Exchange risk controls

ABSTRACT

An exchange computer system for improving risk management is described. A user may create a risk profile that includes a risk threshold, and may identify a set of one or more security transaction orders to be associated with the risk profile. The exchange computer system may receive the risk profile from a user device, determine that the set of one or more security transaction orders are associated with the risk profile, and monitor the one or more security transaction orders included in the set. Based on the monitoring, the exchange computer system may determine that the risk threshold is satisfied. In response to determining that the risk threshold is satisfied, the exchange computer system may alert the user and cancel the one or more security transaction orders included in the set.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional Application No. 62/959,731, filed Jan. 10, 2020, U.S. Provisional Patent Application No. 62/967,303, filed Jan. 29, 2020, and U.S. Provisional Patent Application No. 63/021,518, filed May 7, 2020, all of which are incorporated herein by reference in their entirety.

TECHNICAL FIELD

This application relates to technology for trading financial instruments in electronic exchanges, as well as hybrid exchanges that combine electronic and open-outcry trading mechanisms.

BACKGROUND

High volumes of financial instruments such as derivatives, stocks, and bonds are continuously traded at electronic exchanges, which enable trades to occur in real time through the algorithmic processing of orders and associated market information. Generally, a trade may be executed when the price associated with a bid to purchase a financial instrument matches the price associated with an offer to sell the same instrument. Market participants typically price their bids and offers based on market conditions, which are subject to rapid change. Consequently, would-be buyers and sellers expose themselves to financial risk during the pendency of their orders, and can experience substantial losses if they are unable to cancel pending orders quickly enough in reaction to changing market conditions. Accordingly, there is a need for technology that enables market participants to rapidly identify and react to changing market conditions, so as to mitigate risks associated with pending orders.

SUMMARY

The disclosure that follows relates to risk controls implemented via an exchange computer system. The disclosed controls enable system users to rapidly identify and react to changing market conditions, thereby mitigating risks associated with pending orders.

In one aspect, a method for managing risk implemented via an exchange computer system includes receiving, from a user device, a risk profile that includes a risk threshold. The exchange computer system determines that a set of one or more security transaction orders are associated with the risk profile, and uses one or more processors to monitor the one or more security transaction orders included in the set. The system determines, based on the monitoring, that the risk threshold is satisfied and, in response to that determination, cancels the one or more security transaction orders included in the set.

In some implementations, the system may alert a user associated with the risk profile that the risk threshold is satisfied. In some implementations, the system may determine, based on the monitoring, that a sub-threshold associated with the risk threshold is satisfied, and alert a user associated with the risk profile that the sub-threshold associated with the risk threshold is satisfied. The sub-threshold may correspond to a first risk level and the risk threshold corresponds to a second risk level.

The method for managing risk may include receiving one or more order messages that associate the one or more security transaction orders with the risk profile. The one or more order messages may be received from the user device, which may be local to, or remote from, the exchange computer system. The exchange computer system may be a distributed computer system that includes an order routing system configured to route a securities order according to a destination of the securities message, an order matching system configured to match a securities order to a bid or offer according to one or more matching rules, a risk engine, an order entry port configured to receive a security order and to provide the security order to one or more processors in the system, and a purge port configured to cancel the one or more security transaction orders included in the set in response to receiving a cancellation signal.

The method may include receiving a second risk profile that includes a second risk threshold. The exchange computer system determines that a second set of one or more security transaction orders are associated with the second risk profile, monitors the one or more security transaction orders included in the second set, and facilitates one or more security transactions based on the one or more security transaction orders included in the second set. In some examples, the risk profile is associated with a user, and the second risk profile is associated with the same user. The method may include determining that the second risk threshold is not satisfied.

According to some aspects, an exchange computer system includes one or more processors and one or more storage devices. The one or more storage devices store instructions that are operable, when executed by the one or more processors, to cause the one or more processors to perform operations. The operations include receiving, from a user device, a risk profile that includes a risk threshold, and determining that a set of one or more security transaction orders are associated with the risk profile. The one or more processors monitor the one or more security transaction orders included in the set, and determine, based on the monitoring, that the risk threshold is satisfied. In response to determining that the risk threshold is satisfied, the one or more processors cancel the one or more security transaction orders included in the set.

According to some aspects, a non-transitory computer-readable storage medium includes instructions, which, when executed by one or more computer processors in an exchange computer system, cause the one or more computer processors to perform operations. The operations include receiving, from a user device, a risk profile that includes a risk threshold, and determining that a set of one or more security transaction orders are associated with the risk profile. The one or more computer processors monitor the one or more security transaction orders included in the set, and determine, based on the monitoring, that the risk threshold is satisfied. In response to determining that the risk threshold is satisfied, the one or more computer processors cancel the one or more security transaction orders included in the set.

According to some aspects, a method for managing risk implemented via an exchange computer system is described. The method includes receiving data indicative of one or more parameters for configuring a risk profile, generating the risk profile based on the data indicative of the one or more parameters, and assigning a tag to one or more security transaction orders to associate the one or more security transaction orders with the risk profile. The exchange computer system monitors market data indicative of market conditions, and determines, based on the monitoring, that a notional value indicated by the market data satisfies a risk threshold of the risk profile. In response to determining that the risk threshold is satisfied, the exchange computer system cancels the one or more security transaction orders.

The one or more parameters may include a type of order to be associated with the risk profile, a time period for implementing the risk profile, and a threshold limit for a notional threshold. The system may store the risk profile and the data indicative of the one or more parameters for configuring the risk profile in a storage device.

In some implementations, assigning the tag to the one or more security transaction orders to associate the one or more security transaction orders with the risk profile may include the operations of receiving an order message indicating user selection of the one or more security transaction orders to be associated with the risk profile, or determining that a feature of the one or more security transaction orders satisfies a criterion for associating an order with the risk profile. The operation of monitoring the market data indicative of the market conditions may include monitoring a price or volume of a security instrument.

In some implementations, determining, based on the monitoring, that the notional value indicated by the market data satisfies the risk threshold of the risk profile may include determining that the notional value indicated by the market data is equal to or exceeds a notional threshold in the risk profile. The operation of canceling the one or more security transaction orders included in the set comprises may include utilizing a purge port to cancel the one or more security transaction orders, and transmitting a notification to a user device that the one or more security transaction orders have been canceled. In some implementations, the operation of canceling the one or more security transaction orders included in the set may be executed by the risk engine, which may cancel the orders in response to determining that the risk threshold is satisfied.

The method for managing risk implemented via an exchange computer system may also include the operations of receiving data indicative of one or more risk sub-thresholds, and configuring the risk profile to include the one or more risk sub-thresholds. Each of the one or more risk sub-thresholds corresponds to a risk level below a risk level corresponding to the risk threshold. Based on the monitoring, the exchange computer system may determine that a market condition indicated by the market data satisfies the one or more risk sub-thresholds, and may transmit one or more messages to a user device indicating that the one or more risk sub-thresholds have been satisfied.

Certain implementations may provide various advantages. For example, the disclosed risk controls enable users to define and employ risk thresholds on an order-by-order basis. This allows for the rapid cancelation of pending orders associated with a particular threshold upon that threshold's breach or leading up to the threshold's breach, while orders associated with different thresholds remain open. This granular approach to risk control and the associated data structures dramatically improve the speed and computational efficiency of order cancelation, which can otherwise be computationally intensive. Moreover, the granularity enables users to employ multiple risk strategies that are tailored to particular needs and positions, and to rapidly react to changing market conditions.

The risk controls also advantageously protect investors and public interests through real-time risk mitigation and risk minimization. The implementation of the disclosed risk management techniques would, for example, enhance the integrity of trading on the securities markets, and thereby help to assure the stability of the financial system.

Other implementations of this aspect include corresponding systems, devices, processes, apparatus, computer-readable media, and computer programs recorded on computer storage devices, each configured to perform the operations of the methods.

The details of one or more embodiments of the subject matter described in this specification are set forth in the accompanying drawings and the description below. Other potential aspects, features, and advantages will be apparent from the description, the drawings, and the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an example diagram of an exchange computer system and associated networks, devices, and users.

FIG. 2 is an example diagram of a risk profile and associated orders.

FIG. 3 is an example diagram of order cancelation based on a risk profile.

DETAILED DESCRIPTION

FIG. 1 is an example diagram of an exchange computer system and the associated networks, devices, and users that make up an exemplary trading environment in which that system operates. The diagram includes an exchange computer system 110, other exchanges 112, a network 114, user devices 116, 118, 120, market makers/brokers 122, and an electronic order book 124. Generally, the term “user” may refer to any entity that interacts with the exchange computer system and/or associated networks and devices. Users may include, for example, market makers and other market professionals, brokers, institutional traders, individual traders, and automated trading systems.

In some cases, a user may refer to a member, as defined under exchange rules, or a clearing member, who is a member of a Qualified Clearing Agency authorized to clear transactions on behalf of another member, as defined under exchange rules. If a clearing member is the user, the clearing member may be required to request authorization from the exchange control system 110 to receive data indicative of a current or previous risk profile setting of the member on behalf of whom the clearing member is acting.

The exchange computer system 110 may be implemented in a fully electronic manner, or in a hybrid manner that combines electronic trading with aspects of traditional open-outcry systems. The exchange computer system 110 may receive orders for trading financial instruments locally on the floor and from remote electronic devices. The financial instruments may include securities such as stocks, options, futures, or other derivatives associated with an underlying asset.

Network 114 connects the various components within the trading environment, and is configured to facilitate communications between those components. Network 114 may, for example, be configured to enable the exchange of electronic communications that include order and order fulfillment information between connected devices, such as an electronic order book 124 and the exchange computer system 110.

Network 114 may include one or more networks or subnetworks, each of which may include a wired or wireless data pathway. Network 114 may, for example, include one or more of the Internet, Wide Area Networks (WANs), Local Area Networks (LANs), or other packet-switched or circuit-switched data networks that are capable of carrying electronic communications (e.g., data or voice communications).

To protect communications between the various systems, devices, and components connected to network 114, network 114 may implement security protocols and measures such that data identifying order or bid information, or parties placing orders or quotes, may be securely transmitted. Network 114 may, for example, include virtual private networks (VPNs) or other networks that enable secure connections to be established with exchange computer system 110.

User devices 116, 118, and 120 may include portable or stationary electronic devices, such as smartphones, laptops, desktops, and servers that include user interfaces to display information and receive user input, and that are configured to communicate over a computer network. User devices 116, 118, and 120 may communicate with the exchange computer system 110 over network 114 using a proprietary protocol, or a message-based protocol such as financial information exchange (FIX), implemented over TCP/IP.

User devices 116, 118, and 120 may transmit user input such as order information or risk information to the exchange computer system 110, and may also receive data from the exchange computer system 110 indicating that an order has been filled or canceled.

Users such as brokers/market makers 122 may also place orders and receive information about order fulfillment or termination through electronic order book 124, which may include a record of outstanding public customer limit orders that can be matched against future incoming orders.

The exchange computer system 110 includes an order routing system (ORS) 132, an order matching system (OMS) 134, a risk manager 136 that includes a risk engine 138, purge ports 140, order entry ports, a database of trading rules and algorithms 142, and storage 144.

The order routing system (ORS) 132 determines whether a received order or quote is to be executed at the exchange computer system 110, or should instead be redirected to another exchange 112, and includes processing systems that enable the management of high data volumes. The ORS 132 may, for example, receive order or quote information for the purchase or sale of financial instruments from one or more user devices 116, 118, 120, and 124. In some implementations, the ORS 132 may also be connected to or include a touch-screen order routing and execution system accessible by brokers on the exchange floor, such as a public automated routing (PAR) system.

Upon receiving an order or quote, the ORS 132 determines if the destination specified in the received order or quote is the exchange computer system 110. If the exchange computer system 110 is not the destination, the ORS 132 forwards the order or quote to another exchange 112, which may be either the destination exchange, or an exchange en route to the destination exchange.

If the ORS 132 determines that the exchange computer system 110 is the destination of the received order or quote, the ORS 132 may forward the received order or quote to the order matching system 134. The ORS 132 may include or be connected to an order entry port which receives the order and forwards the received order to the order matching system 134.

The order matching system (OMS) 134 includes processing systems that analyze and manipulate orders according to matching rules stored in the database 142. The OMS 134 may also include an electronic book (EBOOK) of orders and quotes with which incoming orders to buy or sell are matched, according to the matching rules. The EBOOK may also be implemented in a separate database such as storage 144, which may include multiple mass storage memory devices for the storage of order and quote information. When the OMS 134 determines that a match exists for an order (for example, when a bid matches an offer for sale), the order matching system 134 may mark the matched order or quote with a broker-specific identifier so that the broker sending the order or quote information can be identified.

Storage 144 and database 142 store and handle data in a manner that satisfies the privacy and security requirements of the exchange computer system 110 and its users, and may store one or more of telemetric data, user profiles, user history, and rules and algorithms for matching quotes, bids, and orders.

Upon completion of a trade (through the floor in open outcry as entered into the PAR system, or through automatic execution through the OMS 134), the fill information is passed through OMS 134 and ORS 132 to one or more user devices 116, 118, 120, and 124, and to a continuous trade match (CTM) system. The CTM system matches the buy side and sell side of a trade, and forwards the matched trade to a third party organization that verifies the proper clearance of the trade, such as the Options Clearing Corporation (OCC) where the securities may be options, or the Depository Trust Company (DTC) where the securities may be equities. The OMS 134 also formats the quote and sale update information and sends that information through an internal distribution system that refreshes display screens on the floor, in addition to submitting the information to a quote and trade dissemination service such as, in the case of options, the Options Price Reporting Authority (OPRA). In the case of equities, the information would be submitted to the Securities Information Processor (SIP).

The exchange computer system 110 includes a risk manager 136 that facilitates risk-management in the trading of financial instruments. The risk manager 136 may include a risk engine 138 and one or more purge ports 140. The risk engine 138 may be implemented using a combination of software and hardware. The risk engine 138 may, for example, be implemented as a hardware processor configured to execute one or more algorithms for managing risk, as described in further detail below.

The risk manager 136 may include or be connected to a user interface in the form of a risk management gateway through which a user can optionally create risk profiles, and may transmit and receive associated information through network 114, to and from user devices 116, 118, 120, and/or 124. The risk management gateway may, for example, be implemented through a Secure Web API and/or a dedicated user portal. In some implementations, the user interface may be connected to, or implemented as, a web portal of the exchange computer system 110.

FIG. 2 is an example diagram of a risk profile and associated orders. In more detail, FIG. 2 depicts an exemplary risk management gateway generated by the risk manager 136, as viewed on user device 116. As shown, the associated user interface enables the user to provide information for generating a risk profile (RiskGroup ID Profile), e.g., by providing values for parameters used to configure the user risk profile. In this manner, the user can specify a risk strategy that is associated with the user, and that may be applied to one or more of the user's orders. The parameters may include, but are not limited to: a type of order or a particular order the user is interested in associating with the risk profile; a time period for implementing the risk profile; one or more threshold limits that may include a range of values or a particular value associated with a net notional or gross notional threshold; a range of values or a particular value associated with a gross credit risk limit; a range of values or a particular value associated with a net credit risk limit; and, in general, any other parameter that reflects the user's preferences for a risk profile.

After receiving the information for generating a risk profile and from the user, the risk manager 136 may generate and store the user's risk profile, which may, for example, be applied on an order-by-order basis, as a tag or ID number included in new order messages sent from user device 116 to exchange computer system 110. In particular, the risk manager 136 may identify an order or a set of orders based on the tags or RiskGroup ID Profile numbers included in the user's order messages, and may further group orders together based on any pre-defined criteria and/or risk limits that the user requires (for example, per side, per asset, per capital-at-risk, and per quantity).

In this manner, risk manager 136 provides the user with granular risk control that enables the user to generate a risk strategy involving specific risk thresholds, and to associate that strategy with particular orders. For example, a member of the exchange might submit a first set of orders that are associated with a first risk profile implementing a first strategy, and a second set of orders that are associated with a second risk profile implementing a second strategy. The first and second strategies might involve different levels of risk tolerance, and the use of first and second risk profiles enables the user to independently set risk thresholds for those strategies, and to tag orders for association with those thresholds within the exchange computer system.

The use of risk profiles and associated data structures enables cancelation to occur within the exchange computer system 110, avoiding the need for multiple cancelation instructions to be transmitted from a user device through network 114, greatly increasing the speed with which cancelation can be processed. Indeed, if the risk threshold for the user's first strategy is satisfied, the system can instantly cancel all orders associated with the first profile, while orders associated with the second profile (and any other non-first profile orders) remain pending.

Moreover, by surgically canceling orders that match or exceed individually-defined risk thresholds, it is less likely that a user's aggregate risk threshold will be triggered (which would result in a mass cancelation of all of the user's pending orders, including orders that the user likely would not want to cancel). In addition to economic benefits to the user, the avoidance of mass cancelation greatly improves computational resource efficiency within the exchange computer system.

In the example shown in FIG. 2 , the user has specified a risk strategy that has a particular gross notional limit and net notional limit, and has identified a set of three orders for association with that risk strategy, while leaving a fourth order unassociated.

After a user completes providing the information for creating a RiskGroupID profile, the associated data may be transmitted from user device 116 to risk engine 138, which processes that data. The risk engine 138 may generate the RiskGroupID profile, associate a new order with a particular risk profile based on a tag or identifier assigned to the order by the user. The risk engine 138 stores the RiskGroupID profile and the conditions and parameter values associated with each RiskGroupID profile in a storage device (e.g., a read-only memory, random access memory, and/or magnetic disks such as internal hard disks and removable disks).

In addition, the exchange computer system 110 may continuously or periodically receive market data indicative of market conditions such as the market price or volume of certain financial security instruments being traded. The risk engine may monitor market data to determine if any of the conditions specified in a given profile have been satisfied. If, for instance, a particular RiskGroupID profile specifies a gross notional limit, and market data indicates that the specified gross notional limit has been satisfied, then the risk engine 138 will determine that the order(s) associated with the particular RiskGroupID profile should be canceled, and may also alert the user. More generally, the risk engine 138 may evaluate all market data to determine if one or more risk thresholds specified in the RiskGroupID profile have been satisfied, i.e., equaled or exceeded.

The risk manager 136 also includes one or more purge ports 140, which may be used to cancel one or more sets of orders. In general, a purge port may refer to a dedicated port that permits a user to simultaneously cancel all or a subset of its orders in one or more symbols across multiple logical ports by requesting the exchange computer system 110 to effect such cancellation. For example, in some implementations, the risk manager 136 may generate and send instructions to a purge port to cancel orders that are associated with a particular RiskGroupID profile, upon a determination and user notification by risk engine 138 that the profile has satisfied a previously defined limit (e.g., a net notional or gross notional limit). A user may be able to specify the manner in which notification occurs. For example, a user may select a desired mechanism of receiving notifications such as receiving e-mail notifications, phone call notifications, text message notifications, fax notifications, or, in general, other suitable mechanisms for securely transmitting messages. In some instances, a user may opt for cancelation without prior notification, upon a determination the previously defined limit has been satisfied. In others, the user may specify that cancelation only takes place after the user has been notified (e.g., alerted), and following receipt of a message indicating user approval. A user may also specify particular sub-thresholds upon which notification will occur.

The risk manager 136 may, for example, notify the user upon determining that the level of risk exceeds one or more sub-thresholds of the risk limit (e.g., 50%, 70%, and/or 90%, although other percentages are possible). The sub-thresholds may be set by default, or according to instructions provided by the user during creation of the RiskGroupID profile. The risk manager 136 may then monitor the market conditions and send updates when certain sub-thresholds are satisfied. For instance, the exchange system 110 may send notifications to the user indicating that the risk limit is 50%, 70%, or 90% satisfied. In this manner, the user is kept informed of market conditions, so as to lessen any surprise associated with cancelation of orders.

In some implementations, a user may be required to validate a RiskGroupID Profile before orders may be tagged according to the risk strategy specified in that RiskGroupID Profile. For example, user IDs, passwords, biometric data, or other suitable security information may be used to validate the creation of a RiskGroupID Profile. A member may be further able to enforce the use of one or more RiskGroupID Profiles by associated users, thereby limiting risk across sessions.

FIG. 3 . is an example diagram of order cancelation based on a risk profile. In more detail, FIG. 3 depicts an example in which the risk engine 138 has received multiple RiskGroupID profiles from one or more user devices 116, 118, 120, and 124. The risk engine 138 assigns RiskGroupID profiles to particular orders, and monitors market data to determine whether orders that have been tagged for association with one or more of the RiskGroupID profiles should be canceled.

In the example shown in FIG. 3 , the risk engine 138 determines that the net notional limit of a security's underlying asset as specified by RiskGroupID profiles N+1 and N+2 has been reached. In response to determining that this limit has been reached, the risk engine determines that all orders associated with those profiles should be canceled. For example, the risk engine 138 may determine that RiskGroupID profiles N+1 and N+2 are associated with purge port 2, and may send an instruction to purge port 2 to cancel all orders associated with RiskGroupID profiles N+1 and N+2. Alternatively, the risk engine 138 may bypass purge port 2 by executing operations to cancel all orders associated with RiskGroupID profiles N+1 and N+2, without sending an instruction to purge port 2.

After the orders have been canceled, the exchange computer system 110 may generate an update indicating that the cancelation has taken place, and may provide that update to other exchanges 112 and to user devices 116, 118, 120, and 124, thereby ensuring that all parties have up-to-date information regarding available offers and quotes.

In some implementations, the exchange computer system 110 may also, periodically or upon request by a user, generate a user report including information regarding trades impacted by the user's risk strategies, and/or information regarding risk strategies and controls that are available to the user, but that are not being utilized by the user. These reports may enable users to monitor, manage, and improve their risk management strategies over time.

Various number of purge ports may be utilized to cancel orders, and one or more RiskGroupID profiles may be assigned to each purge port. In some implementations, the risk manager 136 may set a limit on the number of RiskGroupID profiles that can be assigned to each purge port. Alternatively, the risk engine 138 may cancel orders without reliance on purge ports.

Although embodiments of the present disclosure have been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the present disclosure. Thus, particular implementations have been described. Other implementations are within the scope of the following claims. For example, the actions recited in the claims may be performed in a different order and still achieve desirable results. 

What is claimed is:
 1. A method for risk implemented control via an exchange computer system, the method comprising: receiving, by the exchange computer system from a user device remote to the exchange computer system and through a computer network, information associated with a risk profile that includes a risk threshold, wherein the computer network comprises a network of interconnected electronic devices, wherein the exchange computer system comprises a risk engine processor, one or more purge ports, and a database, and is configured to receive orders through the computer network and from a second exchange computer system different from the exchange computer system; generating, by the risk engine processor, the risk profile based on the information associated with the risk profile received from the user device; storing the risk profile that is received from the risk engine processor in the database; determining that a set of one or more electronic security transaction orders are associated with the risk profile based on tags assigned by the risk engine processor to the one or more electronic security transaction orders, the tags included in order messages received from the user device; determining, by the risk engine processor, whether market data indicative of market conditions relates to one or more conditions in the risk profile associated with the one or more electronic security transaction orders included in the set of one or more electronic security transaction orders; determining, by the risk engine processor, that the risk threshold is satisfied; receiving, at the one or more purge ports, instructions from a risk manager, the risk manager comprising the risk engine processor and the one or more purge ports; configuring the one or more purge ports such that each of the one or more purge ports is limited to a particular number and type of risk profiles; assigning, by the risk engine processor, the risk profile to a set of the one or more purge ports; and canceling, by the risk engine processor, in response to determining that the risk threshold is satisfied upon receiving the instructions at one of the one or more purge ports, the one or more electronic security transaction orders.
 2. The method of claim 1, further comprising: alerting a user associated with the risk profile that the risk threshold is satisfied.
 3. The method of claim 1, further comprising: determining that a sub-threshold associated with the risk threshold is satisfied, wherein the sub-threshold corresponds to a first risk level and the risk threshold corresponds to a second risk level; and alerting a user associated with the risk profile that the sub-threshold associated with the risk threshold is satisfied.
 4. The method of claim 1, further comprising: receiving, from the user device, one or more order messages that associate the one or more electronic security transaction orders with the risk profile.
 5. The method of claim 1, wherein the user device is local to the exchange computer system.
 6. The method of claim 1, wherein the user device is remote from the exchange computer system.
 7. The method of claim 1, wherein the exchange computer system is a distributed computer system comprising: an order routing system; an order matching system; a risk engine; an order entry port; and the one or more purge ports, wherein the set of the one or more purge ports are configured to simultaneously cancel all of the one or more electronic security transaction orders in one or more symbols across one or more logical ports.
 8. The method of claim 1, further comprising: receiving a second risk profile that includes a second risk threshold; determining that a second set of one or more electronic security transaction orders are associated with the second risk profile; determining, by the one or more processors associated with the exchange computer system, whether the market data indicative of market conditions relates to one or more conditions in the second risk profile associated with the one or more electronic security transaction orders included in the second set; and facilitating one or more electronic security transactions based on the one or more electronic security transaction orders included in the second set.
 9. The method of claim 8, wherein the risk profile is associated with a user and comprises a type of order to associate with the risk profile, a time period for implementing the risk profile, and a net or gross notional threshold value; and wherein the second risk profile is associated with the user.
 10. The method of claim 8, further comprising: determining that the second risk threshold is not satisfied.
 11. The method of claim 1, wherein generating the risk profile comprises: electronically tagging the one or more electronic security transaction orders as being associated with the risk profile based on the information associated with the risk profile; and grouping the tagged one or more electronic security transaction orders into one set.
 12. The method of claim 1, wherein the exchange computer system is a distributed computer system comprising: one or more order entry ports that are configured to receive the set of one or more electronic security transaction orders associated with the risk profile; an order routing system that is configured to route the set of one or more electronic security transaction orders; a risk manager comprising the one or more purge ports; and an order matching system that is configured to facilitate transactions between a plurality of market participants.
 13. An exchange computer system comprising: one or more processors and one or more storage devices storing instructions that are operable, when executed by the one or more processors, to cause the one or more processors to perform operations comprising: receiving, by an exchange computer system from a user device remote to the exchange computer system and through a computer network, information associated with a risk profile that includes a risk threshold, wherein the computer network comprises a network of interconnected electronic devices, wherein the exchange computer system comprises a risk engine processor, one or more purge ports, and is configured to receive orders through the computer network and from a second exchange computer system different from the exchange computer system; generating, by the risk engine processor, the risk profile based on the information associated with the risk profile received from the user device; storing the risk profile that is received from the risk engine processor in the one or more storage devices; determining that a set of one or more electronic security transaction orders are associated with the risk profile based on tags assigned by the risk engine processor to the one or more electronic security transaction orders, the tags included in order messages received from the user device; determining, by the risk engine processor, whether market data indicative of market conditions relates to one or more conditions in the risk profile associated with the electronic security transaction orders included in the set of one or more electronic security transaction orders; determining, by the risk engine processor, that the risk threshold is satisfied; receiving, at one or more purge ports, instructions from a risk manager, the risk manager comprising the risk engine processor and the one or more purge ports; configuring the one or more purge ports such that each of the one or more purge ports is limited to a particular number and type of risk profiles; assigning, by the risk engine processor, the risk profile to a set of the one or more purge ports; and canceling, by the risk engine processor, in response to determining that the risk threshold is satisfied upon receiving the instructions at one of the one or more purge ports, the one or more electronic security transaction orders.
 14. The exchange computer system of claim 13, wherein the operations further comprise: alerting a user associated with the risk profile that the risk threshold is satisfied.
 15. The exchange computer system of claim 13, wherein the operations further comprise: determining that a sub-threshold associated with the risk threshold is satisfied, wherein the sub-threshold corresponds to a first risk level and the risk threshold corresponds to a second risk level; and alerting a user associated with the risk profile that the sub-threshold associated with the risk threshold is satisfied.
 16. The exchange computer system of claim 13, wherein the operations further comprise: receiving one or more order messages that associate the one or more electronic security transaction orders with the risk profile.
 17. The exchange computer system of claim 13, wherein the exchange computer system further comprises: an order routing system configured to route a securities order according to a destination of a securities message; an order matching system configured to match the securities order to a bid or offer according to one or more matching rules; an order entry port configured to receive a security order and to provide the security order to the one or more processors; and the set of the one or more purge ports configured to cancel the one or more electronic security transaction orders included in the set in response to receiving a cancellation signal from the one or more processors.
 18. The exchange computer system of claim 13, wherein the operations further comprise: receiving a second risk profile that includes a second risk threshold; determining that a second set of one or more electronic security transaction orders are associated with the second risk profile; determining whether the market data indicative of market conditions relates to one or more conditions in the second risk profile associated with the one or more electronic security transaction orders included in the second set; and facilitating one or more electronic security transactions based on the one or more electronic security transaction orders included in the second set.
 19. The exchange computer system of claim 18, wherein the risk profile is associated with a user and comprises a type of order to associate with the risk profile, a time period for implementing the risk profile, and a net or gross notional threshold value; and wherein the second risk profile is associated with the user.
 20. The exchange computer system of claim 18, further comprising: determining that the second risk threshold is not satisfied.
 21. A non-transitory computer-readable storage medium comprising instructions, which, when executed by one or more computer processors in an exchange computer system, cause the one or more computer processors to perform operations comprising: receiving, by the exchange computer system from a user device remote to the exchange computer system and through a computer network, information associated with, a risk profile that comprises a risk threshold, a type of order to associate with the risk profile, a time period for implementing the risk profile, a net or gross notional threshold value, and a net credit risk limit value, wherein the computer network comprises a network of interconnected electronic devices, wherein the exchange computer system comprises a risk engine processor, one or more purge ports, and a database, and is configured to receive orders through the computer network and from a second exchange computer system different from the exchange computer system; generating, by the risk engine processor, the risk profile based on the information associated with the risk profile received from the user device; storing the risk profile that is received from the risk engine processor in a storage device; determining that a set of one or more electronic security transaction orders are associated with the risk profile based on tags assigned by the risk engine processor to the one or more electronic security transaction orders, the tags included in order messages received from the user device; determining, by the risk engine processor, whether market data indicative of market conditions relates to one or more conditions in the risk profile associated with the one or more electronic security transaction orders included in the set of one or more electronic security transaction orders; determining, by the risk engine processor, that the risk threshold is satisfied; receiving, at one or more purge ports, instructions from a risk manager, the risk manager comprising the risk engine processor and the one or more purge ports; configuring the one or more purge ports such that each one of the one or more purge ports is limited to a particular number and type of risk profiles; assigning, by the risk engine processor, the risk profile to a set of the one or more purge ports; canceling, by the risk engine processor, in response to determining that the risk threshold is satisfied upon receiving the instructions at one of the one or more purge ports, by the one or more electronic security transaction orders; generating a message comprising data indicative of the one or more electronic security transaction orders that have been canceled; and transmitting, to a second exchange system, the message comprising the data indicative of the one or more electronic security transaction orders that have been canceled.
 22. The non-transitory computer-readable storage medium of claim 21, wherein the operations further comprise: alerting a user associated with the risk profile that the risk threshold is satisfied.
 23. The non-transitory computer-readable storage medium of claim 21, wherein the operations further comprise: determining that a sub-threshold associated with the risk threshold is satisfied, wherein the sub-threshold corresponds to a first risk level and the risk threshold corresponds to a second risk level; and alerting a user associated with the risk profile that the sub-threshold associated with the risk threshold is satisfied. 