Anti-manipulation method and system for a real-time computerized stock trading system
First Claim
1. A method for protecting against manipulation in a data processing system for trading stocks, the method comprising:
- receiving a first trade order to be executed in real-time outside of exchange trading hours from a first non-institutional user;
receiving a second trade order to be executed in real-time outside of exchange trading hours from a second non-institutional user;
assigning a first identifier to the first trade order, the first identifier uniquely identifying the first user;
assigning a second identifier to the second trade order, the identifier uniquely identifying the second user; and
comparing the first and second identifiers to control the trading of stocks.
0 Assignments
0 Petitions
Accused Products
Abstract
A system protects against intentional market manipulation in a computerized real-time stock trading system. It determines whether users are attempting to manipulate the trading system'"'"'s market using schemes such as self-trading and round-robin trading to create a false appearance of trading activity. The trading system matches buy and sell trade orders placed by different users on the system, and the anti-manipulation component receives unique identifiers for each trade order that identify the users placing the trade order. The anti-manipulation component then compares the identifiers to determine, flag and reject artificial manipulation of the trading system'"'"'s market. These defensive systems may be used in real time stock trading systems that provide after-hours stock trading to both retail and institutional investors.
28 Citations
25 Claims
-
1. A method for protecting against manipulation in a data processing system for trading stocks, the method comprising:
-
receiving a first trade order to be executed in real-time outside of exchange trading hours from a first non-institutional user;
receiving a second trade order to be executed in real-time outside of exchange trading hours from a second non-institutional user;
assigning a first identifier to the first trade order, the first identifier uniquely identifying the first user;
assigning a second identifier to the second trade order, the identifier uniquely identifying the second user; and
comparing the first and second identifiers to control the trading of stocks. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for protecting against manipulation in a data processing system for trading stocks, the method comprising:
-
receiving a first trade order from a first user;
receiving a second trade order from a second user;
assigning a first identifier to the first trade order, the first identifier uniquely identifying the first user;
assigning a second identifier to the second trade order, the identifier uniquely identifying the second user; and
comparing the first and second identifiers to control the trading of stocks.
-
-
8. A method for protecting against manipulation in a data processing system for trading stocks, the method comprising:
-
determining whether a first non-institutional user has executed trades with a second non-institutional user outside of exchange trading hours in real-time more than a predetermined a number of times; and
identifying the first and second users based on the determination. - View Dependent Claims (9, 10)
-
-
11. A method for protecting against manipulation in a data processing system for trading stocks, the method comprising:
-
determining whether a first user has executed trades with a second user more than a predetermined number of times; and
identifying the first and second users based on the determination.
-
-
12. A computer-readable medium containing instructions for controlling a data processing system to perform a method for protecting against manipulation in a data processing system for trading stocks, the method comprising:
-
receiving a first trade order to be executed in real-time outside of exchange trading hours from a first non-institutional user;
receiving a second trade order to be executed in real-time outside of exchange trading hours from a second non-institutional user;
assigning a first identifier to the first trade order, the first identifier uniquely identifying the first user;
assigning a second identifier to the second trade order, the identifier uniquely identifying the second user; and
comparing the first and second identifiers to control the trading of stocks. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A computer-readable medium containing instructions for controlling a data processing system to perform a method for protecting against manipulation in a data processing system for trading stocks, the method comprising:
-
receiving a first trade order from a first user;
receiving a second trade order from a second user;
assigning a first identifier to the first trade order, the first identifier uniquely identifying the first user;
assigning a second identifier to the second trade order, the identifier uniquely identifying the second user; and
comparing the first and second identifiers to control the trading of stocks.
-
-
19. A computer-readable medium containing instructions for controlling a data processing system to perform a method for protecting against manipulation in a data processing system for trading stocks, the method comprising:
-
determining whether a first non-institutional user has executed trades with a second non-institutional user outside of exchange trading hours in real-time more than a predetermined a number of times; and
identifying the first and second users based on the determination. - View Dependent Claims (20, 21)
-
-
22. A computer-readable medium containing instructions for controlling a data processing system to perform a method for protecting against manipulation in a data processing system for trading stocks, the method comprising:
-
determining whether a first user has executed trades with a second user more than a predetermined number of times; and
identifying the first and second users based on the determination.
-
-
23. An anti-manipulation system for a real-time computerized stock trading system, comprising:
-
a receiving component configured to receive a first and a second trade order outside of exchange trading hours from first and second non-institutional users;
a matching engine configured to match the received first and second trade orders and execute trades between matching trade orders in real-time between the users that placed the trade orders; and
an anti-manipulation component receiving the first and a second trade order and applying a unique identifier to each trade order, the unique identifiers uniquely identifying the user placing the trade order, the anti-manipulation component comparing the unique identifiers of the first and second trade orders to determine market manipulation of the trading system when the two trade orders are determined to be matching trade orders.
-
-
24. An anti-manipulation system for a real-time computerized stock trading system, comprising:
-
a receiving component configured to receive a first and a second trade order;
a matching engine configured to match the received first and second trade orders and execute trades between matching trade orders between the users that placed the trade orders; and
an anti-manipulation component configured to determine whether a first user has traded with a second user two or more times and identify the first and second users based on the determination.
-
-
25. An anti-manipulation system for protecting against market manipulation in a data processing system for trading stocks, comprising:
-
means for receiving a first trade order to be executed in real-time outside of exchange trading hours from a first non-institutional user;
means for receiving a second trade order to be executed in real-time outside of exchange trading hours from a second non-institutional user;
means for assigning a first identifier to the first trade order, the first identifier uniquely identifying the first user;
means for assigning a second identifier to the second trade order, the identifier uniquely identifying the second user; and
means for comparing the first and second identifiers to control the trading of stocks.
-
Specification