US20140101029A1 - Method and apparatus for detecting fraudulent loans - Google Patents
Method and apparatus for detecting fraudulent loans Download PDFInfo
- Publication number
- US20140101029A1 US20140101029A1 US14/099,632 US201314099632A US2014101029A1 US 20140101029 A1 US20140101029 A1 US 20140101029A1 US 201314099632 A US201314099632 A US 201314099632A US 2014101029 A1 US2014101029 A1 US 2014101029A1
- Authority
- US
- United States
- Prior art keywords
- loan
- lender
- data
- applications
- loan applications
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G06Q40/025—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Definitions
- the present invention generally relates to a method and system for detecting fraud. More specifically, the present invention relates to a method and apparatus for detecting fraudulent activity by preventing the rapid funding of multiple loans on the same property.
- the present invention attempts to remedy the problems discussed above, amongst others, related to fraudulent activities which occur during mortgage transactions between consumers and various lenders.
- the present invention provides a novel system and method which is able to detect and prevent fraudulent activity by consumers attempting to obtain two or more fraudulent loans on the same property.
- the present invention further provides a novel system and method wherein lenders are able to identify areas of strengths and areas of weaknesses with respect to mortgage application completion time.
- the present invention further provides a novel system and method wherein a third party can proactively monitor deals that hit various alert stages and can directly call lenders to suggest further investigation and/or alert them of any suspicious activity.
- FIG. 1 is a printout of an exemplary report of the present invention.
- FIG. 2 is diagram of an exemplary embodiment of the Prism Database system.
- FIG. 3 is another diagram of an exemplary embodiment of the Prism Database system.
- FIG. 4 is an exemplary report produced by the Prism Database system diagramming various actions taken by the company and industry in the application process.
- FIG. 5 is another exemplary report produced by the Prism Database system diagramming various actions taken by the company and industry in the application process.
- FIG. 6 shows one the flow charts of an exemplary embodiment of the present invention.
- the present invention provides a method and system for detecting and preventing fraudulent activity by preventing the funding of multiple loans on the same property/same address.
- the present invention generally relates to a method and apparatus for collecting information from mortgage applications to determine whether there has been more then one application submitted for the same property to obtain a loan or collateral on that property.
- the preferred embodiments of the present invention may include a method and system for collecting information from approved mortgage applications to determine whether there has been more than one application submitted for loan or collateral to a lender.
- approved application is a commonly used term in the industry which describe an application where the lender has agreed to fund the applicant with no conditions, that there are similar uses for these terms. For example, there are many instances where lenders still use this term when there are certain conditions, pending a search to determine whether there are any liens on the property.
- the present invention can be used to describe various types of loan applications, even though in the preferred embodiment “approved” applications are being used.
- the application also uses the term property to describe a piece of land and/or building (e.g., house) located on that land. It should be appreciated that this property may be identified by numerous ways including, but not limited to, property address, parcel number, map coordinates, lot numbers or other similar identifiers as known to one skilled in the art.
- the present invention collects on a cooperative basis desired mortgage application data from one or more lenders about each of their potential borrowers.
- the only loans submitted to the main database, a.k.a. PRISM database are those loans that have received preliminary credit approval from the lender.
- the type of application data that can be collected may include, but is not limited to: (1) Loan Number; (2) Loan Status (Doc.
- the present invention is a fraud detection system comprising a module including a main database, e.g., a server, which may internally include a software program which is able to extract various data from the application submitted by the various lenders, and furthermore, the module is able to compare the data and provide the desired information for each lender.
- the general information provided by the module includes alerting the lenders whether an applicant has more than one application on the same property which has been approved by two or more lenders.
- other information can be obtained as discussed below with reference to FIGS. 4 and 5 .
- the software program may be placed on another server/database in an alternative embodiment.
- FIG. 1 illustrates a sample Prism Match Report which is a report generated by the present invention.
- the section entitled “Multiple Application Pending” shows a situation where there are two mortgage loan applications pending, loan application #05-7615 and loan application #11-8119.
- the first two digits of the loan number can, for example, indicate the lender number. Therefore, loan application #05-7615 originated from lender #05 and loan application #11-8119 originated from lender #11.
- loan application #05-7615 was submitted on Aug. 15, 2006 and loan application #11-8119 was submitted on Aug. 20, 2006. Both loans had their status updated on Aug. 28, 2006. The reason these two mortgage loan applications were flagged was because there were some matches in the loan application profiles.
- loan application #05-9111 and loan application #15-7115 could possibly have some problems.
- loan applications target the same property address 3901 Mineola Way, 33579, and both have the same borrower name.
- loan application #15-7115 is much further in the process than loan application #05-911I. Therefore, the action required field indicates that lender #05, the originator of loan application #05-9111, should check with lender #15, the originator of loan application #15-7115, on the status of loan application #15-7115, before lender #05 sends out any loan documents for signature for loan application #05-9111.
- loan application #05-6515 and loan application #09-3517 have some severe problems.
- both mortgage loan applications target the same property address 15 Orion, 92506 and both have the same borrower name.
- fraud there is a strong possibility that fraud is being committed because while loan application #05-6515 has received signed documents, loan application 409-3517 is already being funded.
- the action required field indicates that lender #05 should stop loan application #05-6515 and contact lender #09 to notify lender #09 that the borrower is attempting to secure two loans on the same property.
- FIG. 2 shows a block diagram of the main database system 5 .
- a main database 5 a.k.a. PRISM database, contains information collected from participating mortgage lenders about every loan applicant for each participating mortgage lender.
- the main database 5 can be accessed by an underwriter 20 from a lender 15 via a loan pipeline 10 .
- the main database 5 can also generate an e-mail alert 25 that is sent to the underwriter 20 in situations where there is important information about a mortgage loan application such as the creation of another mortgage loan application through another lender which is secured on the same property.
- the underwriter 20 can have access to a fraud hotline 35 via a communication device, e.g. phone 30 , computer, etc., in case the underwriter 20 has questions regarding how to work with other lenders to stop fraud.
- a third party may search the main database 5 for potential fraud without disclosure to the originators.
- the third party can proactively monitor deals that hit alert stages and can directly call lenders to suggest further investigation and/or alert them of any suspicious activity.
- the reports can also be generated and/or accessed in real time.
- an individual lender user 50 can send real-time submissions 45 to the main database 5 which contains information collected from loan applications. This information is then available to other underwriters 20 and lenders 15 .
- the individual lender user 50 can receive reports 40 from the main database 5 in real time. These reports can include, for example, an analysis of a mortgage loan application that the individual lender user 50 has submitted to the main database 5 . These reports can also include, for example, other mortgage loan applications, which the individual lender user 50 wishes to review. Reports can also be generated on the overall status or status of certain operations of lending institutions. These reports can then, for example, be analyzed on their own, or in context with other reports from the same lending institution or other lending institutions.
- the present invention can compile a chart based on mortgage application data collected. This can be useful, for example, to disclose the percentage of applications that are duplicates or in other words have applications which are filed with other lending institutions that target the same property for collateralization.
- the report for example, there can be a benchmark value disclosing the average value of the industry for comparison. This is indicated as “benchmark value” on the chart in FIG. 4 .
- a report for example, on the percent of duplicated applications for each step of the application process can be shown.
- the benchmark has 2.5% of their approved applications as duplicates whereas, the particular lender has a 3% duplicate application rate.
- the lender in the example funds about 0.8% of their loans on the same property as other lenders.
- the industry norm is about 0.2%. This is a huge and financially damaging problem that the lender must fix and this report shows that our lender is being adversely selected by some force in the market. This report will alert management of each lending institution to the problem.
- the data can be used to analyze the lending institution's own efficiency as compared with an industry benchmark.
- the time required for applications in lending institution to complete each phase is listed in the column entitled “Your Value (elapsed days)” while the time required for applications in the industry to complete each phase is listed in the column entitled “Benchmark Value.” The difference between the two times is listed in the column entitled “Difference.”
- the “Pending—Out-for-document signature applications took 10 days to be completed while the industry took 12-days.
- the lending institution was actually faster by 2 days.
- “Pending—Docs received” applications the lending institution took 12-days to complete while the industry took 15-days.
- the lending institution was actually faster by 3 days. Therefore, this can be an area to target for policies and procedures to speed up the application completion time.
- the lending institution can now identify which areas are its strengths and which areas are its weaknesses with respect to application completion time.
- FIG. 6 shows one the flow charts of an exemplary embodiment of the present invention.
- the system collects applications from the various users, e.g., lenders.
- the system analyzes the applications to detect whether 2 or more of the applications have similar data, e.g., same property address. If the system does not find 2 or more data that are similar on any of the applications, the system stops its analysis at step 620 .
- the system checks to see if all of the application statuses are “approved.” If the system determines that all of the applications which have similar data have an approved status, then at step 630 , the system sends a “watch” alert to one or more of the users indicating that there are other pending approved applications. If the system determines that of the application which have similar data do not have an approved status, then at step 640 , the system sends a “Fraud Alert” to each user communicating that there is potential fraudulent activity going on.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Marketing (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The present invention relates to a method and apparatus for detecting fraudulent activity by preventing the rapid funding of multiple loans on the same property, by providing a collective database where real estate property information is examined and the apparatus detects whether at least two mortgage applications are using the same property as collateral.
Description
- This application is a Continuation of and claims the benefit of priority under 35 U.S.C. §120 to U.S. application Ser. No. 11/623,020, filed on Jan. 12, 2007, which is a non-provisional of and claims the benefit of the earlier filing date of Provisional Application No. 60/870,042, filed on Dec. 14, 2006, the entire contents of each of which are expressly incorporated by reference herein.
- The present invention generally relates to a method and system for detecting fraud. More specifically, the present invention relates to a method and apparatus for detecting fraudulent activity by preventing the rapid funding of multiple loans on the same property.
- FBI statistics indicate that mortgage fraud is on the rise. In some cases, consumers seek to defraud mortgage lenders for personal profit. To this end, borrowers seeking to defraud lenders have become increasingly sophisticated. A large national bank reported millions of dollars in losses when consumers apply for multiple loans with multiple lenders, on the same property. For example, suppose an individual applies for and is approved for an equity loan at 123 Jones Street in Fresno, Calif. Not only has the borrower been approved by lender A, but he was also approved by lender B, lender C, and lender D for an equity loan on the same property. Thus far, there is no problem. Consumers have a freedom of choice to apply for a loan wherever they desire. The problem comes when the approved loan is not in a second lien position as stated as a condition for approval in the application. Having secured and funded an equity loan with lender A, fraud occurs when the borrower also secures incremental loans with lenders B, C, and/or D. Equity loans typically involve minimum advances (you take cash from the signing table) and immediate access to cash via checking accounts or debit cards. The unscrupulous borrower can take the funds and run from lenders A, B, C, and/or D. The losses at lender A may be covered by the equity in the home, however, the losses at lenders B, C, and/or D are complete and non-recoverable since the property has been stripped of any owners' equity.
- The present invention attempts to remedy the problems discussed above, amongst others, related to fraudulent activities which occur during mortgage transactions between consumers and various lenders.
- The present invention provides a novel system and method which is able to detect and prevent fraudulent activity by consumers attempting to obtain two or more fraudulent loans on the same property.
- The present invention further provides a novel system and method wherein lenders are able to identify areas of strengths and areas of weaknesses with respect to mortgage application completion time.
- The present invention further provides a novel system and method wherein a third party can proactively monitor deals that hit various alert stages and can directly call lenders to suggest further investigation and/or alert them of any suspicious activity.
- The above, as well as other advantages of the present invention, will become readily apparent to those skilled in the art from the following detailed description of the preferred embodiments when considered in the light of the accompanying drawing in which:
-
FIG. 1 is a printout of an exemplary report of the present invention. -
FIG. 2 is diagram of an exemplary embodiment of the Prism Database system. -
FIG. 3 is another diagram of an exemplary embodiment of the Prism Database system. -
FIG. 4 is an exemplary report produced by the Prism Database system diagramming various actions taken by the company and industry in the application process. -
FIG. 5 is another exemplary report produced by the Prism Database system diagramming various actions taken by the company and industry in the application process. -
FIG. 6 shows one the flow charts of an exemplary embodiment of the present invention. - The present invention provides a method and system for detecting and preventing fraudulent activity by preventing the funding of multiple loans on the same property/same address.
- The present invention generally relates to a method and apparatus for collecting information from mortgage applications to determine whether there has been more then one application submitted for the same property to obtain a loan or collateral on that property. However, the preferred embodiments of the present invention may include a method and system for collecting information from approved mortgage applications to determine whether there has been more than one application submitted for loan or collateral to a lender. It should be appreciated that even though the term “approved application” is a commonly used term in the industry which describe an application where the lender has agreed to fund the applicant with no conditions, that there are similar uses for these terms. For example, there are many instances where lenders still use this term when there are certain conditions, pending a search to determine whether there are any liens on the property. The present invention can be used to describe various types of loan applications, even though in the preferred embodiment “approved” applications are being used.
- The application also uses the term property to describe a piece of land and/or building (e.g., house) located on that land. It should be appreciated that this property may be identified by numerous ways including, but not limited to, property address, parcel number, map coordinates, lot numbers or other similar identifiers as known to one skilled in the art.
- The present invention collects on a cooperative basis desired mortgage application data from one or more lenders about each of their potential borrowers. In one exemplary embodiment, the only loans submitted to the main database, a.k.a. PRISM database, are those loans that have received preliminary credit approval from the lender. For example, the type of application data that can be collected may include, but is not limited to: (1) Loan Number; (2) Loan Status (Doc. Prep., Closed, Funded, etc.); (3) Loan Status Date; (4) Subject Property Address; (5) Subject Property State; (6) Subject Property Zip; (7) Borrower First Name; (8) Borrower Last Name; (9) Loan Amount; (10) Sale Amount; (11) Appraised Amount; (12) Channel; (13) Loan Purpose (Purchase, Cash Out Refi., Rate/Term Refi., HELOC); and/or (14) Loan Product.
- The present invention is a fraud detection system comprising a module including a main database, e.g., a server, which may internally include a software program which is able to extract various data from the application submitted by the various lenders, and furthermore, the module is able to compare the data and provide the desired information for each lender. As previously discussed, the general information provided by the module includes alerting the lenders whether an applicant has more than one application on the same property which has been approved by two or more lenders. Moreover, other information can be obtained as discussed below with reference to
FIGS. 4 and 5 . It should be appreciated that the software program may be placed on another server/database in an alternative embodiment. -
FIG. 1 illustrates a sample Prism Match Report which is a report generated by the present invention. The section entitled “Multiple Application Pending” shows a situation where there are two mortgage loan applications pending, loan application #05-7615 and loan application #11-8119. The first two digits of the loan number can, for example, indicate the lender number. Therefore, loan application #05-7615 originated from lender #05 and loan application #11-8119 originated from lender #11. Loan application #05-7615 was submitted on Aug. 15, 2006 and loan application #11-8119 was submitted on Aug. 20, 2006. Both loans had their status updated on Aug. 28, 2006. The reason these two mortgage loan applications were flagged was because there were some matches in the loan application profiles. For example, both loan applications target thesame property address 39 Greylock Ridge, 14534, and both have the same borrower name. However, the “Action Required” field indicates that there is no immediate action required. The present invention, however still considers this a “watch” situation for both lenders since this is a “potential” fraud situation in the making. Accordingly, the system reports that loan number 11-8119 should be put on “watch” status as indicated in the report inFIG. 1 . Furthermore, it should be appreciated that the report could be configured to indicate a “watch” status for both the lenders, depending on the desires of the users, e.g., lenders. [0211 In the second section entitledPossible Fraud Scenario 1, loan application #05-9111 and loan application #15-7115 could possibly have some problems. For example, both loan applications target thesame property address 3901 Mineola Way, 33579, and both have the same borrower name. Unlike the previous situation, there could be some problems in this situation because while loan application #05-9111 was approved, loan application #15-7115 is already waiting for loan documents that were sent out, to come back signed. Thus, loan application #15-7115 is much further in the process than loan application #05-911I. Therefore, the action required field indicates that lender #05, the originator of loan application #05-9111, should check withlender # 15, the originator of loan application #15-7115, on the status of loan application #15-7115, before lender #05 sends out any loan documents for signature for loan application #05-9111. - In the third section entitled
Possible Fraud Scenario 2, loan application #05-6515 and loan application #09-3517 have some severe problems. For example, both mortgage loan applications target thesame property address 15 Orion, 92506 and both have the same borrower name. Here, there is a strong possibility that fraud is being committed because while loan application #05-6515 has received signed documents, loan application 409-3517 is already being funded. Thus, the action required field indicates that lender #05 should stop loan application #05-6515 and contact lender #09 to notify lender #09 that the borrower is attempting to secure two loans on the same property. -
FIG. 2 shows a block diagram of themain database system 5. Amain database 5, a.k.a. PRISM database, contains information collected from participating mortgage lenders about every loan applicant for each participating mortgage lender. Themain database 5 can be accessed by anunderwriter 20 from alender 15 via aloan pipeline 10. Themain database 5 can also generate ane-mail alert 25 that is sent to theunderwriter 20 in situations where there is important information about a mortgage loan application such as the creation of another mortgage loan application through another lender which is secured on the same property. In the exemplary embodiment shown inFIG. 2 , theunderwriter 20 can have access to afraud hotline 35 via a communication device,e.g. phone 30, computer, etc., in case theunderwriter 20 has questions regarding how to work with other lenders to stop fraud. - In one exemplary embodiment, a third party (e.g., offshore telephonic clearing house) may search the
main database 5 for potential fraud without disclosure to the originators. The third party can proactively monitor deals that hit alert stages and can directly call lenders to suggest further investigation and/or alert them of any suspicious activity. - As shown in
FIG. 3 , the reports can also be generated and/or accessed in real time. In that situation, anindividual lender user 50 can send real-time submissions 45 to themain database 5 which contains information collected from loan applications. This information is then available toother underwriters 20 andlenders 15. In addition, theindividual lender user 50 can receivereports 40 from themain database 5 in real time. These reports can include, for example, an analysis of a mortgage loan application that theindividual lender user 50 has submitted to themain database 5. These reports can also include, for example, other mortgage loan applications, which theindividual lender user 50 wishes to review. Reports can also be generated on the overall status or status of certain operations of lending institutions. These reports can then, for example, be analyzed on their own, or in context with other reports from the same lending institution or other lending institutions. - For example, in
FIG. 4 , the present invention can compile a chart based on mortgage application data collected. This can be useful, for example, to disclose the percentage of applications that are duplicates or in other words have applications which are filed with other lending institutions that target the same property for collateralization. In the report, for example, there can be a benchmark value disclosing the average value of the industry for comparison. This is indicated as “benchmark value” on the chart inFIG. 4 . There can also be a value disclosing the user's value. This is indicated as “your value” on the chart inFIG. 4 . Thus, a report, for example, on the percent of duplicated applications for each step of the application process can be shown. For example, the benchmark has 2.5% of their approved applications as duplicates whereas, the particular lender has a 3% duplicate application rate. This means that the subject lender may have inefficiencies since they are the “beneficiary” of more duplicate applications than would be expected based upon industry norms. Funding loans on the same property is a much more onerous problem. In this example, it should be noted that the lender in the example funds about 0.8% of their loans on the same property as other lenders. The industry norm is about 0.2%. This is a huge and financially damaging problem that the lender must fix and this report shows that our lender is being adversely selected by some force in the market. This report will alert management of each lending institution to the problem. - Furthermore, the data can be used to analyze the lending institution's own efficiency as compared with an industry benchmark. As can be seen in
FIG. 5 , the time required for applications in lending institution to complete each phase is listed in the column entitled “Your Value (elapsed days)” while the time required for applications in the industry to complete each phase is listed in the column entitled “Benchmark Value.” The difference between the two times is listed in the column entitled “Difference.” Thus, for the lending institution, the “Pending—Out-for-document signature applications took 10 days to be completed while the industry took 12-days. Thus, the lending institution was actually faster by 2 days. However, for “Pending—Docs received” applications, the lending institution took 12-days to complete while the industry took 15-days. Thus, the lending institution was actually faster by 3 days. Therefore, this can be an area to target for policies and procedures to speed up the application completion time. Thus, the lending institution can now identify which areas are its strengths and which areas are its weaknesses with respect to application completion time. -
FIG. 6 shows one the flow charts of an exemplary embodiment of the present invention. As shown instep 600, the system collects applications from the various users, e.g., lenders. Atstep 610, the system analyzes the applications to detect whether 2 or more of the applications have similar data, e.g., same property address. If the system does not find 2 or more data that are similar on any of the applications, the system stops its analysis atstep 620. If the system does find two or more applications which have similar data, then in thenext step 630, the system checks to see if all of the application statuses are “approved.” If the system determines that all of the applications which have similar data have an approved status, then atstep 630, the system sends a “watch” alert to one or more of the users indicating that there are other pending approved applications. If the system determines that of the application which have similar data do not have an approved status, then atstep 640, the system sends a “Fraud Alert” to each user communicating that there is potential fraudulent activity going on. - It is also to be understood that the following claims are intended to cover all of the generic and specific features of the invention herein described, and all statement of the scope of the present invention which, as a matter of language, might be said to fall therebetween.
Claims (19)
1. A system comprising:
physical data storage configured to store loan applications data; and
a computer system in communication with the physical data storage, the computer system comprising computer hardware, the computer system programmed to:
receive data from a plurality of loan applications associated with real estate properties, wherein the plurality of loan applications data are associated with a plurality of lenders;
store the loan applications data in the physical data storage;
electronically extract, from the loan applications data, subject property information associated with the plurality of loan applications;
compare the extracted subject property information to identify any loan applications from the plurality of loan applications that are using the same subject property as collateral;
electronically extract, from the loan applications data, loan status information associated with the identified loan applications that are using the same subject property as collateral;
analyze the extracted loan status information to determine if the identified loan applications are currently pending and have an approved status; and
generate an alert if the identified loan applications are currently pending and have an approved status.
2. The system of claim 1 , wherein the alert comprises an email alert.
3. The system of claim 1 , wherein the computer system is further programmed to provide an interface to the plurality of lenders to access the loan applications data stored in the physical data storage.
4. The system of claim 1 , wherein the computer system is further programmed to provide an interface to an entity to search the loan applications data stored in the physical data storage.
5. The system of claim 1 , wherein the loan application data is selected from a group consisting of a borrower name, an address of a subject property that a borrower seeks to finance, a loan amount, a loan purpose, whether the subject property is owner occupied, the subject property value, a loan status with any status change date and time stamped, and loan-to-value estimates.
6. The system of claim 5 , wherein the loan purpose is selected from a group consisting of purchase, refinance, cash out, and home equity line of credit.
7. A system comprising:
physical data storage configured to store loan applications data; and
a computer system in communication with the physical data storage, the computer system comprising computer hardware, the computer system programmed to:
receive data from a plurality of loan applications associated with real estate properties;
store the loan applications data in the physical data storage;
identify any loan applications from the plurality of loan applications that are associated with a target lender by analyzing the loan applications data;
determine a time for the target lender to complete one or more phases in processing a loan application by analyzing the identified loan applications;
determine one or more efficiency ratings for the target lender based at least in part on the determined time for the target lender to complete one or more phases in processing a loan application; and
store the determined one or more efficiency ratings in the physical data storage.
8. The system of claim 7 , wherein the one or more efficiency ratings are determined by comparing the target lender to an industry benchmark.
9. The system of claim 7 , wherein the one or more phases comprise a funding phase.
10. The system of claim 7 , wherein the one or more phases comprise approval of a loan application phase.
11. The system of claim 7 , wherein the loan applications data is further analyzed to determine one or more financial risk ratings for the target lender.
12. The system of claim 11 , wherein the one or more financial risk ratings relate to a number of duplicate applications for the same property received by the target lender.
13. The system of claim 11 , wherein the one or more financial risk ratings are determined by comparing the target lender to an industry benchmark.
14. A non-transitory computer readable storage medium comprising instructions which, when executed by a computer system that includes a data processor and is connected to at least one data repository, perform a method comprising:
(a) receiving, by the computer system through a network communication channel, data from a plurality of loan applications associated with real estate properties;
(b) analyzing, by the data processor of the computer system, the loan applications data to determine one or more efficiency ratings for a lender associated with the loan applications data, wherein the one or more efficiency ratings relate to a time for the lender to complete one or more phases in processing a loan application; and
(c) storing, by the data processor of the computer system, the determined one or more efficiency ratings in the at least one data repository.
15. The non-transitory computer readable storage medium of claim 14 , wherein the one or more efficiency ratings are determined by comparing the lender to an industry benchmark.
16. The non-transitory computer readable storage medium of claim 14 , wherein the one or more phases comprise a funding phase.
17. The non-transitory computer readable storage medium of claim 14 , wherein the loan applications data is further analyzed to determine one or more financial risk ratings for the lender.
18. The non-transitory computer readable storage medium of claim 17 , wherein the one or more financial risk ratings relate to a number of duplicate applications for the same property received by the lender.
19. The non-transitory computer readable storage medium of claim 17 , wherein the one or more financial risk ratings are determined by comparing the lender to an industry benchmark.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/099,632 US20140101029A1 (en) | 2006-12-14 | 2013-12-06 | Method and apparatus for detecting fraudulent loans |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US87004206P | 2006-12-14 | 2006-12-14 | |
US11/623,020 US8612320B2 (en) | 2006-12-14 | 2007-01-12 | Method and apparatus for detecting fraudulent loans |
US14/099,632 US20140101029A1 (en) | 2006-12-14 | 2013-12-06 | Method and apparatus for detecting fraudulent loans |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/623,020 Continuation US8612320B2 (en) | 2006-12-14 | 2007-01-12 | Method and apparatus for detecting fraudulent loans |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140101029A1 true US20140101029A1 (en) | 2014-04-10 |
Family
ID=39528649
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/623,020 Active 2029-01-25 US8612320B2 (en) | 2006-12-14 | 2007-01-12 | Method and apparatus for detecting fraudulent loans |
US14/099,632 Abandoned US20140101029A1 (en) | 2006-12-14 | 2013-12-06 | Method and apparatus for detecting fraudulent loans |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/623,020 Active 2029-01-25 US8612320B2 (en) | 2006-12-14 | 2007-01-12 | Method and apparatus for detecting fraudulent loans |
Country Status (2)
Country | Link |
---|---|
US (2) | US8612320B2 (en) |
AU (2) | AU2007242962B2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019169000A1 (en) * | 2018-02-27 | 2019-09-06 | Trans Union Llc | Fraud prevention exchange system and method |
CN110458694A (en) * | 2019-08-12 | 2019-11-15 | 浙江大搜车软件技术有限公司 | Credit risk analysis method, device, computer equipment and readable storage medium storing program for executing |
Families Citing this family (90)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8732004B1 (en) | 2004-09-22 | 2014-05-20 | Experian Information Solutions, Inc. | Automated analysis of data to generate prospect notifications based on trigger events |
US20080033852A1 (en) * | 2005-10-24 | 2008-02-07 | Megdal Myles G | Computer-based modeling of spending behaviors of entities |
US7711636B2 (en) * | 2006-03-10 | 2010-05-04 | Experian Information Solutions, Inc. | Systems and methods for analyzing data |
US7587348B2 (en) * | 2006-03-24 | 2009-09-08 | Basepoint Analytics Llc | System and method of detecting mortgage related fraud |
US8036979B1 (en) | 2006-10-05 | 2011-10-11 | Experian Information Solutions, Inc. | System and method for generating a finance attribute from tradeline data |
US7657569B1 (en) | 2006-11-28 | 2010-02-02 | Lower My Bills, Inc. | System and method of removing duplicate leads |
US7778885B1 (en) | 2006-12-04 | 2010-08-17 | Lower My Bills, Inc. | System and method of enhancing leads |
US8606626B1 (en) | 2007-01-31 | 2013-12-10 | Experian Information Solutions, Inc. | Systems and methods for providing a direct marketing campaign planning environment |
US8606666B1 (en) | 2007-01-31 | 2013-12-10 | Experian Information Solutions, Inc. | System and method for providing an aggregation tool |
NZ580997A (en) * | 2007-04-27 | 2011-08-26 | Echo Therapeutics Inc | Dermal abrasion device with feedback electrode to deliver data on skin thickness and removable abrasion heads |
WO2008147918A2 (en) | 2007-05-25 | 2008-12-04 | Experian Information Solutions, Inc. | System and method for automated detection of never-pay data sets |
US9690820B1 (en) | 2007-09-27 | 2017-06-27 | Experian Information Solutions, Inc. | Database system for triggering event notifications based on updates to database records |
US7546271B1 (en) | 2007-12-20 | 2009-06-09 | Choicepoint Asset Company | Mortgage fraud detection systems and methods |
US8346225B2 (en) | 2009-01-28 | 2013-01-01 | Headwater Partners I, Llc | Quality of service for device assisted services |
US8391834B2 (en) | 2009-01-28 | 2013-03-05 | Headwater Partners I Llc | Security techniques for device assisted services |
US8924469B2 (en) | 2008-06-05 | 2014-12-30 | Headwater Partners I Llc | Enterprise access control and accounting allocation for access networks |
US8340634B2 (en) | 2009-01-28 | 2012-12-25 | Headwater Partners I, Llc | Enhanced roaming services and converged carrier networks with device assisted services and a proxy |
US8275830B2 (en) | 2009-01-28 | 2012-09-25 | Headwater Partners I Llc | Device assisted CDR creation, aggregation, mediation and billing |
US8635335B2 (en) | 2009-01-28 | 2014-01-21 | Headwater Partners I Llc | System and method for wireless network offloading |
US8406748B2 (en) | 2009-01-28 | 2013-03-26 | Headwater Partners I Llc | Adaptive ambient services |
US8548428B2 (en) | 2009-01-28 | 2013-10-01 | Headwater Partners I Llc | Device group partitions and settlement platform |
US8626115B2 (en) | 2009-01-28 | 2014-01-07 | Headwater Partners I Llc | Wireless network service interfaces |
US8402111B2 (en) | 2009-01-28 | 2013-03-19 | Headwater Partners I, Llc | Device assisted services install |
US8832777B2 (en) | 2009-03-02 | 2014-09-09 | Headwater Partners I Llc | Adapting network policies based on device service processor configuration |
US8924543B2 (en) | 2009-01-28 | 2014-12-30 | Headwater Partners I Llc | Service design center for device assisted services |
US8725123B2 (en) | 2008-06-05 | 2014-05-13 | Headwater Partners I Llc | Communications device with secure data path processing agents |
US8229812B2 (en) | 2009-01-28 | 2012-07-24 | Headwater Partners I, Llc | Open transaction central billing system |
US8589541B2 (en) | 2009-01-28 | 2013-11-19 | Headwater Partners I Llc | Device-assisted services for protecting network capacity |
US8898293B2 (en) | 2009-01-28 | 2014-11-25 | Headwater Partners I Llc | Service offer set publishing to device agent with on-device service selection |
US10373198B1 (en) | 2008-06-13 | 2019-08-06 | Lmb Mortgage Services, Inc. | System and method of generating existing customer leads |
US10841839B2 (en) | 2009-01-28 | 2020-11-17 | Headwater Research Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US9565707B2 (en) | 2009-01-28 | 2017-02-07 | Headwater Partners I Llc | Wireless end-user device with wireless data attribution to multiple personas |
US9647918B2 (en) | 2009-01-28 | 2017-05-09 | Headwater Research Llc | Mobile device and method attributing media services network usage to requesting application |
US11973804B2 (en) | 2009-01-28 | 2024-04-30 | Headwater Research Llc | Network service plan design |
US10492102B2 (en) | 2009-01-28 | 2019-11-26 | Headwater Research Llc | Intermediate networking devices |
US8351898B2 (en) | 2009-01-28 | 2013-01-08 | Headwater Partners I Llc | Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account |
US10264138B2 (en) | 2009-01-28 | 2019-04-16 | Headwater Research Llc | Mobile device and service management |
US9253663B2 (en) | 2009-01-28 | 2016-02-02 | Headwater Partners I Llc | Controlling mobile device communications on a roaming network based on device state |
US9578182B2 (en) | 2009-01-28 | 2017-02-21 | Headwater Partners I Llc | Mobile device and service management |
US12166596B2 (en) | 2009-01-28 | 2024-12-10 | Disney Enterprises, Inc. | Device-assisted services for protecting network capacity |
US10783581B2 (en) | 2009-01-28 | 2020-09-22 | Headwater Research Llc | Wireless end-user device providing ambient or sponsored services |
US8893009B2 (en) | 2009-01-28 | 2014-11-18 | Headwater Partners I Llc | End user device that secures an association of application to service policy with an application certificate check |
US9270559B2 (en) | 2009-01-28 | 2016-02-23 | Headwater Partners I Llc | Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow |
US8606911B2 (en) | 2009-03-02 | 2013-12-10 | Headwater Partners I Llc | Flow tagging for service policy implementation |
US9706061B2 (en) | 2009-01-28 | 2017-07-11 | Headwater Partners I Llc | Service design center for device assisted services |
US10200541B2 (en) | 2009-01-28 | 2019-02-05 | Headwater Research Llc | Wireless end-user device with divided user space/kernel space traffic policy system |
US9392462B2 (en) | 2009-01-28 | 2016-07-12 | Headwater Partners I Llc | Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy |
US10064055B2 (en) | 2009-01-28 | 2018-08-28 | Headwater Research Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US8793758B2 (en) | 2009-01-28 | 2014-07-29 | Headwater Partners I Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US10715342B2 (en) | 2009-01-28 | 2020-07-14 | Headwater Research Llc | Managing service user discovery and service launch object placement on a device |
US10326800B2 (en) | 2009-01-28 | 2019-06-18 | Headwater Research Llc | Wireless network service interfaces |
US9557889B2 (en) | 2009-01-28 | 2017-01-31 | Headwater Partners I Llc | Service plan design, user interfaces, application programming interfaces, and device management |
US10248996B2 (en) | 2009-01-28 | 2019-04-02 | Headwater Research Llc | Method for operating a wireless end-user device mobile payment agent |
US10779177B2 (en) | 2009-01-28 | 2020-09-15 | Headwater Research Llc | Device group partitions and settlement platform |
US9572019B2 (en) | 2009-01-28 | 2017-02-14 | Headwater Partners LLC | Service selection set published to device agent with on-device service selection |
US11218854B2 (en) | 2009-01-28 | 2022-01-04 | Headwater Research Llc | Service plan design, user interfaces, application programming interfaces, and device management |
US9351193B2 (en) | 2009-01-28 | 2016-05-24 | Headwater Partners I Llc | Intermediate networking devices |
US10798252B2 (en) | 2009-01-28 | 2020-10-06 | Headwater Research Llc | System and method for providing user notifications |
US9955332B2 (en) | 2009-01-28 | 2018-04-24 | Headwater Research Llc | Method for child wireless device activation to subscriber account of a master wireless device |
US9755842B2 (en) | 2009-01-28 | 2017-09-05 | Headwater Research Llc | Managing service user discovery and service launch object placement on a device |
US9954975B2 (en) | 2009-01-28 | 2018-04-24 | Headwater Research Llc | Enhanced curfew and protection associated with a device group |
US9858559B2 (en) | 2009-01-28 | 2018-01-02 | Headwater Research Llc | Network service plan design |
US8745191B2 (en) | 2009-01-28 | 2014-06-03 | Headwater Partners I Llc | System and method for providing user notifications |
US10484858B2 (en) | 2009-01-28 | 2019-11-19 | Headwater Research Llc | Enhanced roaming services and converged carrier networks with device assisted services and a proxy |
US9980146B2 (en) | 2009-01-28 | 2018-05-22 | Headwater Research Llc | Communications device with secure data path processing agents |
US10237757B2 (en) | 2009-01-28 | 2019-03-19 | Headwater Research Llc | System and method for wireless network offloading |
US10057775B2 (en) | 2009-01-28 | 2018-08-21 | Headwater Research Llc | Virtualized policy and charging system |
US11985155B2 (en) | 2009-01-28 | 2024-05-14 | Headwater Research Llc | Communications device with secure data path processing agents |
US9652802B1 (en) | 2010-03-24 | 2017-05-16 | Consumerinfo.Com, Inc. | Indirect monitoring and reporting of a user's credit data |
US10453093B1 (en) | 2010-04-30 | 2019-10-22 | Lmb Mortgage Services, Inc. | System and method of optimizing matching of leads |
US8515863B1 (en) * | 2010-09-01 | 2013-08-20 | Federal Home Loan Mortgage Corporation | Systems and methods for measuring data quality over time |
AU2011299015A1 (en) * | 2010-09-09 | 2013-03-14 | Headwater Partners I Llc | Wireless network service interfaces |
EP2676197B1 (en) | 2011-02-18 | 2018-11-28 | CSidentity Corporation | System and methods for identifying compromised personally identifiable information on the internet |
US9154826B2 (en) | 2011-04-06 | 2015-10-06 | Headwater Partners Ii Llc | Distributing content and service launch objects to mobile devices |
US11030562B1 (en) | 2011-10-31 | 2021-06-08 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
US20140025548A1 (en) * | 2012-07-17 | 2014-01-23 | Corelogic Solutions, Llc | Automated anomaly detection for real estate transactions |
US10255598B1 (en) | 2012-12-06 | 2019-04-09 | Consumerinfo.Com, Inc. | Credit card account data extraction |
WO2014159862A1 (en) | 2013-03-14 | 2014-10-02 | Headwater Partners I Llc | Automated credential porting for mobile devices |
US8812387B1 (en) | 2013-03-14 | 2014-08-19 | Csidentity Corporation | System and method for identifying related credit inquiries |
US9633322B1 (en) | 2013-03-15 | 2017-04-25 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US10262362B1 (en) | 2014-02-14 | 2019-04-16 | Experian Information Solutions, Inc. | Automatic generation of code for attributes |
WO2016044486A1 (en) * | 2014-09-17 | 2016-03-24 | David Michonski | Method and system for automating the accountability of service professionals via consumer education and rating |
US10339527B1 (en) | 2014-10-31 | 2019-07-02 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
US10445152B1 (en) | 2014-12-19 | 2019-10-15 | Experian Information Solutions, Inc. | Systems and methods for dynamic report generation based on automatic modeling of complex data structures |
US11151468B1 (en) | 2015-07-02 | 2021-10-19 | Experian Information Solutions, Inc. | Behavior analysis using distributed representations of event data |
US10699028B1 (en) | 2017-09-28 | 2020-06-30 | Csidentity Corporation | Identity security architecture systems and methods |
US10896472B1 (en) | 2017-11-14 | 2021-01-19 | Csidentity Corporation | Security and identity verification system and architecture |
CN114616582A (en) * | 2019-09-26 | 2022-06-10 | 卢卡斯·雅各布·希利夫卡 | Distributed ledger loan system with intelligent contract framework and method thereof |
US11681966B2 (en) | 2021-02-24 | 2023-06-20 | Fannie Mae | Systems and methods for enhanced risk identification based on textual analysis |
US11094135B1 (en) | 2021-03-05 | 2021-08-17 | Flyreel, Inc. | Automated measurement of interior spaces through guided modeling of dimensions |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020133371A1 (en) * | 2001-01-24 | 2002-09-19 | Cole James A. | Automated mortgage fraud prevention method and system |
US20040064401A1 (en) * | 2002-09-27 | 2004-04-01 | Capital One Financial Corporation | Systems and methods for detecting fraudulent information |
US20060149674A1 (en) * | 2004-12-30 | 2006-07-06 | Mike Cook | System and method for identity-based fraud detection for transactions using a plurality of historical identity records |
US20070219819A1 (en) * | 2006-03-14 | 2007-09-20 | Title Insurance National Information Exchange Llc | Method and system for detecting title fraud |
US20070226129A1 (en) * | 2006-03-24 | 2007-09-27 | Yuansong Liao | System and method of detecting mortgage related fraud |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5797133A (en) * | 1994-08-31 | 1998-08-18 | Strategic Solutions Group, Inc | Method for automatically determining the approval status of a potential borrower |
US6324524B1 (en) * | 1998-11-03 | 2001-11-27 | Nextcard, Inc. | Method and apparatus for an account level offer of credit and real time balance transfer |
US20020156787A1 (en) | 2001-02-13 | 2002-10-24 | Jameson Daniel E. | Method and system for internet based event planning and event management |
US7707103B2 (en) * | 2004-03-15 | 2010-04-27 | Arthur J Prieston | System and method for rating lenders |
US20060224480A1 (en) * | 2005-03-29 | 2006-10-05 | Reserve Solutions, Inc. | Systems and methods for loan management with variable security arrangements |
US8046306B2 (en) | 2007-06-29 | 2011-10-25 | Zaio Corporation | System, method, and apparatus for property appraisals |
US20110258127A1 (en) | 2010-04-06 | 2011-10-20 | Corelogic Information Solutions, Inc. | Method, computer program product, device, and system for creating an electronic appraisal report and auditing system |
-
2007
- 2007-01-12 US US11/623,020 patent/US8612320B2/en active Active
- 2007-12-13 AU AU2007242962A patent/AU2007242962B2/en active Active
-
2012
- 2012-02-21 AU AU2012201001A patent/AU2012201001B8/en active Active
-
2013
- 2013-12-06 US US14/099,632 patent/US20140101029A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020133371A1 (en) * | 2001-01-24 | 2002-09-19 | Cole James A. | Automated mortgage fraud prevention method and system |
US20040064401A1 (en) * | 2002-09-27 | 2004-04-01 | Capital One Financial Corporation | Systems and methods for detecting fraudulent information |
US20060149674A1 (en) * | 2004-12-30 | 2006-07-06 | Mike Cook | System and method for identity-based fraud detection for transactions using a plurality of historical identity records |
US20070219819A1 (en) * | 2006-03-14 | 2007-09-20 | Title Insurance National Information Exchange Llc | Method and system for detecting title fraud |
US20070226129A1 (en) * | 2006-03-24 | 2007-09-27 | Yuansong Liao | System and method of detecting mortgage related fraud |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019169000A1 (en) * | 2018-02-27 | 2019-09-06 | Trans Union Llc | Fraud prevention exchange system and method |
US11354670B2 (en) * | 2018-02-27 | 2022-06-07 | Trans Union Llc | Fraud prevention exchange system and method |
CN110458694A (en) * | 2019-08-12 | 2019-11-15 | 浙江大搜车软件技术有限公司 | Credit risk analysis method, device, computer equipment and readable storage medium storing program for executing |
Also Published As
Publication number | Publication date |
---|---|
US20080147454A1 (en) | 2008-06-19 |
AU2012201001A1 (en) | 2012-03-08 |
US8612320B2 (en) | 2013-12-17 |
AU2012201001B2 (en) | 2014-08-07 |
AU2012201001B8 (en) | 2014-11-27 |
AU2007242962A1 (en) | 2008-07-03 |
AU2007242962B2 (en) | 2011-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8612320B2 (en) | Method and apparatus for detecting fraudulent loans | |
US8504456B2 (en) | Behavioral baseline scoring and risk scoring | |
US8271364B2 (en) | Method and apparatus for obtaining, organizing, and analyzing multi-source data | |
US7546271B1 (en) | Mortgage fraud detection systems and methods | |
US8468088B2 (en) | Automated mining and processing of data associated with real estate | |
US8429050B2 (en) | Method for detecting ineligibility of a beneficiary and system | |
CN110852878A (en) | Credibility determination method, device, equipment and storage medium | |
US20120209760A1 (en) | Risk identification system and judgmental review interface | |
Brown | A comparison of the handling of the financial crisis in the United States, the United Kingdom, and Australia | |
Bilan et al. | Banking and financial markets: How banks and financial technology are reshaping financial markets | |
US20140279386A1 (en) | Methods and system for mining and analyzing real estate information | |
US20130204757A1 (en) | Method for detecting ineligibility of a beneficiary and system | |
Postel‐Vinay | Debt dilution in 1920s America: lighting the fuse of a mortgage crisis | |
Brian Blank et al. | Risk in Loan Pools of GNMA-Guaranteed MBS: Evidence From Bank and Non-Bank Issuers | |
KR20220041395A (en) | Server performing real estate risk management using cltv and operating method thereof | |
Mwangangi | An analysis of the efficacy of borrower credit scores in predicting credit repayment performance: a case study in agricultural finance corporation-AFC | |
Echeverry | Adverse Selection Without a Housing Boom: Evidence from Fannie Mae's Credit Risk Transfers | |
Ramadorai | The Secondary Market for Hedge Funds and the Closed Hedge Fund Premium | |
Bowdler | Jeopardizing Hispanic homeownership: Predatory practices in the homebuying market | |
Cao‐Alvira et al. | On TARP and agency securitization | |
Ayertey Odonkor | An Assessment of Credit Risk Management Practices of Adansi Rural Bank Limited | |
Yezer | Personal Privacy of HMDA in a World of Big Data | |
Smith | The structural causes of mortgage fraud | |
TWM656273U (en) | Customer Revenue Forecasting System | |
Fairchild et al. | Risk and Efficiency among CDFIs: A Statistical Evaluation using Multiple Methods |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BANK OF AMERICA, N.A., TEXAS Free format text: SECURITY INTEREST;ASSIGNOR:CORELOGIC SOLUTIONS, LLC;REEL/FRAME:032798/0047 Effective date: 20140404 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: CORELOGIC SOLUTIONS, LLC, CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST RECORDED AT 032798/0047;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:056493/0957 Effective date: 20210604 |