Data packet processing methods, systems, and apparatus

ABSTRACT

The technology detects undesirable data packets. Data packets are received from multiple sources at one or more packet switches in a data communications network. The one or more packet switches route the data packets to one or more intended destination computing nodes and also transmit a copy of all the data packets received in the data communications network to a network capture device. The network capture device processes the data packets, detects financial data packets, and transmits the detected financial data packets for analysis by a risk exposure computer system that performs automatic financial risk analysis based on the detected financial data packets.

RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.16/427,480, filed May 31, 2019, which is a continuation of U.S. patentapplication Ser. No. 14/841,938, filed Sep. 1, 2015 (now U.S. Pat. No.10,319,033), which claims the benefit of U.S. provisional patentapplication 62/044,718, filed Sep. 2, 2014, the entire contents of eachof which are incorporated herein by reference.

TECHNOLOGY OVERVIEW

The technology relates to systems and methods for monitoring networktraffic to detect, collect, and analyze data packets for patterns,irregularities, and/or indicators that are desirable to identify. Onenon-limiting example application of the technology relates to collectingand analyzing intraday security issue data messages involving potentialdisparate systems, multiple parties, and multiple liquiditydestinations.

BACKGROUND

Various computer systems can assist in the formulation and submission ofuser-initiated (e.g., securities trading) computer transactions toprocessing destinations (e.g., a liquidity destination), collect andprocess information related to consummated transactions after apredetermined time, (e.g., the close of the securities market each day),and enable risk and portfolio risk modeling and analysis after thattime, (e.g., a post market analysis system). In addition, computersystems exist that support intraday risk analysis and modeling but onlyfor those transactions processed through, or integrated with, suchsystems.

The popularity of disparate computerized trading systems, Deliveryversus Payment (DVP) or Receipt versus Payment (RVP) transactions andmultiple prime brokerage relationships creates situations where intradayrisk exposure from large volume, large dollar U.S. equity transactionsperformed by a computerized trading exchange needs to be properlymanaged by Pre-Trade Computer Systems, Intraday Closed Computer Systems,Post Market Computer Systems or Post Market Analysis Computer Systems sothat significant losses that can result from delayed response tointraday risk exposure are avoided.

Institutional clients often use brokers to initiate computertransactions involving United States equities that are physically heldand cleared by another broker or custodial bank, via Delivery versusPayment (DVP) or Receipt versus Payment (RVP) transactions. Riskmanagement computer systems used by executing brokers must also managerisks associated with these transactions, even if they are notintegrated with the risk management computer systems of otherpotentially involved executing brokers and/or with one or more riskmanagement computer systems of one or more relevant custodians. Risksassociated with these types of transactions which might be evident afterclose of the trading day need to be identified automatically andearlier.

Hedge funds and other institutional investors increasingly participatein “away” trades. This means that the trade was initiated by anexecuting broker other than the client's clearing firm or prime brokeron an agency basis (e.g. securities were bought and sold directly intoor out of the clients account) or on a riskless principle basis (thetrade initiating broker sends the trade in for execution at acomputerized trading exchange after receiving an order from the investorand then allocates the trade to the investor's account with amarkup/markdown or commission). In both situations, the trade isperformed electronically and by one or more computers using anidentifier (generally known in the industry as a “Neumonic” or “MPID”)that is different than the investor's identifier but is subsequentlyallocated to that investor through the Depository Trust Company (DTC)for clearing at the investor's clearing firm. In addition, hedge fundsand other institutional investors enter into multiple clearingarrangements with clearing firms or prime brokers. In this lattersituation, the investor may have funds on deposit at each firm and eachfirm, actually clears his/her transactions, or he/she may have a DVP/RVPrelationship with one or more of the firms where the trades aretransferred (generally referred to in the industry as “given up”) to thefirm that will actually do the clearing of the transaction. In all ofthe above situations, risks associated with transactions may only beevident after close of the trading day.

U.S. Pat. No. 7,778,915 describes computer technology that addressessuch intraday risks by automatically collecting real time data from aplurality of liquidity destinations in trading at least one ofsecurities, commodities, options, futures, and derivatives. The realtime data include information on computer-implemented transactions offinancial articles of trade after they have been submitted to theliquidity destinations. The computer system aggregates real time dataprovided by the plurality of liquidity destinations and then preferablyconverts and streams it in a standardized form. Criteria are defined(e.g., by a user) to identify relevant portions of the real time data(e.g., identify risk situations) and stored in memory (e.g., a computerdata base). The computer system compares standardized real time dataagainst the defined criteria to determine what if any defined criteriaare impacted by the real time data and to generate any of a variety ofsuitable outputs for review and/or action by the user and/or thecomputer system.

Notwithstanding with this sophisticated real time data collection andanalysis method and system, the inventors identified areas forimprovement. A technical assumption in existing computerized tradingsystems is that all computerized trading systems are properly configuredto be monitored by a risk analysis system such as that described in U.S.Pat. No. 7,778,915. That assumption does not account, for example, for a“rogue” computer securities trading algorithm. Because a rogue computersecurities trading algorithm is not configured to be monitored by therisk analysis system, it may be able to avoid detection and flood themarket with unauthorized or undesirable computer-generated trade orderdata messages in a very short time frame.

In 2012, Knight Capital experienced what many in the industry call a“rogue algorithm.” The exact details of the cause of the technologyissue are unclear, but what is known is that a computer-implementedtrading algorithm which should not have been running was automaticallybuying and selling shares of equities of several companies that sentvolumes and prices soaring. When the computer-implemented tradingalgorithm was identified and shut off after 45 minutes of trading,Knight Capital had lost over 440 million USD. Thus, a technical problemto be resolved is how to protect against rogue computer-implementedtrading algorithms. Another technical problem is how to detect a roguecomputer-implemented trading algorithm when data relating to that roguealgorithm is not provided to or detected by a conventional risk analysissystem.

SUMMARY

The technology developed by the inventors addresses and resolves theseand other technical problems.

When a user, e.g., an institutional client, sends a trade data messageincluding one or more packets to a data communications network, thosepackets pass through one or more switches, e.g., one or more switches ina network owned or operated by a broker that allows the institutionalclient to trade under its market participant identifier (MPID). The oneor more switches is/are configured to mirror all of the packet trafficthat passes through those one or more switches to a network capturedevice. While the packets proceed to the appropriate exchange ordestination, the network capture device or another node or entity incommunication with the network capture device, e.g., a packet analyzeror filter, analyzes the packets to detect packets that correspond tofinancial network traffic, e.g., orders for financial instruments.Financial network traffic packets are passed on for further processingby a risk analysis system to detect predetermined patterns,irregularities, and/or other indicators of possible financial risk. Bycapturing all financial network traffic regardless of the tradingalgorithm being configured for risk monitoring, “rogue” computersecurities trading algorithms and other order generators not configuredto be monitored can still be monitored for risk and potentially beautomatically shut down in the event of excessive risk.

Example embodiments include a method and apparatus for detectingundesirable data packets. Data packets are received from multiplesources at one or more packet switches in a data communications network,and the one or more packet switches route the data packets to one ormore intended destination computing nodes. The one or more switchestransmit a copy of all the data packets received in the datacommunications network to a network capture device that is separate fromthe one or more intended destination computing nodes. The networkcapture device processes the packets in the data packets and detectingfinancial data packets and transmits the detected financial data packetsfor analysis by a risk exposure computer system that performs automaticfinancial risk analysis based on the detected financial data packets.

In one example implementation, the network capture device transmits thedetected financial data packets to a normalization data processor thateliminates duplicate data packets and converts remaining detectedfinancial data packets to a standard data packet format. Thenormalization data processor transmits the converted financial datapackets for analysis by the risk exposure computer system.

The data packets from multiple sources may include intraday securityissue information involving potential disparate systems, multipleparties, and multiple liquidity destinations. The detected financialdata packets may include order information or order execution forfinancial instruments and/or may include data packets associated withcomputer securities trading algorithms and other order generators thatare not expected, authorized, or configured for risk monitoring.

In an example implementation, the network capture device is a packetanalyzer, a network analyzer, a protocol analyzer, or a packet snifferthat decodes each data packet's header or other fields in the datapacket to determine if it relates to financial network data packets.

The transmitting of a copy of all the data packets to the networkcapture device is preferably done in parallel with the routing of thedata packets to one or more intended destination computing nodes anddoes not impact desired data packet communications and processing.

In an example implementation, the risk analysis system analyzes thefinancial data packets for predetermined patterns, trends, outagesirregularities, and/or other indicators of possible financial risk. Thefinancial network data packets may include pre-trade, at-trade, andpost-trade data packets, and the risk analysis system may analyze thefinancial data packets for pre-trade risks, at-trade risks, andpost-trade risks. The risk analysis system may analyze the financialdata packets using custom risk checks. The risk analysis system maydetect a risk, and in response, initiate an action to mitigate thedetected risk.

Another example embodiment includes a method and apparatus forprocessing data packets. A copy of data packets that are sent frommultiple sources are received for routing to one or more intendeddestination computing nodes. The received copy of data packets aredecoded to identify financial data packets. The identified financialdata packets are then transmitted for automatic financial risk analysisbased on the detected financial data packets.

Another example embodiment includes a method and apparatus for routingdata packets. Data packets are received from multiple sources at one ormore packet switches in a data communications network. The one or morepacket switches route the data packets to one or more intendeddestination computing nodes and also transmit a copy of all the datapackets received in the data communications network to a network capturedevice that is separate from the one or more intended destinationcomputing nodes for detecting financial data packets for automaticfinancial risk analysis.

The features described herein may be combined to form additionalembodiments and sub-elements of certain embodiments may form yet furtherembodiments. This summary is provided to introduce technology aspectsthat are further described below in the detailed description. Thissummary is intended neither to identify key features or essentialfeatures of the claimed subject matter, nor to be used to limit thescope of the claimed subject matter; rather, this summary is intended toprovide an overview of the subject matter described in this document.Accordingly, it will be appreciated that the above-described featuresare merely examples, and that other features, aspects, and advantages ofthe subject matter described herein will become apparent from thefollowing detailed description, figures, and claims.

BRIEF DESCRIPTION OF THE DRAWINGS

To further clarify the above and other advantages and features, a moreparticular description will be rendered by reference to non-limitingexample embodiments, some of which are illustrated in the appendeddrawings. It is appreciated that these drawings depict only exampleembodiments and are therefore not to be considered limiting.

FIG. 1 is a schematic representation of a system in accordance withnon-limiting example embodiments;

FIG. 2 is a flowchart illustrating example steps in accordance withnon-limiting example embodiments;

FIG. 3 is a function block diagram of another non-limiting exampleembodiment in the context of an illustrative financial trading and riskanalysis system;

FIG. 4 is a function block diagram of an example of a non-limitingexample embodiment of a switch node; and

FIG. 5 is a function block diagram of an example of a non-limitingexample embodiment of a network of a network capture device.

DESCRIPTION OF NON-LIMITING EXAMPLE EMBODIMENTS

FIG. 1 is a schematic representation of a system in accordance with anon-limiting example embodiment. Multiple trader computer terminals 12 a. . . 12 n communicate (1) trade related data messages with a Brokerdata communications network 10 (which is typically an internal datacommunications network for the Broker's organization). Although shownoutside, the trader terminals may reside inside or outside the Brokerdata communications network. FIG. 1 also shows multiple trader algorithmcomputer servers 29 a . . . 29 n that each perform computer-implementedautomatic trading within the Broker data communications network. TheBroker data communications network 10 includes one or more switches18-26 for switching or directing packets from a source node to adestination node. In various embodiments, the switches may switchpackets based on protocol layer 2 information, e.g., MAC headerinformation, protocol layer 3 information, e.g., IP header information,or a combination of layer 2 and layer 3 information. A packet switch issometimes understood to packet switch at layer 2 while packet router issometimes understood to packet switch at layer 3. The technologyincludes but is not limited to embodiments that use switches, routers,and combination switch/routers.

The Broker data communications network 10 also communicates with one ormore exchanges 14 a . . . 14 n, (e.g., trading exchanges, liquiditydestinations, dark pools, etc.) and Broker systems 16 (only one is shownfor simplicity). Such exchanges 14 a . . . 14 n and Broker systems 16are controlled by one or more computer servers or the like. Althoughoutput packets is shown flowing from the trader terminals 12 a . . . 12n via the Broker data communications network 10 to the exchanges 14 a .. . 14 n and Broker system 16, packet monitoring and risk assessment mayalso be performed on packets flowing in other directions including fromthe exchanges 14 a . . . 14 n and/or Broker system 16 to the traderterminals 12 a . . . 12 n. Communication may be via any suitable signalcommunication medium as described above including but not limited towired, wireless, electrical, optical, or electromagnetic communicationstechnology.

The switches 18, 24, and 26 on the borders of the Broker datacommunications network 10 preferably also include a firewall for datasecurity and protection. Data packets received from trader terminals 12a . . . 12 n is routed towards the exchanges 14 a . . . 14 n via one ormore packet switches 18-26 in the network 10. These packet switches maybe owned or operated, in one non-limiting example, by a broker thatallows an institutional client to trade under its market participantidentifier (MPID). One or more of these switches 18-26 is configured tomirror (copy) the packet flow it receives and sends the original packetson to their appropriate destination(s), which if those packets relate totrading means they are sent to one or more of the exchanges 14 a . . .14 n. Each switch 18-26 may also be configured to send the mirroredpackets to a network capture device 28. The network capture device 28receives mirrored data packets from one or more of the switches 18-26.

In this example embodiment, the network capture device 28 receives allof the data packets that are transported through the Broker datacommunications network so that all data packets can be inspected. Inexample embodiments, the network capture device 28 identifies all datapackets that relate to financial transactions and sends them to anormalization data processor 30 which eliminates duplicate packets andconverts them to a standard format, if needed, before sending them to arisk analysis/exposure computer system 32. In other example embodiments,the network capture device 28 forwards all packets to another node or toa further entity, e.g., a packet filter, that identifies all of thosepackets that relate to financial transactions and sends them to anormalization data processor 30 which eliminates duplicate packets andconverts them to a standard format, if needed, before sending them to arisk analysis/exposure computer system 32.

The network capture device 28 may be a packet analyzer, also known as anetwork analyzer, protocol analyzer, or packet sniffer, and isimplemented using a programmed computer and/or using computing hardwarewhich intercepts (and can if desired log) data packets passing over thedata communications network 10. One example network capture device 28 isVelocimetrics “Tip-off” product.

As data streams flow across the data communications network 10, thenetwork capture device 28 captures each data packet and, in non-limitingexample embodiments, decodes the packet's header or other fields in thedata packet to determine if it relates to financial network datapackets. For example, decoded packets that contain both an = sign and acontrol A (ASIC 0) in a repeating pattern are likely to be FIX packets.FIX is a known financial data packet communications protocol. As anotherexample, the packet analysis may be performed by decoding andidentifying a data packet that is or relates to an OUCH (or otherfinancial data communications protocol) login or other request. Packetsthat follow for that requested transmission are assumed to include OUCHpackets.

One way to monitor all data packets in the Broker data communicationsnetwork is via each network switch having a monitoring port that mirrorsall packets passing through all ports of the switch. Another exampleapproach is to use a network tap. Yet another example embodiment uses apacket analyzer such as tcpdump.

The risk analysis/exposure computer system 32 performs risk analysis(detailed examples are described below) and provides the results to aBroker computer system 16. Based on the results, the Broker computersystem 16 may take some appropriate or desired risk awareness action.

This financial data packet routing and monitoring technology addressesand resolves a computer-implemented financial transactions systemtechnical challenge and provides a number of advantages not provided byexisting computer-implemented financial transaction systems. First,monitoring all the data packets in the network prevents a roguealgorithm and other unconfigured and/or unauthorized order generatorsfrom avoiding detection and analysis by a risk analysis/exposure system.No assumption is made that all computerized trading systems are properlyconfigured to be monitored by a risk analysis/exposure system. As aresult, risk protection is enhanced dramatically. Second, the monitoringtechnology which provides this risk protection enhancement is low cost.Third, no additional latency is introduced over and above thatintroduced by the network switch. Fourth, the data packet mirroring andanalysis is done in parallel to and does not impact normal tradecommunications and processing. Fifth, by monitoring all financial tradedata packets sent over the network, trading algorithms and other ordergenerators which are unexpected and/or unauthorized in the network canbe detected and trigger risk awareness actions. In situations wherethere are multiple, diverse order generation systems, configuration ofeach system to allow for risk monitoring and shut-down can beprohibitively expensive as each system would need to be individuallymodified. Sixth, the technology described in this application allows fora single point of set-up and configuration to enable automatic riskmonitoring for all trading systems.

In the example case of the rogue algorithm at Knight Capital, which wasnot configured to run through any risk analysis engine, the technologyin this application would nevertheless detect those rogue trades andtake risk awareness actions. Even if those risk awareness actions areignored, the risk analysis computer system may take additional steps andshut down the network port that the rogue algorithm is trading on tobreak communication between the algorithm and exchange(s) which wouldhave triggered an automatic cancellation of all open orders by theexchange(s). Such actions would have severely limited the lossessustained by Knight Capital had they been taken.

FIG. 2 is a flowchart illustrating example steps in accordance with anon-limiting example embodiment. In step S1, trader terminals transmitpacketized messages to a broker's network, and the network routes thosepackets via one or more packet switches through the network to one ormore exit switches (step S2). One or more of the switches mirror (copy)all data packets moving through the network to a network capture device( (step S3). Meanwhile, the trade data packets continue on their waythrough the network (without any delay caused by the mirroring) to theappropriate exchange destination (step S4). The network capture deviceautomatically processes the received data packets, e.g., by decodingeach packet to extract packet information like packet headerinformation, packet size, particular packet fields or indicators, etc.,in order to detect those packets that relate to financial transactions(step S5). As mentioned above, the network capture device may, inexample embodiments, pass the packets to another computer node or entityto perform this processing. The network capture device (or other packetprocessing node or entity) transmits those data packets that thedecoding detects relate to financial transactions for risk analysis(step S6), and may optionally save the detected packets in a memory ifdesired. In example embodiments, those detected packets that relate tofinancial transactions are normalized into a standard format since thepackets may originate from disparate sources that use different dataformats. This normalization may be done by a normalization engine, whichthen sends the packets that relate to financial transactions, now instandard format, to the risk exposure system for financial risk analysisand action if warranted (step S7).

FIG. 3 is a function block diagram of another non-limiting exampleembodiment with an illustrative financial trading and risk analysiscomputer system that processes financial articles of trade. One exampletrading system, described in U.S. Pat. No. 7,778,915 and incorporatedherein by reference, performs consolidation and analysis of intradayfinancial risk related to submitted securities, commodities, options,futures transactions, where securities, commodities, options, andfutures are examples of financial articles of trade. The submittedsecurities, commodities, options, futures, or other financial articlesof trade transaction involve at least one of disparate systems, multipleparties, and multiple liquidity destinations. Reference to securities orsecurity transactions below include transactions involving securities,commodities, options, or futures. The term “other financial articles oftrade” transaction refers to any other article traded at the liquiditydestinations other than securities, commodities, options, and futures.It should be appreciated that different configurations can be used toconsolidate and analyze the data to achieve a given result. Althoughparticular combinations are disclosed, variations on those combinationscan be used to achieve the same consolidation and analysis in thefinancial trading and risk analysis computer system.

Hedge Funds 1 and 2 (40 and 42) each buy and/or sell various securitiesasset classes such as equities and equity derivatives (e.g., futures andoptions) in Electronic Communication Networks (ECNs) 14 a, AlternativeTrading Systems (ATSs) 14 b, and exchanges 14 c, 14 d. A correspondentbroker 44 is an authorized member of and helps the Hedge Funds 40 and 42access the Electronic Communication Networks (ECNs) 14 a, AlternativeTrading Systems (ATSs) 14 b, and exchanges 14 c, 14 d. The Hedge Funds40 and 42 may use the broker 44 or a standalone electronic tradingsystem to affect trades, e.g., the Hedge Fund 42 uses a proprietarysystem to trade on the Electronic Communication Network (ECN) 14 a aswell as the Alternative Trading System (ATS) 14 b and is using broker'ssystem to trade on the Exchanges 14 c, 14 d. The Hedge Funds 40 and 42and the broker 44 need to know about all the trading activities on areal time basis in order to more effectively manage their risk. Once atrade is executed, the trade must be settled using the clearing broker46. Advantageously, all of the data packets traffic associated with thehedge funds 40 and 42, the broker, the Electronic Communication Networks(ECNs) 14 a, Alternative Trading Systems (ATSs) 14 b, and exchanges 14c, 14 d are copied to the network capture device 28 for processing asdescribed above.

The financial trading and risk analysis computer system 32 in FIG. 3receives the financial data packets from the network capture device 28and performs risk analysis based on those received final data packets.The risk analysis enables parties involved in the purchase and/or saleof securities, commodities and other financial articles to monitorintraday financial risk related to submitted securities transactionsregardless of which securities trading system(s) were used by such partyor such party's clients to affect such transactions, regardless of whichliquidity destination or destinations was/were used to effect suchtransactions (e.g., the NYSE, NASDAQ or Alternative Trading Systems suchas ECNs), and regardless of which third parties ultimately becameinvolved in effecting such transactions (e.g., the initiating client,intermediary broker dealer(s), clearing firms, etc.).

At the same time that post-trade data is collected from the liquiditydestinations, other financial information is collected from othersources including for example pre-trade financial transactions such astrader terminal orders identified by the network capture device from oneor more networks that carry financial data packets. As financial data iscollected from liquidity destinations and networks that carry financialdata packets, other criteria, such as parameters of relevant accountinformation may collected and stored so as to enablecomputer-implemented, real-time comparison of trading activity versushistorical activity.

The risk exposure computer system 32 can interact with different networktechnologies and topologies to aggregate desired information. In somecases, the risk exposure computer system must be able to be configuredto identify a particular private data messaging infrastructure tomonitor and record appropriate transaction activity. In other cases, therisk exposure computer system may interact with other systems to makerequests on a timed or event driven basis. This interaction couldinvolve data message-based inquiries, direct access to databases, orother transaction-based requests. When relevant information related to agiven financial situation is detected on one or more monitored networks,the relevant financial information is collected and, if necessary ordesired, packaged, or translated into an appropriate normalized formatand submitted for risk analysis. For example, the widely known FIX dataprotocol standard may be used as the standard format. Other dataprotocol formats could be used, e.g., OUCH or a proprietary format usedonly by the packet normalizer and risk analysis computer.

The risk exposure computer system 32 processes the received traderelated data packets from the network capture device 28 and compares itagainst criteria, such as parameters or rules with regard to certainrisks, trends, outages, uses, or other desired limits. The risk exposurecomputer system 32 can also leverage the capabilities of externalanalysis systems which may be commercially available to addressparticular risk, trend, outage, use scenarios, or other determiningevents. For example, an external analysis system could include a thirdparty risk system for a particular class of securities or group ofclients or other class. These parameters or rules and external analysissystems can be managed via a hierarchy to set overall criteria for agroup of users, specialized criteria for individual users at any levelwithin a defined hierarchy, or other criteria. These parameters or rulesand external analysis systems can be used to adjust one or morecomposite ratings that will be used in other processing, or may simplyaccumulate a value or values for the impacted users and the hierarchywithin which they exist.

Once the risk exposure computer system 32 determines that informationwarrants a responsive action, for example, the information equals,exceeds or falls below specified parameters or rules, notificationalerts and/or action responses may be generated and sent. A configurabledashboard user interface may be used to display real-time views ofaggregated trading activity across markets, asset classes, and tradingsystems. Notification alerts can be sent via e-mail, facsimiletransmission, text message, voice, third-party message format/protocolor other messaging means to notify one or more user designatedrecipients, i.e., a human and/or machine, of a particular event.Notification alerts can require confirmation from recipients, ifconfirmation is not received within a defined timeframe. Also, follow-upnotification alerts can be sent in accordance with user defined alerthierarchies until an acknowledgement is received from a designatedrecipient or recipients. Notification Alerts can be assigned priority todetermine if they should be sent out instantaneously or after aspecified amount of time, such as once an hour, a business drivenwindow, such as once a day, or accumulate a certain number of messagesbefore being released, or according to some other user criteria.

The risk exposure computer system 32 can also create action responses inan attempt to mitigate or maximize, as appropriate, the impact ofidentified situations in different scenarios. In this regard, aneffective network(s) in which to affect an action response may be anetwork or networks other than the one in which the initial eventoccurred. For example, an action response may be to send a signal to theswitch where the financial transactions are passing through, orderingthat switch to stop all data packets on the port transporting thetransactions. This would break the connection to the exchange andprevent further trades from occurring.

FIG. 4 is a function block diagram of an example of a non-limitingexample embodiment of a network switch node 100. The network switch 100is coupled to other network switching devices and/or network nodes usingone or more ports 102. Switch 100 also includes a controller 106 thatincludes one or more processors or CPUs 108, one or more memories 110(including but not limited to magnetic, flash-based, solid state, orother storage technology), and an optional user interface 112. Thecontroller 106 is coupled to one or more forwarding information tables104 that may include forwarding and/or routing information used by theswitch 100 to forward network data packets via the one or more ports112. In some examples, the one or more forwarding information tables 104may include a media access control (MAC) table, a layer 3 (L3) table,and/or other tables and data structures. In particular, the controllerusing the routing tables to forward a mirror or copy of all of its datapackets via one or more ports 102 to the network capture device 28 or200 as described below.

FIG. 5 is a function block diagram of an example of a non-limitingexample embodiment of a network of a network capture device 200 that isprogrammed according to certain example embodiments. The network capturedevice 200 includes a central processing unit or CPU 202, a system bus204 that communicates with RAM 206 and storage 208. The storage 208 canbe magnetic, flash-based, solid state, or other storage technology. Thesystem bus 204 communicates with user input adapter 210 (e.g., PS/2, USBinterface, or the like) that allows users in input commands to networkcapture device 200 via a user input device 212 (e.g., a keyboard, mouse,touch panel, or the like). The results of the processing may bedisplayed to a user on a display 216 via display interface 214 (e.g., avideo card or the like).

The network capture device 200 may also include a network interface 218(e.g., a transceiver) to facilitate wired (e.g., Ethernet—802.3x) and/orwireless communication (WiFi/802.11x protocols, cellular technology, andthe like) with external systems 222 such as one or more of the packetswitches like the network switch node 100 shown in FIG. 4 and/or one ormore databases 220. External systems 222 may also include otherprocessing systems, such as systems that provide third party services,client devices, server systems, or other computing nodes similar to thatof computing node 200, e.g., to form a distributed computing system.External systems 222 may also include network attached storage (NAS) tohold large amounts of data. External systems, along with the internalstorage and memory, may form a storage system for storing andmaintaining information (e.g., graphical models, event log data, etc).Such a system may communicate with users and/or other computing systemsto implement the techniques described herein. The database 220 mayinclude relational, object orientated, or other types of databases forstoring information (e.g., the makeup of an index, a tracked about ofcash that has been generated by index components, etc).

In certain examples, a CPU may include multiple cores (e.g., (core1,core2, core3, and core4) that are all coupled to on-die memory (e.g., L2or L3 cache memory). It will be appreciated that other architecturetypes may be used. For example, a multiple processor system may be usedand the distinct processors may share fast onboard cache memory. Systemswith additional, fewer, or single cores are also contemplated.

The risk exposure computer system 32 may automatically monitor andmanage risk in several categories. Non-limiting examples in computerizedtrading exchanges include buying power/threshold restrictions,restricted and hard to borrow securities risk management, short sellrestriction risk management, single order quantity limit management,single order value risk management, realized and unrealized profit andloss. The risk management system can be loaded with clients' overnightbuying power and stock positions. During the day, the risk exposurecomputer system receives copies of all client messages of a financialnature in real-time, performs risk calculations, generates appropriatealerts, and/or takes appropriate action.

The risk exposure computer system 32 can check for the following examplerisk parameters and raise an alert if any of the defined parameters orrules is violated. Other customized risks checks may be added.

The following detailed examples are non-limiting and refer to a riskexposure computer system labeled RX which stands for RiskXposure tocheck for, detect, and manage all types of financial trading riskscalled “risk checks” across exchanges, clients, regions, and assetclasses (e.g., equities, options, futures, etc.) to better manageexposure, and prevent unwanted activity like rogue trading algorithms,credit overages, etc. RiskXposure may be integrated with RiskWay, whichis a trade control gateway for trading equities, to help users tradeacross multiple destinations while supporting managed activity with arobust set of trade risk controls.

Pre-Trade Risk Checks

Limits set in RX are sent to order entry gateways. Orders passingthrough the gateways are reviewed and possibly rejected before deliveryto exchanges.

SOV, SOQ, Price Collars

Separate limits are available per asset class for SOQ (single orderquantity), SOV (single order value), contract premium, and pricecollars.

Risk Checks Action On Visible in Visible in Risk Check DescriptionBreach Riskway RX Equity SOQ A limit on the number of shares in anorder. Set as Order is Yes No Limit a function of the share price.rejected. Equity SOV Maximum order value (shares * price) per order.Order is Yes No Limit rejected. Tiered Price of an equity order ischecked to ensure it is Order is Yes No Equity Price in a range aroundthe Best Bid & Offer. Multiple rejected. Collar price collar ranges areconfigurable based on order price. Price collar checks can enforcedollar ranges or percent value ranges. % ADV as Limits orders to withina percentage of the 20 day Order is Yes No SOQ average daily volume forthe symbol. rejected. Options A limit on the number of contracts in anorder. Set Order is Yes No SOQ as a function of the option price.rejected. Option SOV The maximum order value (contracts * price) perOrder is Yes No Limit option. rejected. Options Restriction on themaximum price of an options Order is Yes No Max contract rejected.Premium Option A limit to the total number of option contracts Order isYes No Contracts bought and sold during the trading day. rejected. LimitTiered Price of an option order is checked to ensure it is Order is YesNo Option in a range around the Best Bid & Offer. Multiple rejected.Price Collar price collar ranges are configurable based on order price.Price collar checks can enforce dollar ranges or percent value ranges.Futures A per order risk check set on the shares/contracts Order is YesNo SOQ requested in individual futures orders. rejected. Multi Leg Alimit on the combined value of a multileg order Order is Yes No SOVcontaining equities and options. rejected.

Kill Switches

RX can disable trading of specific assets, or all trading for the entireenterprise, or for select traders.

Action On Visible in Visible in Risk Check Description Breach Riskway RXEquity Kill Disables all equity trading for a trader Order is Yes NoSwitch or group of traders. rejected. Option Kill Disables all optiontrading for a trader Order is Yes No Switch or group of traders.rejected. Disable All Disables all trading for a trader or Order is YesNo Trading group of traders. rejected.

Restricted Stocks, ETB

Restricted stock lists, and ETB validation is enforced before orders goto market.

Action On Visible in Visible in Risk Check Description Breach Riskway RXEasy To Borrow Order is checked against broker's Order is Yes No (ETB)Short Sale ETB list. rejected. Restricted Stock Order is checked againstthe broker's Order is Yes No Restricted Stock list. rejected. RestrictedStock by Order is checked against broker's Order is Yes No SideRestricted Stock list based on the rejected. side. Long/Short Sale Orderis checked against long Order is Yes No portfolio position to ensuresell is rejected. long sale.

At-Trade Risk Checks

At-Trade risk checks are updated with execution messages read fromtrading exchanges. If an execution creates a portfolio condition thatexceed the allowed limit for a trader, RX will create

a breach condition that is sent to connected gateways. This breachnotification informs the gateway either to reject all further tradesfrom a trader (reject all mode), or to only allow specific order typesthat will decrease the trader's risk (liquidation mode).

Portfolio Market Value Risk Checks

RX can track and limit growing portfolio value (net, gross, long, andshort).

Action On Visible in Visible in Risk Check Description Breach Riskway RXLeverage Limit A limit on the portfolio gross market RX screen alert,Yes Yes value divided by the current equity. Email alert, Portfoliolevel ″reject all.″ Portfolio GMV Limitation on the absolute value of RXscreen alert, Yes Yes Limit the long market value plus the short Emailalert, market value of a portfolio. Portfolio level liquidate mode.Portfolio The gross market value limit divided RX screen alert, Yes YesGMV/Equity by the equity limit. Email alert, Limit Portfolio levelliquidate mode. Portfolio LMV The limit to the market value of all RXscreen alert, Yes Yes Limit long positions for the portfolio. Emailalert, Portfolio level liquidate mode. Portfolio NMV The net marketvalue limit for the RX screen alert, Yes Yes Limit portfolio. Emailalert, Portfolio level liquidate mode. Portfolio The net market valuedivided by the RX screen alert, Yes Yes NMV/Equity equity limit for theportfolio. Email alert, Limit Portfolio level liquidate mode. PortfolioSMV A limit on the short market value of RX screen alert, Yes Yes Limitthe portfolio. Email alert, Portfolio level liquidate mode. NeutralityThe absolute value of the net market RX screen alert, Yes Yes Ratiovalue divided by the gross market Email alert. value. Excess or Aconstraint on the amount of live RX screen alert, Yes Yes Deficit Limitequity a trader must keep in reserve. Email alert. One option is torequire an equity amount greater than a percentage of the GMV of thetrader's portfolio. Another option is to set a fixed requirement margin.Stock Shares Limit on total number of shares held. RX screen alert, YesYes Limit Email alert.

Portfolio Loss Limits

RX can alert on and limit portfolio losses, both realized by heldpositions, and unrealized due to the current market value of aportfolio.

Action On Visible in Visible in Risk Check Description Breach Riskway RXRealized Loss Limit on the realized profit and loss RX screen alert, YesYes Limit of the trader portfolio. Email alert, Portfolio levelliquidate mode. Unrealized Limit on the unrealized profit and RX screenalert, Yes Yes Loss Limit loss of the portfolio considering Email alert,current market prices. Portfolio level liquidate mode. Total Loss Thesum of realized and unrealized RX screen alert, Yes Yes Limit profit andloss. Email alert, Portfolio level liquidate mode. Total Loss A limit tothe realized plus RX screen alert, Yes Yes Over Equity unrealized loss atrader can make Email alert, as a percentage of their current Portfoliolevel equity. liquidate mode.

Portfolio Concentration Limits

RX can track and prevent traders from forming excessively concentratedportfolios with positions in just a few symbols.

Action On Visible in Visible in Risk Check Description Breach Riskway RXGMV % The maximum percentage that the RX screen alert, Yes YesConcentration Gross Market Value of any one Email alert, Limitinstrument can be as compared to Portfolio level the Gross Market Valueof the liquidate mode. portfolio. LMV % The maximum percentage that theRX screen alert, Yes Yes Concentration long market value of any oneEmail alert, Limit instrument can be as compared to Portfolio level theLong Market Value of the liquidate mode. portfolio. SMV % The maximumpercentage that the RX screen alert, Yes Yes Concentration Limit ShortMarket Value of any one Email alert, instrument can be as compared toPortfolio level the Short Market Value of the liquidate mode. portfolio.$Delta The Dollar Delta limit on any RX screen alert, Yes YesConcentration position within a portfolio Email alert, Limit compared tothe Dollar Delta of the Portfolio level entire portfolio (US only).liquidate mode. Consolidated A limit to the potential loss RX screenalert, No Yes Requirement in a single product and its Email alertConcentration derivative instruments versus the TIMS-based worst caserequirement of the entire trader portfolio.

Locate Management

Locates can be tracked either in a pre-trade fashion or at-trade.

Risk Checks Action On Visible in Visible in Risk Check DescriptionBreach Riskway RX $Delta The Dollar Delta limit on any RX screen alert,Yes Yes Concentration position within a portfolio Email alert, Limitcompared to the Dollar Delta of Portfolio level the entire portfolio (USonly). liquidate mode. Consolidated A limit to the potential loss RXscreen alert, No Yes Requirement in a single product and its Email alertConcentration derivative instruments versus the TIMS-based worst caserequirement of the entire trader portfolio. Order Based Order is checkedagainst remaining Order is Yes No Locates locate quantity based on totalorders in rejected. the market. Execution Based Locates Order is checkedagainst remaining Order is No Yes locate quantity based on executions.rejected.

Order Pattern Limits

RX can temporarily suspend traders when certain trading patterns aredetected.

Action On Visible in Visible in Risk Check Description Breach Riskway RXOption Limits the number of option RX screen alert, Yes Yes Fillexecutions a trader can have per Email alert, Rate second. If the traderbreaches this option trading limit, they will be unable to placesuspended option orders for a configurable temporarily. timeout period.Duplicate RX scans for duplicate orders with in RX screen alert, Yes YesOrder a configurable time window. Email alert, Patterns similarduplicate orders are rejected for a time-out period. Self Cross RXperiodically scans for self cross RX screen alert, No Yes Check trades,where the same MPID Email alert participates in both sides of a match,and creates breaches if they are found.

Portfolio Capital Risk Checks

Action On Visible in Visible in Risk Check Description Breach Riskway RXCommitted A limit on intraday portfolio RX screen alert, Email Yes YesCapital Limit value minus offsetting BOD Alert, Portfolio level value.″liquidate only.″ Buy Capital A limit on the running sum of all RXscreen alert, Email Yes Yes Limit trader buy executions (Shares * alert,Portfolio level Price) for the day. ″reject all.″ Net Capital Absolutevalue of buy capital - RX screen alert, Email Yes Yes Limit sellcapital. alert, Portfolio level ″reject all.″ Sell Capital Limitation onthe running sum RX screen alert, Email Yes Yes of all sell executions(Shares * alert, Portfolio level Price) for the day. ″reject all.″ TotalCapital The running sum of all RX screen alert, Email Yes Yes executions(Shares * Price) over alert, Portfolio level the trading day. ″rejectall.″

Position Level Risk Checks

As RX reads execution messages from exchanges, it tracks and updates thepositions of each trader. These risk checks limit the exposure allowedin any single trader position. RX can also be configured to allowseparate limits to be set on ETFs.

Action On Visible in Visible in Risk Check Description Breach Riskway RXFutures Net A trader position limit set for RX screen alert, Email YesYes Contracts individual futures contracts. alert. Symbol ADV A limit tothe total number of RX screen alert, Email Yes Yes shares a trader isallowed to buy Alert, Symbol level and sell in any symbol. liquidationmode. Symbol NMV A limit on the Net Market Value RX screen alert, EmailYes Yes Limit of any symbol/position. Alert, Symbol level liquidationmode. Symbol NMV A limit to any symbol's net RX screen alert, Email YesYes Over Equity market value divided by the Alert, Symbol level Limittrader's current equity. liquidation mode. ETF Symbol A limit to thetotal number of RX screen alert, Email Yes Yes ADV shares a trader isallowed to buy Alert, Symbol level and sell in an ETF symbol.liquidation mode. ETF Symbol A limit on the Net Market Value RX screenalert, Email Yes Yes NMV Limit of any ETF in the trader portfolio.Alert, Symbol level liquidation mode. ETF Symbol A limit to any ETF'snet market RX screen alert, Email Yes Yes NMV Over value divided by thecurrent Alert, Symbol level Equity Limit trader equity. liquidationmode.

Option Greek Risk Checks

RX supports limits on combined exposure to cross-asset risk. Limits canbe placed on the combined risk of positions in equities and theirrelated options (US only) .

Action On Visible in Visible in Risk Check Description Breach Riskway RXPosition $Delta A maximum Dollar Delta limit RX screen alert, Email YesYes for any of the trader's Alert, Symbol level positions. liquidationmode. Position A limit on the Dollar Delta RX screen alert, Email YesYes $Delta/Equity divided by equity for any of Alert, Symbol level thetrader's positions. liquidation mode. Position $Gamma A maximum DollarGamma RX screen alert, Email Yes Yes limit for any of the trader'sAlert, Symbol level positions. liquidation mode. Position A limit on theDollar Gamma RX screen alert, Email Yes Yes $Gamma/Equity divided byequity for any of Alert, Symbol level the trader's positions.liquidation mode. Portfolio $Delta A limit on the Dollar Delta for RXscreen alert, Email Yes Yes a trader's portfolio alert, Portfolio levelliquidate mode. Portfolio A trader portfolio limit on RX screen alert,Email Yes Yes $Delta/Equity Dollar Delta divided by equity. alert,Portfolio level liquidate mode. Portfolio $Gamma A limit on the DollarGamma RX screen alert, Email Yes Yes for a trader's portfolio. alert,Portfolio level liquidate mode. Portfolio A trader portfolio limit on RXscreen alert, Email Yes Yes $Gamma/Equity Dollar Gamma divided by alert,Portfolio level equity. liquidate mode. Portfolio $Vega A limit on theDollar Vega for RX screen alert, Email Yes Yes a trader's portfolio.alert, Portfolio level liquidate mode. Portfolio A trader portfoliolimit for RX screen alert, Email Yes Yes $Vega/Equity calculated Vegadivided by alert, Portfolio level equity. liquidate mode. GMV DollarDelta A trader portfolio limit for the RX screen alert, Email Yes YesDollar Delta adjusted Gross alert, Portfolio level Market Value.liquidate mode. GMV Dollar A trader portfolio limit for the RX screenalert, Email Yes Yes Delta/Current Dollar Delta adjusted Gross alert,Portfolio level Equity Market Value divided by liquidate mode. equity.

Portfolio Margin Risk Checks

RX can track and limit the theoretical losses a trader portfolio willincur under an array of simulated market shifts.

Action On Visible in Visible in Risk Check Description Breach Riskway RXBuying Power A limit on the calculated losses a RX screen alert, EmailYes Yes Limit portfolio can incur assuming a worst alert, Portfoliolevel ‘ case’ drop in value. The value loss of liquidate mode. equitiesand options are determined from TIMS data. Consolidated A limit to theTIMS worst-case RX screen alert, No Yes Requirement analysis on aportfolio with additional Email alert. Limit security mapping andoffsetting (futures, options on futures, ETFs, options on ETFs, andoptions on indexes). Consolidated A limit to the TIMS worst-case RXscreen alert, No Yes Requirement/ analysis on a portfolio versus theEmail alert. Equity Limit amount of reserve equity held by the trader.Product A limit on the ratio of the worst case RX screen alert, No YesRequirement/ possible loss from any of the Email alert. Equity Limitderivative instruments of any single product versus the trader's equity.

Custom Stress Risk Checks

Custom stresses allow a client to define the their own shock scenariosthat will be used to stress- test trader portfolios for potentiallosses.

Action On Visible in Visible in Risk Check Description Breach Riskway RXCustom A limit on theoretical portfolio loss from the RX screen alert,No Yes Scenario 1 first price/volatility shock scenario divided by Emailalert. Over Equity trader equity. Custom A limit on theoreticalportfolio loss from the RX screen alert, No Yes Scenario 2 secondprice/volatility shock scenario divided by Email alert. Over Equitytrader equity. Custom A limit on theoretical portfolio loss from the RXscreen alert, No Yes Scenario 3 third price/volatility shock scenariodivided by Email alert. Over Equity trader equity. Custom A limit ontheoretical portfolio loss from the RX screen alert, No Yes Scenario 4fourth price/volatility shock scenario divided by Email alert. OverEquity trader equity. Custom A limit on theoretical portfolio loss fromthe RX screen alert, No Yes Scenario 5/ fifth price/volatility shockscenario divided by Email alert. Over Equity trader equity. Custom Alimit on theoretical portfolio loss from the RX screen alert, No YesScenario 6 sixth price/volatility shock scenario divided by Email alert.Over Equity trader equity. Custom A limit on theoretical portfolio lossfrom the RX screen alert, No Yes Scenario 7 seventh price/volatilityshock scenario divided Email alert. Over Equity by trader equity. CustomA limit on theoretical portfolio loss from the RX screen alert, No YesScenario 8 eighth price/volatility shock scenario divided by Emailalert. Over Equity trader equity. Custom A limit on theoreticalportfolio loss from the RX screen alert, No Yes Scenario 9 ninthprice/volatility shock scenario divided by Email alert. Over Equitytrader equity. Custom A limit on theoretical portfolio loss from the RXscreen alert, No Yes Scenario 10 tenth price/volatility shock scenariodivided by Email alert. Over Equity trader equity. Breakup 1 Aportfolio-wide limit on losses using the worst- RX screen alert, No YesOver Equity case result per underlying from two of the Email alert.defined custom scenarios. Breakup 2 A portfolio-wide limit on lossesusing the worst- RX screen alert, No Yes Over Equity case result perunderlying from two of the Email alert. defined custom scenarios.Largest A limit per underlying (with related instruments RX screenalert, No Yes Issuer Loss 1 offsetting). Up to ten of the customscenarios Email alert. Over Equity are used to analyze the maximumtheoretical loss possible in an underlying versus trader equity. LargestA limit per underlying (with related instruments RX screen alert, No YesIssuer Loss 1 offsetting). Up to ten of the custom scenarios Emailalert. Over Equity are used to analyze the maximum theoretical losspossible in an underlying versus trader equity.

Open Order Risk Checks

RX can also track the risk of a trader's portfolio plus risk from openorders. When an order is submitted to the gateway, it consumes creditfrom a pool shared across all gateways connected to RX. If there is notenough credit for the order, then it is rejected before being routed toa exchange.

Risk Checks Action On Visible in Visible in Risk Check DescriptionBreach Riskway RX Open Buying A limit on a trader's executed Buying RXscreen alert, No Yes Power Limit Power, plus all TIMS valued open ordersEmail alert. times a discount coefficient. Open GMV Limit to the GMV ofa portfolio plus a RX screen alert, No Yes Limit discounted amount foropen orders. Email alert. Open A limit on the value of all heldpositions RX screen alert, No Yes Leverage plus a discounted amount foropen Email alert. Limit orders, divided by trader equity.

Gateway Configuration Checks

Order entry gateways in the TradeGuard system can be configured toenforce these checks. These are performed pre-trade at the gatewaywithout any interaction with the RX.

Action On Visible in Visible in Risk Check Description Breach Riskway RXTime in Force Order is checked for restricted times in Order is No Noforce. rejected. Verify Lending Verifies that order has an active locateflag Order is No No Broker identifying valid lending broker. rejected.Order Type Order is checked for restricted order types Order is No NoChecks (e.g., Iceberg, ISO). rejected. MOC/LOC Rules Orders arevalidated against exchange Order is No No MOC/LOC rules. rejected. TagScript Orders can be filtered based on the Order is No No contents ofany FIX field. rejected. Penny/Sub- Orders for securities above onedollar must Order is No No Penny Pricing be in increments of one penny.Orders for rejected. Constraints securities below one dollar canincrement by a one hundredth of a penny. Canadian Board Orders forCanadian securities must Order is No No Lot Validation increment inunits determined by the rejected. securities previous closing price.maximum theoretical loss possible in an underlying versus trader equity

Risk checks, such as one or more of the examples above, enable the riskanalysis computer system to monitor capital usage and manage limitsacross accounts.

The above description sets forth specific details, such as particularembodiments for purposes of explanation and not limitation. It will beappreciated by one skilled in the art that other embodiments may beemployed apart from these specific details. In some instances, detaileddescriptions of well-known methods, nodes, interfaces, circuits, anddevices have been omitted so as not obscure the description withunnecessary detail. Those skilled in the art will appreciate that thefunctions described may be implemented in one or more nodes usingoptical components, electronic components, hardware circuitry (e.g.,analog and/or discrete logic gates interconnected to perform aspecialized function, ASICs, PLAs, etc.), and/or using software programsand data in conjunction with one or more digital microprocessors orgeneral purpose computers. Moreover, certain aspects of the technologymay additionally be considered to be embodied entirely within any formof computer-readable memory, such as, for example, solid-state memory,magnetic disk, optical disk, etc. containing an appropriate set ofcomputer instructions that may be executed by a processor to carry outthe techniques described herein.

The term “signal” (e.g., a data signal, a data packet signal, etc.) isused herein to encompass any signal that transfers information from oneposition or region to another in an electrical, electronic,electromagnetic, optical, or magnetic form. Signals may be conductedfrom one position or region to another by electrical, optical, ormagnetic conductors including via waveguides, but the broad scope ofsignals also includes light and other electromagnetic forms of signals(e.g., infrared, radio, etc.) and other signals transferred throughnon-conductive regions due to electrical, electronic, electromagnetic,or magnetic effects, e.g., wirelessly. In general, the broad category ofelectrical signals includes both analog and digital signals and bothwired and wireless mediums. An analog signal includes information in theform of a continuously variable physical quantity, such as voltage; adigital signal, in contrast, includes information in the form ofdiscrete values of a physical characteristic, which could also be, forexample, voltage.

Unless the context indicates otherwise, the terms “circuitry” and“circuit” refer to structures in which one or more electronic componentshave sufficient electrical connections to operate together or in arelated manner. In some instances, an item of circuitry can include morethan one circuit. A “processor” is a collection of electrical circuitsthat may be termed as a processing circuit or processing circuitry andmay sometimes include hardware and software components. In this context,software refers to stored or transmitted data that controls operation ofthe processor or that is accessed by the processor while operating, andhardware refers to components that store, transmit, and operate on thedata. The distinction between software and hardware is not alwaysclear-cut, however, because some components share characteristics ofboth. A given processor-implemented software component can often bereplaced by an equivalent hardware component without significantlychanging operation of circuitry, and a given hardware component cansimilarly be replaced by equivalent processor operations controlled bysoftware.

Hardware implementations of certain aspects of the technology describedabove may include or encompass, without limitation, digital signalprocessor (DSP) hardware, a reduced instruction set processor, hardware(e.g., digital or analog) circuitry including but not limited toapplication specific integrated circuit(s) (ASIC) and/or fieldprogrammable gate array(s) (FPGA(s)), and (where appropriate) statemachines capable of performing such functions.

Circuitry above is described structurally based on its configuredoperation or other characteristics. For example, circuitry that isconfigured to perform control operations may be referred to herein ascontrol circuitry and circuitry that is configured to perform processingoperations may be referred to as processing circuitry.

In terms of computer implementation, a computer is generally understoodto comprise one or more processors or one or more controllers, and theterms computer, processor, and controller may be employedinterchangeably. When provided by a computer, processor, or controller,the functions may be provided by a single dedicated computer orprocessor or controller, by a single shared computer or processor orcontroller, or by a plurality of individual computers or processors orcontrollers, some of which may be shared or distributed.

The term “system” as used herein means a computer system.

The terms “automatic” and “automatically” as used herein mean performedby or under the control of a computer.

Although various embodiments have been shown and described in detail,the claims are not limited to any particular embodiment or example. Noneof the above description should be read as implying that any particularelement, step, range, or function is essential. All structural andfunctional equivalents to the elements of the above-described preferredembodiment that are known to those of ordinary skill in the art areexpressly incorporated herein by reference and are intended to beencompassed. Moreover, it is not necessary for a device or method toaddress each and every problem sought to be solved by the presentinvention, for it to be encompassed by the invention. No embodiment,feature, component, or step in this specification is intended to bededicated to the public.

1. (canceled)
 2. A network capture device for processing data packets ina data communications network, the data communications network includingone or more packet switches in communication with source computing nodesand destination computing nodes, the network capture device comprising:a receiver configured to receive data packets received by the one ormore packet switches in the data communications network; one or moreprocessors configured to process the data packets to decode each datapacket's header or other fields in the data packet to determine when thedata packet is a financial data packet; and a transmitter configured totransmit financial data packets for analysis by a risk exposure computersystem.
 3. The network capture device in claim 2, wherein the datacommunications network includes one or more data paths that do notinclude the network capture device for conveying the data packets to oneor more of the destination computing nodes.
 4. The network capturedevice in claim 2, wherein the one or more processors includes anormalization processor configured to eliminate duplicate data packetsand convert remaining financial data packets to a standard data packetformat.
 5. The network capture device in claim 2, wherein the datapackets from the source computing nodes include intraday security issueinformation involving potential disparate systems, multiple parties, andmultiple liquidity destinations.
 6. The network capture device in claim2, wherein the financial data packets include data packets associatedwith at least one of computer securities trading algorithms and otherorder generators that are not expected, authorized, or configured forrisk monitoring.
 7. The network capture device in claim 2, wherein someof the data packets include financial data and some of the data packetsdo not include financial data.
 8. The network capture device in claim 2,wherein the financial data packets include pre-trade, at-trade, andpost-trade data packets.
 9. The network capture device in claim 2,wherein the financial data packets are formatted with a FIXcommunications protocol or with an OUCH communications protocol.
 10. Amethod for processing data packets in a data communications network, thedata communications network including one or more packet switches incommunication with source computing nodes and destination computingnodes, the method comprising: a network capture device receiving datapackets received by the one or more packet switches in the datacommunications network; the network capture device processing the datapackets including decoding each data packet's header or other fields inthe data packet to determine when the data packet is a financial datapacket; and the network capture device transmitting financial datapackets for analysis by a risk exposure computer system.
 11. The methodin claim 10, wherein the data packets are forwarded to one or more ofthe destination computing nodes along one or more data paths that do notinclude the network capture device.
 12. The method in claim 10, furthercomprising: the network capture device transmitting the financial datapackets to a normalization data processor that eliminates duplicate datapackets and converts remaining financial data packets to a standard datapacket format, and the normalization data processor transmitting thefinancial data packets converted to the standard data packet format foranalysis by the risk exposure computer system.
 13. The method in claim10, wherein data packets from the source computing nodes includeintraday security issue information involving potential disparatesystems, multiple parties, and multiple liquidity destinations.
 14. Themethod in claim 10, wherein the financial data packets include datapackets associated with at least one of computer securities tradingalgorithms and other order generators that are not expected, authorized,or configured for risk monitoring.
 15. The method in claim 10, whereinsome of the data packets include financial data and some of the datapackets do not include financial data.
 16. The method in claim 10,wherein the financial data packets include pre-trade, at-trade, andpost-trade data packets.
 17. The method in claim 10, wherein thefinancial data packets are formatted with a FIX communications protocolor with an OUCH communications protocol.
 18. A non-transitory,computer-readable storage medium for storing a computer-readableinstructions that, when executed by one or more processors, cause theone or more processors to perform a method for processing data packetsin a data communications network, the data communications networkincluding one or more packet switches in communication with sourcecomputing nodes and destination computing nodes, wherein the one or moreprocessors include a network capture device having a packet analyzer, anetwork analyzer, a protocol analyzer, or a packet sniffer and thenetwork capture device is separate from the destination computing nodes,the method comprising: a network capture device receiving data packetsreceived by the one or more packet switches in the data communicationsnetwork; the network capture device processing the data packetsincluding decoding each data packet's header or other fields in the datapacket to determine when the data packet is a financial data packet; andthe network capture device transmitting financial data packets foranalysis by a risk exposure computer system.
 19. The non-transitory,computer-readable storage medium in claim 18, wherein the datacommunications network includes one or more data paths that do notinclude the network capture device for conveying the data packets to oneor more of the destination computing nodes.
 20. The non-transitory,computer-readable storage medium in claim 18, wherein data packets fromthe source computing nodes include intraday security issue informationinvolving potential disparate systems, multiple parties, and multipleliquidity destinations.
 21. The non-transitory, computer-readablestorage medium in claim 18, wherein the financial data packets includedata packets associated with at least one of computer securities tradingalgorithms and other order generators that are not expected, authorized,or configured for risk monitoring.