Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

A Goldman trading scandal? (Goldman Sach's automated trading software stolen)
Reuters ^ | 07/05/09 | Matthew Goldstein

Posted on 07/06/2009 12:40:57 AM PDT by TigerLikesRooster

A Goldman trading scandal?

Posted by: Matthew Goldstein

Did someone try to steal Goldman Sachs’ secret sauce?

While most in the US were celebrating the 4th of July, a Russian immigrant living in New Jersey was being held on federal charges of stealing top-secret computer trading codes from a major New York-based financial institution—that sources say is none other than Goldman Sachs.

The allegations, if true, are big news because the codes the accused man, Sergey Aleynikov, tried to steal is the secret code to unlocking Goldman’s automated stocks and commodities trading businesses. Federal authorities allege the computer codes and related-trading files that Aleynikov uploaded to a German-based website help this major “financial institution” generate millions of dollars in profits each year.

The platform is one of the things that apparently gives Goldman a leg-up over the competition when it comes to rapid-fire trading of stocks and commodities. Federal authorities say the platform quickly processes rapid developments in the markets and uses top secret mathematical formulas to allow the firm to make highly-profitable automated trades.

The criminal case has the potential to shed a light on the inner workings of an important profit center for Goldman and other Wall Street firms. The federal charges also raise serious questions about the safeguards Wall Street firms deploy to protect their proprietary trading systems.

The criminal case began to unfold on the evening of July 3 when Aleynikov was arrested by FBI agents at Newark Liberty Airport, after returning from Chicago. Aleynikov had just started a job with another firm in Chicago, after leaving the big firm in NY in early June. It appears the financial institution allegedly victimized by Aleynikov had alerted federal authorities that its former employee might be up to no good.

(Excerpt) Read more at blogs.reuters.com ...


TOPICS: Business/Economy; Front Page News; News/Current Events
KEYWORDS: aliens; goldmansachs; greedybastards; programtrading; russia; theft
Navigation: use the links below to view more comments.
first 1-2021-4041 next last
Russian mob connection?
1 posted on 07/06/2009 12:40:57 AM PDT by TigerLikesRooster
[ Post Reply | Private Reply | View Replies]

To: TigerLikesRooster; PAR35; AndyJackson; Thane_Banquo; nicksaunt; MadLibDisease; happygrl; ...

Ping!


2 posted on 07/06/2009 12:41:23 AM PDT by TigerLikesRooster (LUV DIC -- L,U,V-shaped recession, Depression, Inflation, Collapse)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerLikesRooster

From ZeroHedge’s Tyler Durden:

http://zerohedge.blogspot.com/2009/07/is-case-of-quant-trading-industrial.html

Sunday, July 5, 2009

Is A Case Of Quant Trading Sabotage About To Destroy Goldman Sachs?

Posted by Tyler Durden at 5:48 PM

Major developing story: Matt Goldstein over at Reuters may have just broken a story that could spell doom for if not the entire Goldman Sachs program trading group, then at least those who deal with “low latency (microseconds) event-driven market data processing, strategy, and order submissions.” Visions of swirling, gray storm clouds over Goldman’s SLP and hi-fi traders begin to form.

Back-up: This week’s NYSE Program Trading report was very odd: not only because program trading hit 48.6% of all NYSE trading, a record high at least since the NYSE keep tabs of this data, and a data point which in itself was startling enough to cause some serious red flags as I jaunt from village to village in what little is left of Europe’s bison country, but what was shocking was the disappearance of the #1 mainstay of complete trading domination (i.e., Goldman Sachs) from not just the aforementioned #1 spot, but the entire complete list. In other words: Goldman went from 1st to N/A in one week.

Even more odd, this “disappearance” comes hot on the heels of what Zero Hedge reported could be potentially a major change to the way the NYSE provides its weekly program trading report. Of course, Ray over at the NYSE immediately replied to Zero Hedge that all was going to be same as always ... Odd, maybe he meant that all is back to normal except the reporting of Goldman’s trades. Either way, it might very well be time for proactive readers to again contact the two employees publicly disclosed by the NYSE as lead-contacts on the issue. Readers will recall that it was these same two who were previously steadfastly assuring anyone who would listen that there would be no change at all in data reporting.

Robert Airo, Senior Vice President, NYSE Euronext at (212) 656-5663 or
Aleksandra Radakovic, Vice President, NYSE Regulation at (212) 656-4144

Alas, the just released weekly data proves that either theirs was a material misrepresentation of facts, or Goldman simply suddenly decided to stop transacting with the NYSE, or, what would be even more sinister, Goldman notified the NYSE to scrap all their trading data from the prior week. Why would they do that?

Going back to Matt Goldstein’s story. In a nutshell, on Friday, one Sergey Aleynikov was arrested at Newark airport by FBI agents, as he was coming back from a trip to Chicago (maybe visiting his new employer), on what are basically industrial espionage charges. Sergey, or Serge as his Linked-In account identifies him, was VP of equity strategy over at 85 Broad (or maybe 1 New York Plaza, his detailed Bloomberg Bio page has disappeared) had the following responsibilities at Goldman Sachs according to Linked-In:

• Lead development of a distributed real-time co-located high-frequency trading (HFT) platform.The main objective was to engineer a very low latency (microseconds) event-driven market data processing, strategy, and order submission engine. The system was obtaining multicast market data from Nasdaq, Arca/NYSE, CME and running trading algorithms with low latency requirements responsive to changes in market conditions.

• Implemented a real-time monitoring solution for the distributed trading system using a combination of technologies (SNMP, Erlang/OTP, boost, ACE, TibcoRV, real-time distributed replicated database, etc) to monitor load and health of trading processes in the mother-ship and co-located sites so that trading decisions can be prioritized based on congestion and queuing delays.

• Responsible for development of real-time market feed handlers, order processing engines and trading tools at a Quantitative Equity Trading revenue-making HFT desk.

If the allegations are true, it looks like Goldman’s hi-fi quant trading desk was thoroughly penetrated by a “spy”, and as readers will recall, Serge(y)’s description of his job duties mirrors what Mr. Ed Canaday conveniently provided to Zero Hedge as a description of Goldman’s SLP program. (Sources connected with the office of the United States Attorney have confirmed to Zero Hedge that Aleynikov was at one time or another a Goldman employee.”).

The plot thickens: per FBI agent Michael McSwain’s sworn deposition, Sergey quit a firm described as “Financial Institution” in the affidavit, which according to circumstantial evidence and according to Goldstein is none other than Goldman Sachs, on June 5, at that time earning $400,000 annually. As Matt reports, he proceeded to move to a Chicago firm engaged in “high volume automated trading” where he would make 3x his $400k salary (Hey Getco, is it time for a formal release at least denying you guys had anything to do with this, cause if you did it might not look that hot. No matter, we have reached out to our sources in law enforcement to confirm or deny Getco’s, and Goldman’s, involvement: once we get a response we will immediately advise our readers).

In the 5 days immediately preceeding his departure from “Financial Institution” (potentially GS), Sergey allegedly downloaded 32 megs of ultra top-secret quant trading proprietary code, that, according to Special Agent McSwain’s affidavit, he then proceeded to encrypt and upload to a website in Germany, with a UK owner. One can only imagine the value of this “code” not only to Goldman but to the highest bidder. After all, from the affidavit: “certain features of the [code], such as speed and efficiency by which it obtains and processes market data, gives the Financial Institution a competitive advantage among other firms that also engage in high-volume automated trading.The Financial Institution further believes that, if competing firms were to obtain the [code] and use its features, the Financial Institution’s ability to profit from the [code]’s speed and efficiency would be significantly diminished.” Needless to say, many others are now also likely hot on the trail of the code.

What is probably most notable, in less than a month since Sergey’s departure from [Goldman?], the FBI was summoned to task and the alleged saboteur was arrested and promptly gagged: if anyone is amazed by the unprecedented speed of this investigative process, you are not alone. If only the FBI were to tackle cases of national security and loss of life with the same speed and precision as they confront presumed high-frequency program trading industrial espionage cases... especially those that allegedly involve Goldman Sachs.

Now the real question here is, does [GS?] feel lucky? Because the code has supposedly been in the hands of an outsider for over a month, one might suspect that anyone who wanted to has had ample opportunity - if the holder(s) wished to sell... Would that have anything to do with the even weirder than usual market action over the past 2-3 weeks: after all it is the very Goldman Sachs (which may or may not be the target of this program trading industrial espionage) which is the primary SLP on the world’s biggest stock exchange.

Another major question: do Goldman and the NYSE not have a fiduciary responsibility to announce to both shareholders and any interested parties if there has been a major security breach in their trading operations? Certainly this seems like a material piece of information: given that program trading accounted for 49% of all NYSE trading last week, and Goldman as recently as one week ago represented about 60% of all principal program trading, will this be called an issue threatening the National Security of the United States. Shouldn’t all market participants be aware that there is some rogue code in cyberspace that can be abused by the highest bidder, who very likely will not be interested in proving the efficient market hypothesis? What will happened when said bidder goes about trying to front run none other than the “Financial Institution” [GS]?

The complete affidavit can be downloaded from this post here, and is also provided Scribed below as this could (and likely should) become a matter of National Security. Zero Hedge will closely monitor this situation from the European hinterland and provide updates as they come. For really interested readers, we recommend tracking any potentially new developments on the forums and message boards over at Wilmott.


3 posted on 07/06/2009 12:46:33 AM PDT by TigerLikesRooster (LUV DIC -- L,U,V-shaped recession, Depression, Inflation, Collapse)
[ Post Reply | Private Reply | To 2 | View Replies]

To: TigerLikesRooster
There is a U.S. patent in the name of Sergey Aleynikov, Newark, NJ which from the sound of it could be related to the technology he is supposed to have stolen from GS:

20080198998 Strategic Telecom Optimized Routing Machine 08-21-2008

http://www.faqs.org/patents/inv/6046

4 posted on 07/06/2009 1:00:29 AM PDT by Brad from Tennessee (A politician can't give you anything he hasn't first stolen from you.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Brad from Tennessee

Patent title: Strategic Telecom Optimized Routing Machine

Inventors:  Sergey Aleynikov
Agents:  OBLON, SPIVAK, MCCLELLAND MAIER & NEUSTADT, P.C.
Assignees:  IDT Corporation
Origin: ALEXANDRIA, VA US
IPC8 Class: AH04M700FI
USPC Class: 37922101



Ads by Google
XDR Memory Architecture - Leading innovations for high-performance memory - www.rambus.com

Diameter Routing Agent - Market leading DRA Supports 3GPP Rel 8 & 9 standards - www.traffixsystems.com

Complete softswitch - Class 4, Class 5, transcoding SS7 gateway, SIP & H323 - www.topex.ro


Abstract:

A method of routing calls through a network (5) includes: receiving an incoming call at a signaling transfer point (STP); transferring information related to the incoming call to a routing engine by decoding ISUP signaling information related to the incoming call; determining an optimized route based at least in part on the transferred information; and signaling the STP to a destination number based on the optimized route.

Claims:

1. A method of routing calls through a network, the method comprising:receiving an incoming call at a signaling transfer point (STP);transferring information related to the incoming call to a routing engine by decoding ISUP signaling information related to the incoming call;determining an optimized route based at least in part on the transferred information; andsignaling the STP to route the call to a destination number using the optimized route.

2. The method according to claim 1, wherein the determining includes:consulting information available in the routing engine; andmodifying an ISUP signaling packet to include additional information.

3. The method according to claim 1, wherein the transferred information includes at least one of an incoming trunk group, a customer characteristic, a destination telephone number, and a maximum number of routes requested.

4. The method according to claim 3, wherein the customer characteristic includes at least one of a service requirement, an acceptable margin of cost, and a usage commitment.

5. The method according to claim 4, wherein the service requirement includes a call quality requirement.

6. The method according to claim 1, wherein the optimized route includes a shortest path across a tandem switch to a desired outbound trunk, wherein the tandem switch interfaces between a voice over a combination of internet protocol network or TDM network.

7. The method according to claim 1, further comprising signaling to the routing engine that the optimized route failed.

8. The method according to claim 7, further comprising providing a second optimized route to the STP.

9. The method according to claim 8, further comprising completing the incoming call using the second optimized route.

10. The method according to claim 1, further comprising:altering content of an ISUP message signaling unit (MSU) by setting additional ISUP parameters for custom routing while preserving an original MSU routing header.

11. The method according to claim 1, wherein a destination switch performs call completion or rejection on a trunk group identified by analyzing custom parameters present in an ISUP message signaling unit.

12. A system for routing calls through a network, the system comprising:a signaling transfer point (STP) configured to receive an incoming call;means for transferring information related to the incoming call to a routing engine, including means for decoding ISUP signaling information related to the incoming call;means for determining an optimized route based at least in part on the transferred information; andmeans for signaling the STP to route the call to a destination number using the optimized route.

13. The system according to claim 12, wherein the means for determining includes:means for consulting information available in the routing engine; andmeans for modifying an ISUP signaling packet to include additional information.

14. The system according to claim 12, wherein the transferred information includes at least one of an incoming trunk group, a customer characteristic, a destination telephone number, and a maximum number of routes requested.

15. The system according to claim 14, wherein the customer characteristic includes at least one of a service requirement, an acceptable margin of cost, and a usage commitment.

16. The system according to claim 15, wherein the service requirement includes a call quality requirement.

17. The system according to claim 12, wherein the optimized route includes a shortest path across a tandem switch to a desired outbound trunk, wherein the tandem switch interfaces between a voice over internet protocol network and another network.

18. The system according to claim 12, further comprising means for signaling to the routing engine that the optimized route failed.

19. The system according to claim 16, further comprising means for providing a second optimized route to the STP.

20. The system according to claim 19, further comprising means for completing the incoming call using the second optimized route.

21. The system according to claim 12, further comprising:means for altering content of an ISUP message signaling unit (MSU) by setting additional ISUP parameters for custom routing while preserving an original MSU routing header.

22. The system according to claim 12, wherein a destination switch performs call completion or rejection on a trunk group identified by analyzing custom parameters present in an ISUP message signaling unit.

23. A computer program product storing a computer program, which when executed by a processor causes the processor to perform steps of:receiving an incoming call at a signaling transfer point (STP);transferring information related to the incoming call to a routing engine by decoding ISUP signaling information related to the incoming call;determining an optimized route based at least in part on the transferred information; andsignaling the STP to route the call to a destination number using the optimized route.

24. The computer program product according to claim 23, wherein the processor further performs steps of:consulting information available in the routing engine; andmodifying an ISUP signaling packet to include additional information.

25. The computer program product according to claim 23, wherein the transferred information includes at least one of an incoming trunk group, a customer characteristic, a destination telephone number, and a maximum number of routes requested.

26. The computer program product according to claim 25, wherein the customer characteristic includes at least one of a service requirement, an acceptable margin of cost, and a usage commitment.

27. The computer program product according to claim 26, wherein the service requirement includes a call quality requirement.

28. The computer program product according to claim 23, wherein the optimized route includes a shortest path across a tandem switch to a desired outbound trunk, wherein the tandem switch interfaces between a voice over internet protocol network and another network.

29. The computer program product according to claim 23, wherein the processor further performs a step of signaling to the routing engine that the optimized route failed.

30. The computer program product according to claim 29, wherein the processor further performs a step of providing a second optimized route to the STP.

31. The computer program product according to claim 30, wherein the processor further performs a step of completing the incoming call using the second optimized route.

32. The computer program product according to claim 23, wherein the processor further performs the step of:altering content of an ISUP message signaling unit (MSU) by setting additional ISUP parameters for custom routing while preserving an original MSU routing header.

33. The computer program product according to claim 23, wherein the processor causes a destination switch to perform call completion or rejection on a trunk group identified by analyzing custom parameters present in an ISUP message signaling unit.

Description:

BACKGROUND OF THE INVENTION

Field of the Invention

[0001]The routing of calls through telephone networks to achieve least cost or best cost routing can be a complicated process. In the past, call routes through switches and carriers were decided through a combination of Microsoft Excel spreadsheets using a manual process. This process entailed dozens of linked Microsoft Excel spreadsheets. These spreadsheets were difficult to expand, and easily reached maximum capacity.

[0002]Additionally, these spreadsheets required the manual input of data across spreadsheets. Once all the commercial information was inputted into the spreadsheets, an additional three to four hours were required before the updates would actually hit the switches and affect routing. This delay in routing updates resulted in ineffective cost routing over the network and poor selection of carriers.

SUMMARY OF THE INVENTION

[0003]The strategic telecom optimized routing machine (STORM) suite of applications of the present invention provides computer-based call routing and management capabilities that are not constrained by limitations imposed by switch-based routing. Through the present invention, it is possible to achieve an improved profitability margin for each call, and quicker responses to carrier outages. STORM routing also more effectively achieves call routing with economic efficiency that satisfies individual customers' business needs.

[0004]To overcome the problem of switches being "unaware of each other," changes to routing options are no longer made offline and loaded onto the switches. Rather, the routing function is removed from the switches and placed on a server. This overcomes limitations in switches, which previously prevented the telecommunications provider from maximizing all possible carrier supplied rates.

[0005]Additionally, through the present invention, it is possible to route incoming calls on paths that are tailored to the individual customers' needs. It is also possible to change routing parameters based on the time of day (e.g., multiple peak and off-peak time periods). Through the present invention routing alterations may hit switches at desired intervals (e.g., instantly or after 15 minutes, etc.), which enables improved network performance.

BRIEF DESCRIPTION OF THE DRAWINGS

[0006]A more complete appreciation of the invention and many of the attendant advantages thereof will be readily obtained as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings, wherein:

[0007]FIG. 1 represents an overview of the STORM network;

[0008]FIG. 2 represents an overview of the rules engine architecture;

[0009]FIGS. 3A and 3B illustrate a non-limiting example of a method of implementing the present invention;

[0010]FIG. 4 illustrates an overview of the architecture of a non-limiting aspect of the present invention;

[0011]FIG. 5 provides a non-limiting example of carriers and trunk lines according to the present invention;

[0012]FIGS. 6A-6D illustrate non-limiting examples of routing tables according to the present invention;

[0013]FIG. 7 illustrates a non-limiting example of a tandem network according to the present invention;

[0014]FIG. 8 illustrates a non-limiting example of the call control layer of an aspect of the present invention; and

[0015]FIG. 9 illustrates a non-limiting example of an ISUP call configuration according to an aspect of the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0016]Referring now to the drawings, wherein like reference numerals designate identical or corresponding parts throughout the several views, an overview of the STORM network is illustrated in FIG. 1. For the purposes of the following discussion, a trunk is defined as a communication path connecting two switching systems used to establish an end to end connection. In selected applications, a trunk may have both its terminations in the same switching system. A trunk group is defined as a set of trunks, traffic engineered as a unit, for the establishment of connections within or between switching systems in which all of the paths may be interchangeable where subgrouped.

[0017]As shown in FIG. 1, commercial operations 3 and network monitors 1 input information into the STORM network 5. This information may include carrier rate of failure, price per call per route, customers' desired quality criteria, as well as other factors known to those of skill in the art.

[0018]As illustrated in FIG. 2, STORM includes a rules engine (e.g., routing server), which is unconstrained by route list size capacity in the switches. The rules engine is also able to express business rules that are beyond the capability of the switches' internal processing. The routes and rules computed by the rules engine are made available real time inside the route server. This server is available to the telephone switches S1-Sn through a control layer. For example, as illustrated in FIG. 4, the route server 30 communicates with the STP layer 10 (e.g., a Sonus switch running version 4.1 software) via control layer 20. The rules engine provides an interface between the real time route server and the virtual switch components.

[0019]To improve customer service, network utilization, and profitability, the present invention may track certain information related to an incoming call. The information includes, but is not limited to, call quality requirements, acceptable margins of cost, destination telephone number, number of routes requested, time of day, number of minutes, as well as other factors known to those of skill in the art. The call destination may be identified by a variety of factors. One factor is the dialing code (the smallest granularity which represents dialing digits). Another factor includes the buy location, which is a group of dialing codes defined by an outbound carrier. The buy location is generally meaningful in the context of the outbound carrier to which it is related. The destination may also be identified using the reporting location. A reporting location is a group of dialing codes defined by IDT based on how these destinations are sold to its customers. Of course, a country, which includes a number of reporting locations, may be used to determine the destination. The route server 30 may use this information to generate routing lists.

[0020]Generally, an originating call request from a physical switch is resolved to the longest dialing code registered with the system. This dialing code may be used to determine the call destination. Advantageously, each country or dialing code for every switch may have the option to control its own availability in routing. In other words, a trunk servicing a particular area code in downtown London may be available for VOIP calls, but may not be available for commercial customers' calls, due to quality requirements or other factors. Because routes may be globally adjusted by the route server based on both the telecommunications provider's desires and/or needs and on the customers' desires and/or needs, it is possible to more effectively route calls through the switches.

[0021]To facilitate routing in compliance with customer requirements and/or requests, the customer may be identified in a manner convenient for the telecommunication provider. For example, if a customer belongs to a wholesale division, that customer may be identified by inbound trunk. Otherwise, debit customers may be identified by account (class id), DNIS (dialed number identification service), or a combination thereof. Account management for each customer may be performed on a Trunk Group Editor (TGE), which enables accounts to be created and maintained. Each inbound account or trunk may be assigned a routable division. This setting may determine the routing path for the traffic for an account or trunk.

[0022]Routing rules may also be generated based on a combination of the following entities: division (e.g., wholesale customer, debit calling card, etc.), account, customer identification (e.g., for wholesale customers switch/inbound trunk and for retail customers DNIS or ANI (automatic number identification). Generally speaking, it is preferable for granular routing rules to override more generic routing rules (e.g., a rule for a location within a country overrides a rule for a country; a rule for DNIS overrides a rule for an account).

[0023]For inter-switch connectivity (e.g., VOIP and TDM (time-division multiplexed)), it is possible to track multiple call requests in a tandem network that belong to the same call and to use a single call reference to associate the requests. Since trunk costs are fixed, tandem connections do not have a cost. Tandem utilization may be controlled using trunk prioritization, according to a non-limiting aspect of the present invention.

[0024]A non-limiting example of a tandem network is illustrated in FIG. 7. As illustrated in FIG. 7, a telephone 70 is used to initiate a call, possibly over an analog network. This call is routed through PBX 72 into voice gateway 74. From voice gateway 74, the call is transferred over an IP network to voice gateway 78. From voice gateway 78, the call is received at PBX 80 and transferred to destination telephone 82. Of course, this illustration of a tandem network is intended as an example only, and other tandem networks are within the scope of the present invention.

[0025]Additionally, the present invention may provide a system-wide default cost differential, which (in conjunction with tandem trunk utilization) will affect the precedence of local trunks as opposed to remote trunks on a tandem switch. Generally, shorter tandem paths are preferred. In other words, if more than one path exists to a remote outbound trunk, the shortest path is preferably selected. If there are multiple paths of equal length to a remote trunk, the tandem path is preferentially chosen which has the greatest remaining capacity. As desired, tandem capacity may be reserved for inbound customers, and priority of tandem utilization by inbound customers may be controlled based on division, account, trunk, DNIS, ANI, or other factors known to those of skill in the art.

[0026]FIGS. 3A and 3B of the present application illustrate the implementation of the call routing system of the present invention. In step S300, a call is received at the STP 10. Once the call is received at the STP 10, the STP 10 informs the control layer 20 of the incoming call in step S302. Upon notification, the control layer 20 decodes ISDN User Part (ISUP) signaling information, determines the best route for the call by consulting the routing database, modifies the ISUP signaling packet to include additional information (destination trunk group--DTG in the form of a destination prefix), unique global call identification reference, and sends the modified ISUP packet back to STP for further routing to the destination switch. By way of further explanation, ISUP defines the protocol and procedures used to set up, manage and release trunk circuits that carry voice and data calls over the PSTN. ISUP may be used for both ISDN and non-ISDN calls. Calls that terminate within the same switch may not use ISUP signaling.

[0027]The routing database stores the routing parameters generated by the routing engine. The call control layer consults the routing database, which contains the routing engine route information. The routing database serves as an intermediate layer.

[0028]The call control layer 20 stays in the signaling path of the call to determine successful completion of the call by the terminating carrier or rejection of the call (in which case the next available route is iteratively executed as described above until all routes are exhausted).

[0029]The packaged information is then passed to the route server 30 in step S306, which uses the information to retrieve a routing list in step S308. The route server 30 then performs hierarchical lookups to account for customer oriented rules (e.g., service level, usage commitments, quality, etc.) in step S310 and returns the prioritized list of outbound carriers (TO1-TOm) and their associated control parameters in step S312. In step S314, the control layer 20 pre-pends the assigned destination trunk group (DTG) carrier routing prefix value for the first outbound carrier in the routing list.

[0030]A DTG carrier routing prefix may form the basis of the prioritized list of the outbound carriers to be used. These DTG carrier routing prefixes may uniquely identify the trunk group or gateway (e.g., 028801 may mean ATT on gateway 1 and 028803 may mean ATT on gateway 2, which may have different rates to the same dialing location). Non-limiting examples of gateways are illustrated in FIG. 7 as 72 and 80. The control layer 20 also performs digit manipulation (if needed) to complete the call in step S316. In step S318, the control layer 20 commands the STP 10 to attempt the dial string. If the call is completed in step S320, the process ends at step S324.

[0031]If the STP 10 is unable to complete the call, it signals back to the control layer 20 that the call could not be completed. The control layer 20 then points to the next preferred carrier prefix in the route list in step S322 and repeats the process until the call is completed or until the route list is exhausted.

[0032]The route server 30 provides information related to the best routes for any given customer. The best route for one customer may or may not be the best route for another customer, depending on a variety of factors. These factors include: required call quality, caller identification ability, price per call, as well as other factors known to those of skill in the art. For example, commercial customers may require a specific level of quality. Accordingly, trunks for commercial customers may be limited to satisfy a quality of service agreement.

[0033]Call quality may be measured as a function of the following four criteria: call completion rate (CCR); average length of call (ALOC); post dial delay (PDD); and voice quality. The measurement may account for a weighted average of these factors. It is possible for the telecommunications provider to assign quality requirements for each customer with acceptable variations (e.g., CCR 80% with acceptable variation of +/-10%). If an outbound trunk or carrier falls below a certain quality threshold, the trunk or carrier may be removed from circulation, as desired.

[0034]Additionally, for calls to cellular customers in Europe, caller identification may be required. Therefore, trunks having a caller identification capability should be selected for those calls.

[0035]The STP 10 includes a number of trunk groups, which can receive calls from customers or send calls to carriers for call completion. As a general rule, switch and trunk configuration may be stored and maintained in a trunk group editor. Additionally, physical switches may be interconnected in a network in which the inter-switch tandem connections are performed using either VOIP or TDM interfaces. In either case, the present invention is able to perform optimal routing with dynamic tandem capacity utilization. Dynamic tandem capacity utilization is achieved when the control layer reports network conditions to the route server, thereby improving network routing. Each physical switch may include attributes to indicate active and inactive periods during which the switch is available for routing to selected destinations. A switch may become unavailable in cases of planned/unplanned maintenance. These attributes enable configuration of the switch without its immediate inclusion in routing.

[0036]Outbound carriers may be represented by an account/outbound trunk combination. Any outbound carrier may have multiple trunks on a given account on the same physical switch. Traffic to these trunks is preferably load balanced to prevent carrier failure. Each outbound rate is available for every inbound call across the telecommunication provider's network. Outbound carriers may block traffic to selected dialing codes, buy locations, or reporting locations, as desired to improve network performance. Outbound carriers' quality issues related to poor call completion may be monitored by a subsystem (TrunkMon, disclosed in U.S. patent application Ser. No. 11/024,672, filed Dec. 30, 2004, the entire contents of which are herein incorporated by reference) that feeds quality characteristics back to STORM. STORM, in turn, adjusts routing accordingly.

[0037]Generally, a carrier provides rates for groups of dialing codes. A carrier may have a certain number of active rates (e.g., three) with a time indication as to when each rate is active (e.g., the time of day during which the rate is active). Based on the rates provided by the carriers, the present invention may create homogeneous groups of codes. These homogeneous groups represent dialing codes where each carrier has a constant rate.

[0038]A carrier may also provide a cap for a certain rate. These caps may be based on several factors. For example, caps may be based on the number of minutes or dollars spent. Caps may apply to country/location or group(s) of countries/locations. Caps may be applied to any subset or combination of weeks/days of week/hours. Caps may start on any day of a month, and may be spread throughout a month or until exhausted.

[0039]Rate based caps may also be implemented. In a rate based cap, the rate goes up or down after the cap is exceeded. With ceiling based caps, a carrier should not be given more traffic than the cap permits (e.g., because the carrier's failure rate becomes unacceptable or for other reasons known to those of skill in the art). For floor based caps, a certain minimum number of minutes or dollars must be reached.

[0040]Based on these caps, commercial operations of the telecommunications provider may control which carriers are available for routing based on routing rules. These rules enable the system of the present invention to pull a carrier from routing based on desired parameters, such as time interval, periodically, or upon reaching a cap.

[0041]To select the carrier, according to a non-limiting aspect of the present invention, a carrier is assigned a routing priority. This priority then impacts the carrier's trunk position in a routing list. The routing rules may be used to adjust the carrier's routing priority. If a carrier's rate becomes capped, the carrier's routing priority may diminish. As a result, the carrier's trunks will drift toward the end of a routing list.

[0042]Each outbound account/trunk may include an attribute that controls inclusion of the account/trunk in routing for the whole world or for a location. As desired, the telecommunications provider may limit a list of outbound carriers based on the inbound customer. Additionally, according to a non-limiting aspect of the present invention, it is possible to assign quality requirements for individual customers and to track carriers' quality based on destination.

[0043]The faster addition of new routes and rates enables the telecommunications provider to exploit all beneficial rates, which means that a higher percentage of calls is routed at more favorable rates. Additionally, routing decisions are more consistent, while lower management costs are achieved. Best cost routes are not always the same as the least cost routes for any given call, so the present invention is able to determine the best cost route, thereby leading to greater profitability for an entire network for a telecommunications provider.

[0044]An example of best cost routing is illustrated in FIG. 5. As shown in FIG. 5, the telecommunications provider may have access to two carriers, A and B. Each of carriers A and B has two outgoing trunk lines, respectively (AL1, AL2, BL1, BL2). In this example, Carrier A has rates of $0.01 per minute for domestic and $0.05 for international. Carrier B has rates of $0.011 for domestic and $0.09 for international.

[0045]Under the rules for least cost routing, if a domestic call comes in, Carrier A is chosen. If a second call is also domestic, Carrier A is again chosen. Thus, trunk lines AL1 and AL2 are used for the domestic calls.

[0046]If a third call arrives which is international, this third call must be routed through Carrier B, because Carrier A is at capacity. As a result, the telecommunications provider, while saving $0.001 per minute on the domestic calls is losing $0.04 per minute on the international call, because the telecommunications provider is required to pay the higher rate for Carrier B on the international call. The total cost for the above example is $0.11 per minute.

[0047]Through the best cost routing of the present invention, the telecommunications provider may apply historical calling information to use its carrier capacity. In the above example, if the expected demand for a given time period is two domestic and one international call, the present invention would assign the first domestic call to Carrier A, the next domestic call to Carrier B, and the third international call to Carrier A. By using best cost routing, the total cost to the telecommunications provider is $0.071 per minute.

[0048]The best cost route is a function of the destination, the customer, the current network status, prioritized routes, the carrier, quality requirements, and applicable business rules, as well as other factors known to those of skill in the art. FIGS. 6A-6C illustrate non-limiting examples of routing tables that may be developed to execute the present invention. For example, a switch determines a routing location by mapping the digits of the desired phone number. In the example of FIG. 6B, certain carriers offer advantageous rates for calls being completed to New York City (NYC). Thus, for calls to NYC, these carriers are listed at the top of the routing table in a "break out." Break outs may be created for any area that has a particularly advantageous rate.

[0049]The example of FIG. 6C illustrates international cell phone calls. For most non-North American countries, the calling party pays for cell phone charges. In FIG. 6C, the destinations for cell phone charges are broken out by best rates. In the example of FIG. 6C, the switch recognizes that UK cell calls are routed to a particular list of carriers. This list may be very different that a list of carriers to use for UK non-cell destinations (based on, for example, the ability to generate caller identification).

[0050]To overcome these heterogeneous destination routing difficulties, the present invention creates a homogeneous routing location. A homogeneous routing location is a destination defined by dial codes, for which every carrier to that destination offers a constant rat to every destination phone number within the location. The table in FIG. 6D illustrates how the present invention applies a homogeneous routing location system to the routing table of FIG. 6C. In this example, each homogeneous routing location becomes a breakout. Because the present invention is capable of maintaining the route list off the switches, the present invention is no longer constrained by the limits of switch memory (for example, a switch is generally limited to 1500 routing locations). Absent this constraint, the present invention is able to capitalize upon greater rate savings across the telecommunication provider's network.

[0051]Additionally, through the use of the routing lists, it is possible to track a call as it traverses the network. In other words, it is possible to track outbound trunk usage and capacity. It is also possible to track carrier quality and call completion rate, among other things.

[0052]The present invention also enables the telecommunications provider to query the routing lists to locate a current ordered list of outbound trunks for a particular customer. Because the call control layer generally operates in real time, the queries are performed using, for example, an in memory database. The routing list is preferably comprised of outbound trunks ordered by rate, quality, priority, and other factors impacted by routing rules. A weighted average of all of these factors may be used to determine a trunk's position in the routing lists.

[0053]FIG. 8 provides a non-limiting example of the configuration of the call control layer according to an aspect of the present invention. As shown in FIG. 8, the routing database layer includes an in-memory database process serving routing queries. The event driven service logic layer manages the state of all call legs involved in call setup and performs CIC management. Circuit Identification Code (CIC) management is a standard ISUP procedure that defines the way logical circuit numbers (e.g., integers) get mapped into physical trunk and channel numbers carrying voice traffic.

[0054]The next level of the call control layer includes ISUP proxy ASP. The ISUP proxy ASPs include several layers. The transaction finite state machine layer manages a connection state for a single leg of a call. The linked-in dispatch layer manages asynchronous message passing between process and/or language boundaries. The ISUP/SIGTRAN stack in each ISUP proxy ASP communicates with the other stack in the other ISUP proxy ASP through state replication. Finally, the ISUP proxy ASP communicates with another distributed state machine layer that manages call state throughout the entire call setup (potentially across multiple switch signaling points). That layer implements the main routing logic that performs hierarchical lookups in a database containing routing instructions.

[0055]A sample ISUP call setup is provided in FIG. 9. As illustrated in FIG. 9, the SSP=A sends an IAM (OPC=1-1-1, DPC=1-1-2). Originating Point Code (OPC) and Destination Point Code (DPC) are standard addressing elements in the SS7 specification, and are similar to IP addresses in the TCP/IP network communications.

[0056]The STP does DTA redirect based on the OPC/DPC address through its M3UA interface to the ISUP proxy. The ISUP proxy then queries the STORM route server for a list of outbound trunk groups represented by CdPA prefixes. In response, the route server returns a list of outbound trunk groups.

[0057]The ISUP proxy selects the first prefix, adds it to the CdPA field, adds state information in the User-to-User information field, and returns a new IAM to the STP. The STP executes DPC routing of the IAM (OPC=1-1-1, DPC=1-1-2) message to the SSP-B. The SSP-B performs routing based on the prefix present in CdPA and determines that the requested trunk group is not available. It returns REL (cause code 34). By way of example, REL (cause code 34) may be an error code indicating a local congestion that is interpreted by the ISUP Proxy ASP as the instruction to advance to the next trunk in the routing list.

[0058]The STP then performs DTA redirect based on the OPC/DPC (OPC=1-1-2, DPC=1-1-1) address through its SIGTRAN/SS7 interface to the ISUP proxy. The ISUP proxy then fetches the call state from the User-to-User information field, selects the next prefix, adds the prefix to the CdPA field, and returns IAM to the STP. STP executes DPC routing of the IAM (OPC=1-1-1, DPC=1-1-2) message to the SSP-B.

[0059]SSP-B performs routing based on the prefix present in CdPA and successfully reserves and rings the line. It returns ACM to the STP. STP performs DTA redirect based on the prefix present in CdPA, and successfully reserves and rings the line. It returns ACM to the STP. STP then performs DTA redirect based on the OPC/DPC (OPC=1-1-2, DPC=1-1-1) address through its SIGTRAN/SS7 interface to the ISUP proxy. The ISUP proxy forward the ACM to the calling party SSP-A. The STP then performs DPC routing of the ACM (OPC=1-1-2, DPC=1-1-1) message to SSP-A. Subsequently, the SSP-B detects a called party answer and returns ANM to the STP. The STP performs DTA redirect based on the OPC/DPC (OPC=1-1-2, DPC=1-1-1) address through its SIGTRAN/SS7 interface to the ISUP proxy. The ISUP proxy forwards ACM to the calling party SSP-A. The STP does DPC routing of the ANM (OPC=1-1-2, DPC=1-1-1) message to the SSP-A.

[0060]While DTA has been used in the foregoing example, it is noted that DTA may be a vendor specific protocol. Accordingly, analogous protocols are within the scope of the present invention. Additionally, while the above example includes SIGTRAN for purposes of efficiency, standard SS7 interfaces are also suitable. IAM, ACM, ANM, REL, RLC are standard message types in the ISUP protocol.

[0061]Consequently, through the present invention, it is possible to generate routes for calls originating from different customers requiring different levels of quality. This route differentiation enables the improvement of profits for the telecommunications provider while satisfying a wider variety of service level agreements.

[0062]Other benefits of the present invention include the ability to avoid banding by customer or division, that fall tandem trunk capacity becomes available for revenue traffic, new generation switches may be deployed without recoding, the possibility of faster responses to network conditions (thereby generating higher customer satisfaction), actions may be automated, and switch ports may be freed for other traffic.

[0063]The present invention includes processing of transmitted and received signals, and programs by which the received signals are processed. Such programs are typically stored and executed by a processor. The processor typically includes a computer program product for holding instructions programmed and for containing data structures, tables, records, or other data. Examples are computer readable media such as compact discs, hard disks, floppy disks, tape, magneto-optical disks, PROMs (EPROM, EEPROM, flash EPROM), DRAM, SRAM, SDRAM, or any other magnetic medium, or any other medium from which a processor can read.

[0064]The computer program product of the invention may include one or a combination of computer readable media to store software employing computer code devices for controlling the processor. The computer code devices may be any interpretable or executable code mechanism, including but not limited to scripts, interpretable programs, dynamic link libraries (DLLs), Java classes, and complete executable programs. Moreover, parts of the processing may be distributed for better performance, reliability, and/or cost.

[0065]Obviously, numerous modifications and variations of the present invention are possible in light of the above teachings. It is therefore to be understood that within the scope of the appended claims, the invention may be practiced otherwise than as specifically described herein.


5 posted on 07/06/2009 1:07:20 AM PDT by TigerLikesRooster (LUV DIC -- L,U,V-shaped recession, Depression, Inflation, Collapse)
[ Post Reply | Private Reply | To 4 | View Replies]

To: TigerLikesRooster

Don’t know. But Wall Street firms hire alot of russian and eastern european computer science engineers and number crunchers to help develop their automated trading schemes.
Doesn’t surprise me that Goldman Sachs runs programs like these to influence and manipulate the markets for profit.
Wonder if this has anything do with with the massive drop off in automated system trades by Goldman Sachs last week.


6 posted on 07/06/2009 1:07:22 AM PDT by Proud_USA_Republican
[ Post Reply | Private Reply | To 1 | View Replies]

To: Proud_USA_Republican
Wonder if this has anything do with with the massive drop off in automated system trades by Goldman Sachs last week.

Quite likely. ZeroHedge and this Reuter blog have their suspicion leaning that way.

7 posted on 07/06/2009 1:09:23 AM PDT by TigerLikesRooster (LUV DIC -- L,U,V-shaped recession, Depression, Inflation, Collapse)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Brad from Tennessee
It all depends on how legal ownership of the software is defined. It is also likely that the software interacts with other softwares and this software alone underwent some modifications and expansions. To define how much he owns could turn into a complicated issues.
8 posted on 07/06/2009 1:13:25 AM PDT by TigerLikesRooster (LUV DIC -- L,U,V-shaped recession, Depression, Inflation, Collapse)
[ Post Reply | Private Reply | To 4 | View Replies]

To: TigerLikesRooster

lawl


9 posted on 07/06/2009 1:19:03 AM PDT by happinesswithoutpeace (Hey there, White House Ha Ha Charade you are)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerLikesRooster

Oh come on. According to Jim Cramer, former GS employee and hedge fund manager, homegamers (aka individual traders) are still to blindly trust that the US equities markets are not manipulated because they are supposed to “stay in the game” (hits button with bulls roaring and “buy, buy, buy” sound effect at same time).
He keeps instructing them to pump money into their portfolios no matter how much they lose on his advice. Thats just what the experts like Cramer call, “cost averaging down” even if their investment goes to 0. If it goes to 0, then they give a speech about risk and repeat the disclaimer.
Individual investors who don’t have access to such technology as STORM are still to believe the markets aren’t manipulated and major financials aren’t provided and trade inside information, or even *gasp* cordinate their trades with other major firms to manipulate equities prices.
BOOYAHH!!!!


10 posted on 07/06/2009 1:38:17 AM PDT by Proud_USA_Republican
[ Post Reply | Private Reply | To 5 | View Replies]

To: TigerLikesRooster

If other institutions or individuals have been using an exact copy of Goldman Sachs’ system in concert it’s got to be diluting the effectiveness of the program, depending on how much money is at play. Also there should be a pretty clear trading trail back to whoever might be using it. The Russian mafia is supposed to have a big brain trust they recruited after the Soviet collapse.


11 posted on 07/06/2009 1:44:37 AM PDT by Brad from Tennessee (A politician can't give you anything he hasn't first stolen from you.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Brad from Tennessee

It’s also possible that, if GS withdraws the very heavy degree of machine trading they’ve been doing...the market collapses. Just thought I’d throw that cheerful thought in.

http://www.cme.com


12 posted on 07/06/2009 2:10:37 AM PDT by Attention Surplus Disorder (What kind of organization answers the phone if you call a suicide hotline in Gaza City?)
[ Post Reply | Private Reply | To 11 | View Replies]

To: TigerLikesRooster

I’m surprised. I always thought the Goldman Sachs success was because of their connections within the government financial circles and the millions in bonuses that they pass out each year.


13 posted on 07/06/2009 2:44:55 AM PDT by FreePaul
[ Post Reply | Private Reply | To 1 | View Replies]

To: FreePaul; TigerLikesRooster
I always thought GoldmanSachs were the Knights Templar/Illuminati/trans-dimensional ascended masters from Roswell.../sarc>

Cheers!

14 posted on 07/06/2009 3:24:45 AM PDT by grey_whiskers (The opinions are solely those of the author and are subject to change without notice.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: TigerLikesRooster

Goldman will have a tough time now propping up the fake “green shoots” rally, with their “special sauce” gone.


15 posted on 07/06/2009 4:05:03 AM PDT by jsh3180
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerLikesRooster

Good. I hope the guy has the code and posts it all over the net.


16 posted on 07/06/2009 4:11:30 AM PDT by ovrtaxt (Truly Constitutional money isn't just backed by gold and silver- it IS gold and silver.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerLikesRooster

What is SLP?

Who is GETco?


17 posted on 07/06/2009 4:17:20 AM PDT by bert (K.E. N.P. +12 . The boy's war in Detriot has already cost more then the war in Iraq.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: ovrtaxt
Why is that S#$& for brains? You have some problem with people who engage in perfectly legal trading practices or do you just not like "The Jews" at Goldman Sachs?

The world would be a much better place if all you people who don't know what your talking about would just shut your pie-holes for a change.

I'm betting that even if he did post the code on the internet you wouldn't be able to make heads or tails of it anyway. But maybe while he's at it he can post the recipe for Coke, and the McDonald's secret sauce.

18 posted on 07/06/2009 4:48:46 AM PDT by tcostell (MOLON LABE - http://freenj.blogspot.com - RadioFree NJ)
[ Post Reply | Private Reply | To 16 | View Replies]

To: TigerLikesRooster

Hasn’t that software been nothing but a loss-generator lately? Who wants it?


19 posted on 07/06/2009 4:57:54 AM PDT by 2harddrive (then)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerLikesRooster

ping for later reading.

I have to wonder about the Russian mob connection and how far they are dug in to our financial processes. Madoff, GS, I hope someone is connecting the dots. (not that I would count on the feckless SEC to do anything)


20 posted on 07/06/2009 5:01:51 AM PDT by SueRae
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson