically be established with the TCP socket access being configured for user control for security purposes.
- Direct modem links 64, 66 typically are established over public telephone/data lines and/or frequencies or privately leased lines.
- the gateway server provides further security checks by presenting a firewall, a login routine with automatic disconnection after a certain number of unsuccessful login attempts, and anti-hacker monitoring of all unauthorized or repeated attempts to access the host database server array 56.
- FIG. 2B is a block diagram illustrating in greater detail the host communications server array 42/56.
- a central processor unit 70 with read only memory (CPU/ROM) controls system functions and is connected along circuit board data/address bus lines 72 to a random access memory bank (RAM) 74, mass storage devices 76, communications devices 78, and I/O (input output) interfaces 80 which control corresponding I/O devices 82 such as video monitors, keyboards, and printers.
- CPU/ROM read only memory
- RAM random access memory bank
- mass storage devices 76 mass storage devices 76
- communications devices 78 communications devices
- I/O (input output) interfaces 80 which control corresponding I/O devices 82 such as video monitors, keyboards, and printers.
- the communications server includes routers and modems 78 used to exchange information with remote user nodes/terminals over communications links. Other communications devices and combinations may also be used to transfer data between the host communications server and remote users of the system.
- the host database server 56 includes the elements mentioned above for the host communications server 42. A number of standard internal network components (hub, LAN cards, Cat5 cabling, etc.) are shared by both types of servers and are used to connect the servers into the host server array 42/56.
- the host server array is illustrated using dual servers for simplicity in this example; however, more than two servers can make up the host server array.
- FIG. 3 illustrates the general software configuration of the host communications server array 42/56.
- the system functions via a network capable operating system 84 which allows for the execution of system and application level programs and processes as follows:
- Communications applications 86, 88 and 90 allow encrypted data transfer with various remote user nodes/terminals, such as those referred to above.
- the communications applications allow prospective buyers and sellers at the remote nodes/terminals to log onto the host system. These applications provide either a direct connection or a user specific web page wherein users can enter, modify, monitor and delete indications of transactional interest without disclosing information about these interests, or about themselves, to any other user or entity.
- the communications applications also allow for dynamic messaging between the host server array and various users.
- the communications applications further allow for users (or agents) to be alerted in the case of a pair-off event in the host database server.
- the software environment can include further applications 92, 94 supporting the system's basic data management, communications, and information processing capabilities.
- a relational database (data management, storage, and retrieval) application 98 customized to this specific invention is present in the software environment to organize, monitor, reflect modifications, allow restricted access, maintain data look-up tables, search, and associate the information entered by users.
- This information is organized and stored on one or more mass storage devices 76 as governed by the operating system. The information is organized and stored, for example as described below in reference to FIGS. 4 A to 4B.
- Network and external security processing applications 100, 102 and 104 are also a feature of the software environment described with all servers sharing a network operating level security load but with the majority of the external security applications running on the host communications server 42. Special hardware associated with these security applications may be used and are typically connected to the servers either through system ports or directly to the data bus.
- FIGS. 4 A and 4B show examples of records and fields created by the data management, storage and retrieval process and the database tables that hold these records according to the invention.
- Specific data fields are associated and organized into identifiable records which are themselves further associated and organized into tables. These tables are referenced for retrieving and processing the specific data items and associations needed to fulfill specific requests or routines according to the invention.
- the data content at each of these levels includes, for example, the following fields for each authorized user: id, password, name, general address, phone numbers, and fax numbers).
- records and fields specific to the invention e.g., user network routing addresses
- user identification fields or records include a user name record 106 and a user password 108.
- Several fields are provided for prospective transaction entries, i.e., transaction interest information. These include an item identification field 110, a transaction side field 112, an optional price limit field 114, an optional time limit field 116, and fields 118 and 120 for an entry sequence number and user code, respectively.
- Several fields are provided to indicate the status of an entry, including an active field 122, a pending field 124, a suspended field 126.
- a field 128 is provided for indicating that an entry has been selected for a set of matching entries, and a field 30 indicates the deletion of an entry.
- Fields for recording information pertaining to users include a user code field 132, a user address field 134, an instruction field 136 and a field for an agent's address if the principal involved has selected an agent for post-matching negotiations. Finally, as indicated at 140 and 142, fields are provided for routing information and, optionally, for identifying an agent.
- an active database table 144 contains all prospective transaction entries that are active, either because they were entered as active without any limits or contingencies, or because any limits or contingencies are presently met or have been satisfied. Pending entries are maintained in a database table 146.
- a table 148 contains all entries for which a contingency has not been met or a limit or condition is not satisfied.
- Database tables relating to the fungible items include an item description table 150, a table 152 for item indication codes, and a table 154 for item pricing.
- Database tables relating to system users include a table 156 listing the authorized users, a table 158 containing user identification codes, a table 160 including contact information provided by the users, and a table 162 containing user alert instructions. Finally, several tables are provided for use in auditing the system, including a table 164 of login events, an indication entry table 166 for the prospective transaction entries, a pair-off table 168 for recording the matches of entries, and a table 180 recording the deleted entries.
- FIGS. 5 A and 5B present a flow chart illustrating the general operation of the system.
- the system at 184 identifies the entity trying to access the system first through hardware and then if allowed via software security checkpoints (authentication and authorization).
- the user is granted access to the system at 186.
- the user can choose a general area of transactional interest from a menu such as that presented here.
- the user also may be presented with a series of related sub-menus to seek more specific items of interest, e.g.
- Searches may be multi-layered, as well.
- specific year and grade quality of the penny of interest may be further specified.
- the user at 188 enters one or more transactional interests pertaining to a particular item.
- Item identifying codes may be obtained from the database if not already known by the user.
- Point and shoot interface capabilities may also be used to find an item of interest out of a contextually specific, alphanumerically or graphically presented catalog of items of interest.
- Indications of transactional interest can be entered in either of two modes: active or pending.
- Pending Mode Entered but not yet submitted to system for potential matching with other transactional interest indications
- Active Mode Entered and submitted to system for matching.
- Indications entered by users in either active or pending mode are assessed and routed at 190. Pending indications are presented on the users' interface but go no further until put into active mode by the user. Pending indications later put into active mode by the user are shown as the newly active, and then follow the same path 192 for indications originally entered in active mode.
- the item of interest is identified and verified in the database.
- the user is afforded the further protection in that the system software runs a check for duplicate indication entry. See 196, and 216 and 218 (FIG. 6B).
- the new active mode indication is passed on to the next step.
- Indication is eligible to pair-off with one or more counter-side indications. Time has not expired.
- the indication is eligible, and parameters or contingent factors are currently in-line with specified limit values.
- the indication is dynamically monitored with respect to the parameters or conditions for suspension and/or expiration.
- the interest is being monitored with at least one limit out of line. Time has not expired. Parameters or conditions (contingent factors) are currently out of line with specific values. Interest is dynamically monitored for re-activation.
- Expired former active mode indication with time that has expired. De-activated because time value is outside of specified limits. Similar to Pending mode.
- Deleted Removed from system and blotter.
- the new active mode indication is checked at 200 for the presence of limit parameters, and is either routed to the monitor loop 202 in a suspended state with limits that need to be checked, or is routed to the activated indication database 204 (without limits) if there are no limits.
- the activated indication database is where indications in an activated state (whether monitored for limits or unmonitored) are continuously assessed for the presence of concurrent activated counter-side indications.
- All newly entered active mode indications with limit parameters are automatically routed to the monitor loop 202 to check the limit parameters against current values for those parameters. These values typically are provided to the monitor loop from internal (e.g., time clock) 203 or external (e.g., pricing) 205 real-time or batch-refreshed data sources.
- internal e.g., time clock
- external e.g., pricing
- Initial states and any changes to those states are dynamically reported to the user at 208 as status messages that reflect the dynamic assessments and place indications in the appropriate databases according to their states.
- a potential user from a remote terminal first establishes a connection 210 with the central station, more particularly with the host communications server, the server presents a home page or login page 212 through which the prospective user enters login information. For already established users, this includes a user identification and password. If the information is verified and the user authorized, a menu is opened at 214 to enable the user to select an item to buy or sell. The user may identify the item with the required specificity initially, or make a general category selection and proceed through several stages of increasing specificity as described above in connection with numismatic coins.
- the user enters further information describing the transactional interest indication, e.g., the amount of the item, side of the transaction (buy or sell), and any applicable time limits.
- the completed transactional interest indication is compared to transactional interests already in the database at 216 (FIG. 6B). If an identical transactional interest is found, the prospective indication is rejected as a duplicate at 218. This protects the user from inadvertently entering the same indication twice.
- the proposed transactional interest is monitored as to active or pending mode, then placed in the appropriate database or segment of memory at the secure central station, as either an "active" 220 or "pending" 222 interest indication. Pending entries remain pending until the user changes the status to active. Active indications are further checked for the existence of limits. Interest indications with no limits are stored in the activated state. Active indications having limits are stored to a monitor loop where the limits or conditions of the indication are continually monitored, i.e., compared with internally generated or externally provided parameters.
- FIG. 6C illustrates the monitoring function in which two parameters are involved, one internally generated (time) and the other externally provided (market price).
- time time
- market price the transactional interest indication
- the transactional interest indication is either maintained in an active state for potential pairing with other interests; suspended, indicating that the market price is outside of the specified limits; or expired, indicating that the time is beyond the specified limits.
- Conditions and limits other than price can be included in the transactional interest indication, and are handled in the same manner.
- interest indications that either are active without limits or active with limits that are satisfied are continuously searched, i.e., compared with other interest indications for a potential synapse or pairing.
- the interest indication is maintained in the active state, unless a parameter changes leading to suspension or expiration, or a pairing occurs.
- a pairing triggers two simultaneous actions: a message to the users involved in the pairing, and a removal of the matched interest indications from the activated segment of memory.
- a record of the synapse is created and maintained in the memory.
- a prospective user's login information is not verified, either initially or upon a predetermined number of retries, the prospective user is given an inquiry (224) regarding entry as a new user.
- a form is provided through which the prospective new user can enter information. Acceptance of a new user further may involve a credit card validation, escrow arrangement or other initial requirements to discourage or prevent users who lack the serious interest or capacity to engage in meaningful transactions, from proceeding further.
- surety and payment forms are pre-arranged and made available from vendors by the system operators.
- the type of surety and escrow services required depends upon the user's declared general area(s) of interest and level of desired access.
- These services may be used to certify the security of the system by assuring the performance of users to each other prior to, and in the event of, a synapse event. Users may have to agree ahead of time to have a good faith deposit or earnest money automatically placed in escrow from a validated source of funds (typically a credit card) in order to access and use certain areas of the system. Users can be required to agree ahead of time to the forfeiture of the deposit in part or whole to the counter-party for failure to perform according to the rules after a synapse event.
- users may have to agree ahead of time to rules that extend beyond those pertaining to the use of the actual system described herein.
- individuals wishing to have access to the level where they can deal directly in certain items must agree in advance when registering for that level to use and pay for a clearing house function provided by an escrow agent appointed by the system operators to facilitate the payment and delivery process after a deal is consummated.
- a fee for using the system may be charged at the registration point. This typically requires the user to enter credit card payment information for submission to the third party transaction processor for validation and approval. Of course, traditional financial transaction arrangements can be accommodated manually. The user is presented with an instructional page of other options and logged out if the financial arrangements are not validated.
- a new user record (which includes modifications to existing records) is created at 228 with the associated user and authorization codes.
- the authorization code is determined when a user identifies an area of interest/level of access and is assigned when the attendant requirements are satisfied either through automatic or administrator mediated registration procedures.
- the user is presented with a menu of general areas of interest organized by item type and access levels required to enter indications at 214.
- the user at 230 enters a specific searchable item of interest or selects a general area of interest from the general interest menu page leading to a series of cascading menu pages terminating in a specific item of interest.
- FIG. 7A schematically illustrates a potential buyer and a potential seller of an item "X," each entering a transactional interest indication.
- Each party enters its transactional information to the host communications server, either through a direct connection as indicated at 1, or through its web page as indicated at 1A followed by a transmission of the information to the server as indicated at 2A.
- each of the interest indications When each of the interest indications has been properly received by the communications server, it is transmitted to the database server as indicated at 3.
- the processing explained above leads to the entry of the transactions into the segment of memory reflecting the active status of the entries, and a comparison leads to a synapse for pairing.
- a message indicating the synapse is sent from the database server to the communications server, and then simultaneously transmitted (as at 2, or 2A plus 2B) to the transacting parties.
- the parties simultaneously made aware of the match and of each other, are free to contact one another to complete the transaction, as indicated at 3. Even at this stage, no one except the transacting parties is aware of the respective offers to buy/sell item "X.”
- the synapse triggers the same message from the database server to the communications server.
- the communications server simultaneously transmits alerts to the buyer's agent and seller's agents, represented as step b in the figure.
- Each agent notifies its principal (step c), and receives instructions from its principal regarding the transaction.
- the agents contact one another (e, f) to complete the transaction.
- the nature of the transaction is known only to the transacting parties and their agents.
- the alert may be provided simultaneously to the transacting parties as well as their agents.
- a further feature of this system concerns apportionment of the fungible commodity among several parties on the same transaction side. For example, suppose a synapse or match involves two buyers and three sellers, and that the prospective transaction entries of all parties have listed an amount of 300,000 shares, either to purchase or sell. Thus, 900,000 shares are proposed for sale, but the combined prospective purchase is for only 600,000 shares. The five parties negotiate within the confines of the lower amount on the buy side. In particular, the two buyers can each purchase 300,000 shares, while the three sellers each sell 200,000.
- FIG. 8 is a schematic of the basic features of a system 10 constructed according to the present invention.
- the system includes a secure central station 12 including a CPU and mass data storage capacity associated with the CPU.
- a memory 14 of the central station typically including a computer's internal storage and peripheral storage units such as disk drives, is preferably organized into several memory segments including a segment 16 for storing relatively permanent data, i.e., not tied to a particular prospective transaction entry, a pending segment 18 for storing pending entries, i.e., transactional interest indications provided to the system but designated "pending" by users, an active segment 20 for storing active entries, and a suspended segment 22 for storing suspended entries.
- the memory further includes an internal parameter segment 24 containing internally generated parameters such as time, and an external parameters segment 26 for receiving information from external sources such as a source 28 of market price information.
- Memory segment 16 contains information about individual transactors, such as name, address, telephone numbers and passwords.
- the various memory segments are operationally associated with one another by information management and operations programs that reside in the CPU, as indicated at 30.
- a communications or I/O port 32 of the CPU governs communications with a network 34 linking remote terminals with the central station.
- Two of the remote terminals are indicated at 36a and 36n, with respective communications (I/O) ports 38a and 38n that communicate with port 32 according to a common communications protocol.
- the system can be further understood in accordance with an example based on trading equities (securities) in large amounts such as those associated with institutional trading.
- the system is based on a network with a secure central station coupled via inter/intra/direct connections to remote stations used by parties to enter transaction interest information and receive alerts.
- Use of the application and system is illustrated below using equity securities as the item of transactional interest for example.
- THE CENTRAL STATION IS A SECURED FACILITY PROTECTED BY FIREWALLS, SECURE SOCKET LAYERS, & HIGH GRADE ENCRYPTION
- Each party can enter a transactional interest or indication including item, identity and side (buyer or seller).
- the indication can be withdrawn from the system at any time.
- Current price monitoring is the responsibility of each entering party.
- other parties are using the system to enter similar information. None of the individual entries is broadcast. Instead, the secure central station compares entries to find a synapse (or coincidence event) involving a buyer and a seller (or perhaps more than one of either) of the same item.
- the size must be a certain minimum based on liquidity of the stock involved (e.g., 100,000 shares).
- the trader also may enter an acceptable price range, and the time that the offer will remain in force.
- the matched parties with contra-side transactional interests will be confidentially alerted & given each other's contact information according to a prior agreed upon protocol.
- Negotiations will then ensue directly with one another (or via agent(s)) in a traditional manner.
- Pre-qualifies all potential participants by requiring each to make a minimum firm commitment prior to being allowed to enter a transactional interest into the system. This may entail posting a non-performance penalty bond or earnest money deposit which shall go to the contra-party to a synapse if the other party fails to perform (enter into negotiations) after a synapse.
- a system that enables parties dealing in fungible commodities can seek counter-parties to their proposed transactions in a secure environment that maintains their anonymity until the prospective transaction entries of two or more parties are matched. Following the match, only the involved parties are notified.
- the matching or coincidence event does not determine the details of a purchase and sale, or other transaction. Instead, within the confines of price ranges or other conditions provided as part of the matching entries, the matched parties negotiate the unresolved specifics of the transaction.
- Parties have the flexibility to tailor their prospective transaction entries by incorporating time limits, price limits and other contingencies. Parties further are encouraged to use the system by the fact that a match of several parties does not rigidly determine all terms of the transaction, but instead sets the stage for the parties to negotiate.
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP00930605A EP1228460A4 (en) | 1999-05-11 | 2000-05-11 | Secure system for trading fungible commodities |
AU48398/00A AU4839800A (en) | 1999-05-11 | 2000-05-11 | Secure system for trading fungible commodities |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13365599P | 1999-05-11 | 1999-05-11 | |
US60/133,655 | 1999-05-11 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2000068857A1 true WO2000068857A1 (en) | 2000-11-16 |
WO2000068857B1 WO2000068857B1 (en) | 2001-02-01 |
Family
ID=22459700
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/012918 WO2000068857A1 (en) | 1999-05-11 | 2000-05-11 | Secure system for trading fungible commodities |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1228460A4 (en) |
AU (1) | AU4839800A (en) |
WO (1) | WO2000068857A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6983259B1 (en) | 2000-06-23 | 2006-01-03 | Ebs Group Limited | Anonymous trading system |
EP1807800A2 (en) * | 2004-11-02 | 2007-07-18 | Longview Funds Management, LLC | Method and system for investing in commodity futures contracts |
US8209254B2 (en) | 2002-07-26 | 2012-06-26 | Ebs Group Limited | Automated trading system |
US8473396B2 (en) | 2001-08-14 | 2013-06-25 | Bloomberg L.P. | Distribution and mapping of financial records from data stream |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8510204B2 (en) | 2006-02-02 | 2013-08-13 | Privatemarkets, Inc. | System, method, and apparatus for trading in a decentralized market |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5689652A (en) * | 1995-04-27 | 1997-11-18 | Optimark Technologies, Inc. | Crossing network utilizing optimal mutual satisfaction density profile |
US5727165A (en) * | 1990-12-17 | 1998-03-10 | Reuters Limited | Offer matching system having timed match acknowledgment |
US5835087A (en) * | 1994-11-29 | 1998-11-10 | Herz; Frederick S. M. | System for generation of object profiles for a system for customized electronic identification of desirable objects |
US6012046A (en) * | 1995-12-12 | 2000-01-04 | Optimark Technologies, Inc. | Crossing network utilizing satisfaction density profile with price discovery features |
US6014627A (en) * | 1992-02-03 | 2000-01-11 | Ebs Dealing Resources, Inc. | Credit management for electronic brokerage system |
US6029195A (en) * | 1994-11-29 | 2000-02-22 | Herz; Frederick S. M. | System for customized electronic identification of desirable objects |
-
2000
- 2000-05-11 AU AU48398/00A patent/AU4839800A/en not_active Abandoned
- 2000-05-11 EP EP00930605A patent/EP1228460A4/en not_active Withdrawn
- 2000-05-11 WO PCT/US2000/012918 patent/WO2000068857A1/en not_active Application Discontinuation
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5727165A (en) * | 1990-12-17 | 1998-03-10 | Reuters Limited | Offer matching system having timed match acknowledgment |
US6014627A (en) * | 1992-02-03 | 2000-01-11 | Ebs Dealing Resources, Inc. | Credit management for electronic brokerage system |
US5835087A (en) * | 1994-11-29 | 1998-11-10 | Herz; Frederick S. M. | System for generation of object profiles for a system for customized electronic identification of desirable objects |
US6029195A (en) * | 1994-11-29 | 2000-02-22 | Herz; Frederick S. M. | System for customized electronic identification of desirable objects |
US5689652A (en) * | 1995-04-27 | 1997-11-18 | Optimark Technologies, Inc. | Crossing network utilizing optimal mutual satisfaction density profile |
US6012046A (en) * | 1995-12-12 | 2000-01-04 | Optimark Technologies, Inc. | Crossing network utilizing satisfaction density profile with price discovery features |
Non-Patent Citations (1)
Title |
---|
See also references of EP1228460A4 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6983259B1 (en) | 2000-06-23 | 2006-01-03 | Ebs Group Limited | Anonymous trading system |
US8473396B2 (en) | 2001-08-14 | 2013-06-25 | Bloomberg L.P. | Distribution and mapping of financial records from data stream |
US8209254B2 (en) | 2002-07-26 | 2012-06-26 | Ebs Group Limited | Automated trading system |
US8775297B2 (en) | 2002-07-26 | 2014-07-08 | Ebs Group Limited | Automated trading system |
EP1807800A2 (en) * | 2004-11-02 | 2007-07-18 | Longview Funds Management, LLC | Method and system for investing in commodity futures contracts |
EP1807800A4 (en) * | 2004-11-02 | 2009-11-04 | Longview Funds Man Llc | Method and system for investing in commodity futures contracts |
Also Published As
Publication number | Publication date |
---|---|
EP1228460A4 (en) | 2005-12-07 |
AU4839800A (en) | 2000-11-21 |
EP1228460A1 (en) | 2002-08-07 |
WO2000068857B1 (en) | 2001-02-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20030004859A1 (en) | Method and system for facilitating secure transactions | |
US20200364777A1 (en) | Apparatus to provide liquid funds in the online auction environment | |
US11158000B2 (en) | Method and cryptographically secure peer-to-peer trading platform | |
US20200098044A1 (en) | System for physically delivering virtual currencies | |
US7231363B1 (en) | Method and system for rebrokering orders in a trading system | |
US6236972B1 (en) | Method and apparatus for facilitating transactions on a commercial network system | |
KR101379168B1 (en) | Multiple party benefit from an online authentication service | |
US20040024690A1 (en) | Volume limitation method and system for a real-time computerized stock trading system | |
US20160005021A1 (en) | System for accepting a first account for making payment for a transaction and paying for the transaction with funds from a second account | |
JP6184659B2 (en) | Multicomputer distributed processing method to avoid information leakage | |
US20100057637A1 (en) | System and method for implementing an anonymous trading method | |
US8204806B2 (en) | System and method of processing account information over a computer network | |
US20020059134A1 (en) | Flexible and extensible e-commerce architecture | |
EP1228460A1 (en) | Secure system for trading fungible commodities | |
US20070088645A1 (en) | System and method of valuation of intellectual property | |
KR20000054828A (en) | In public Bidding/The warding of a contract to manage system | |
JP2002245284A (en) | Electronic commerce system | |
WO2001086546A1 (en) | Method and system for routing and processing financial transaction data | |
KR100370947B1 (en) | Immovable property future trading of the method using a internet | |
WO2000070518A2 (en) | Method and system for anonymously and confidentially matching contraparties to a transaction which results in human negotiation of the final terms of a transaction | |
KR100524648B1 (en) | Method for selling at real time auction the foreign exchange through the internet | |
US7493270B1 (en) | Method of engaging in one or more transactional activities on the internet with limited liability to an initiator | |
KR20020044669A (en) | Method and system for a mortgage loan using internet | |
US20180068391A1 (en) | Method and system for facilitating rules-based communications between two external sources | |
JP2002041992A (en) | Method for dealing merchandise and service by use of communication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH HU IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
AK | Designated states |
Kind code of ref document: B1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH HU IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: B1 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
B | Later publication of amended claims | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2000930605 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 2000930605 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000930605 Country of ref document: EP |