US20140101029A1 - Method and apparatus for detecting fraudulent loans - Google Patents

Method and apparatus for detecting fraudulent loans Download PDF

Info

Publication number
US20140101029A1
US20140101029A1 US14/099,632 US201314099632A US2014101029A1 US 20140101029 A1 US20140101029 A1 US 20140101029A1 US 201314099632 A US201314099632 A US 201314099632A US 2014101029 A1 US2014101029 A1 US 2014101029A1
Authority
US
United States
Prior art keywords
loan
lender
data
applications
loan applications
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/099,632
Inventor
Robert L. Walker
Benjamin C. Graboske
George S. Livermore
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CoreLogic Solutions LLC
Original Assignee
CoreLogic Solutions LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CoreLogic Solutions LLC filed Critical CoreLogic Solutions LLC
Priority to US14/099,632 priority Critical patent/US20140101029A1/en
Publication of US20140101029A1 publication Critical patent/US20140101029A1/en
Assigned to BANK OF AMERICA, N.A. reassignment BANK OF AMERICA, N.A. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CORELOGIC SOLUTIONS, LLC
Assigned to CORELOGIC SOLUTIONS, LLC reassignment CORELOGIC SOLUTIONS, LLC RELEASE OF SECURITY INTEREST RECORDED AT 032798/0047 Assignors: BANK OF AMERICA, N.A.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • G06Q40/025
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Definitions

  • the present invention generally relates to a method and system for detecting fraud. More specifically, the present invention relates to a method and apparatus for detecting fraudulent activity by preventing the rapid funding of multiple loans on the same property.
  • the present invention attempts to remedy the problems discussed above, amongst others, related to fraudulent activities which occur during mortgage transactions between consumers and various lenders.
  • the present invention provides a novel system and method which is able to detect and prevent fraudulent activity by consumers attempting to obtain two or more fraudulent loans on the same property.
  • the present invention further provides a novel system and method wherein lenders are able to identify areas of strengths and areas of weaknesses with respect to mortgage application completion time.
  • the present invention further provides a novel system and method wherein a third party can proactively monitor deals that hit various alert stages and can directly call lenders to suggest further investigation and/or alert them of any suspicious activity.
  • FIG. 1 is a printout of an exemplary report of the present invention.
  • FIG. 2 is diagram of an exemplary embodiment of the Prism Database system.
  • FIG. 3 is another diagram of an exemplary embodiment of the Prism Database system.
  • FIG. 4 is an exemplary report produced by the Prism Database system diagramming various actions taken by the company and industry in the application process.
  • FIG. 5 is another exemplary report produced by the Prism Database system diagramming various actions taken by the company and industry in the application process.
  • FIG. 6 shows one the flow charts of an exemplary embodiment of the present invention.
  • the present invention provides a method and system for detecting and preventing fraudulent activity by preventing the funding of multiple loans on the same property/same address.
  • the present invention generally relates to a method and apparatus for collecting information from mortgage applications to determine whether there has been more then one application submitted for the same property to obtain a loan or collateral on that property.
  • the preferred embodiments of the present invention may include a method and system for collecting information from approved mortgage applications to determine whether there has been more than one application submitted for loan or collateral to a lender.
  • approved application is a commonly used term in the industry which describe an application where the lender has agreed to fund the applicant with no conditions, that there are similar uses for these terms. For example, there are many instances where lenders still use this term when there are certain conditions, pending a search to determine whether there are any liens on the property.
  • the present invention can be used to describe various types of loan applications, even though in the preferred embodiment “approved” applications are being used.
  • the application also uses the term property to describe a piece of land and/or building (e.g., house) located on that land. It should be appreciated that this property may be identified by numerous ways including, but not limited to, property address, parcel number, map coordinates, lot numbers or other similar identifiers as known to one skilled in the art.
  • the present invention collects on a cooperative basis desired mortgage application data from one or more lenders about each of their potential borrowers.
  • the only loans submitted to the main database, a.k.a. PRISM database are those loans that have received preliminary credit approval from the lender.
  • the type of application data that can be collected may include, but is not limited to: (1) Loan Number; (2) Loan Status (Doc.
  • the present invention is a fraud detection system comprising a module including a main database, e.g., a server, which may internally include a software program which is able to extract various data from the application submitted by the various lenders, and furthermore, the module is able to compare the data and provide the desired information for each lender.
  • the general information provided by the module includes alerting the lenders whether an applicant has more than one application on the same property which has been approved by two or more lenders.
  • other information can be obtained as discussed below with reference to FIGS. 4 and 5 .
  • the software program may be placed on another server/database in an alternative embodiment.
  • FIG. 1 illustrates a sample Prism Match Report which is a report generated by the present invention.
  • the section entitled “Multiple Application Pending” shows a situation where there are two mortgage loan applications pending, loan application #05-7615 and loan application #11-8119.
  • the first two digits of the loan number can, for example, indicate the lender number. Therefore, loan application #05-7615 originated from lender #05 and loan application #11-8119 originated from lender #11.
  • loan application #05-7615 was submitted on Aug. 15, 2006 and loan application #11-8119 was submitted on Aug. 20, 2006. Both loans had their status updated on Aug. 28, 2006. The reason these two mortgage loan applications were flagged was because there were some matches in the loan application profiles.
  • loan application #05-9111 and loan application #15-7115 could possibly have some problems.
  • loan applications target the same property address 3901 Mineola Way, 33579, and both have the same borrower name.
  • loan application #15-7115 is much further in the process than loan application #05-911I. Therefore, the action required field indicates that lender #05, the originator of loan application #05-9111, should check with lender #15, the originator of loan application #15-7115, on the status of loan application #15-7115, before lender #05 sends out any loan documents for signature for loan application #05-9111.
  • loan application #05-6515 and loan application #09-3517 have some severe problems.
  • both mortgage loan applications target the same property address 15 Orion, 92506 and both have the same borrower name.
  • fraud there is a strong possibility that fraud is being committed because while loan application #05-6515 has received signed documents, loan application 409-3517 is already being funded.
  • the action required field indicates that lender #05 should stop loan application #05-6515 and contact lender #09 to notify lender #09 that the borrower is attempting to secure two loans on the same property.
  • FIG. 2 shows a block diagram of the main database system 5 .
  • a main database 5 a.k.a. PRISM database, contains information collected from participating mortgage lenders about every loan applicant for each participating mortgage lender.
  • the main database 5 can be accessed by an underwriter 20 from a lender 15 via a loan pipeline 10 .
  • the main database 5 can also generate an e-mail alert 25 that is sent to the underwriter 20 in situations where there is important information about a mortgage loan application such as the creation of another mortgage loan application through another lender which is secured on the same property.
  • the underwriter 20 can have access to a fraud hotline 35 via a communication device, e.g. phone 30 , computer, etc., in case the underwriter 20 has questions regarding how to work with other lenders to stop fraud.
  • a third party may search the main database 5 for potential fraud without disclosure to the originators.
  • the third party can proactively monitor deals that hit alert stages and can directly call lenders to suggest further investigation and/or alert them of any suspicious activity.
  • the reports can also be generated and/or accessed in real time.
  • an individual lender user 50 can send real-time submissions 45 to the main database 5 which contains information collected from loan applications. This information is then available to other underwriters 20 and lenders 15 .
  • the individual lender user 50 can receive reports 40 from the main database 5 in real time. These reports can include, for example, an analysis of a mortgage loan application that the individual lender user 50 has submitted to the main database 5 . These reports can also include, for example, other mortgage loan applications, which the individual lender user 50 wishes to review. Reports can also be generated on the overall status or status of certain operations of lending institutions. These reports can then, for example, be analyzed on their own, or in context with other reports from the same lending institution or other lending institutions.
  • the present invention can compile a chart based on mortgage application data collected. This can be useful, for example, to disclose the percentage of applications that are duplicates or in other words have applications which are filed with other lending institutions that target the same property for collateralization.
  • the report for example, there can be a benchmark value disclosing the average value of the industry for comparison. This is indicated as “benchmark value” on the chart in FIG. 4 .
  • a report for example, on the percent of duplicated applications for each step of the application process can be shown.
  • the benchmark has 2.5% of their approved applications as duplicates whereas, the particular lender has a 3% duplicate application rate.
  • the lender in the example funds about 0.8% of their loans on the same property as other lenders.
  • the industry norm is about 0.2%. This is a huge and financially damaging problem that the lender must fix and this report shows that our lender is being adversely selected by some force in the market. This report will alert management of each lending institution to the problem.
  • the data can be used to analyze the lending institution's own efficiency as compared with an industry benchmark.
  • the time required for applications in lending institution to complete each phase is listed in the column entitled “Your Value (elapsed days)” while the time required for applications in the industry to complete each phase is listed in the column entitled “Benchmark Value.” The difference between the two times is listed in the column entitled “Difference.”
  • the “Pending—Out-for-document signature applications took 10 days to be completed while the industry took 12-days.
  • the lending institution was actually faster by 2 days.
  • “Pending—Docs received” applications the lending institution took 12-days to complete while the industry took 15-days.
  • the lending institution was actually faster by 3 days. Therefore, this can be an area to target for policies and procedures to speed up the application completion time.
  • the lending institution can now identify which areas are its strengths and which areas are its weaknesses with respect to application completion time.
  • FIG. 6 shows one the flow charts of an exemplary embodiment of the present invention.
  • the system collects applications from the various users, e.g., lenders.
  • the system analyzes the applications to detect whether 2 or more of the applications have similar data, e.g., same property address. If the system does not find 2 or more data that are similar on any of the applications, the system stops its analysis at step 620 .
  • the system checks to see if all of the application statuses are “approved.” If the system determines that all of the applications which have similar data have an approved status, then at step 630 , the system sends a “watch” alert to one or more of the users indicating that there are other pending approved applications. If the system determines that of the application which have similar data do not have an approved status, then at step 640 , the system sends a “Fraud Alert” to each user communicating that there is potential fraudulent activity going on.

Abstract

The present invention relates to a method and apparatus for detecting fraudulent activity by preventing the rapid funding of multiple loans on the same property, by providing a collective database where real estate property information is examined and the apparatus detects whether at least two mortgage applications are using the same property as collateral.

Description

    CLAIM OF PRIORITY
  • This application is a Continuation of and claims the benefit of priority under 35 U.S.C. §120 to U.S. application Ser. No. 11/623,020, filed on Jan. 12, 2007, which is a non-provisional of and claims the benefit of the earlier filing date of Provisional Application No. 60/870,042, filed on Dec. 14, 2006, the entire contents of each of which are expressly incorporated by reference herein.
  • FIELD OF THE INVENTION
  • The present invention generally relates to a method and system for detecting fraud. More specifically, the present invention relates to a method and apparatus for detecting fraudulent activity by preventing the rapid funding of multiple loans on the same property.
  • BACKGROUND OF THE INVENTION
  • FBI statistics indicate that mortgage fraud is on the rise. In some cases, consumers seek to defraud mortgage lenders for personal profit. To this end, borrowers seeking to defraud lenders have become increasingly sophisticated. A large national bank reported millions of dollars in losses when consumers apply for multiple loans with multiple lenders, on the same property. For example, suppose an individual applies for and is approved for an equity loan at 123 Jones Street in Fresno, Calif. Not only has the borrower been approved by lender A, but he was also approved by lender B, lender C, and lender D for an equity loan on the same property. Thus far, there is no problem. Consumers have a freedom of choice to apply for a loan wherever they desire. The problem comes when the approved loan is not in a second lien position as stated as a condition for approval in the application. Having secured and funded an equity loan with lender A, fraud occurs when the borrower also secures incremental loans with lenders B, C, and/or D. Equity loans typically involve minimum advances (you take cash from the signing table) and immediate access to cash via checking accounts or debit cards. The unscrupulous borrower can take the funds and run from lenders A, B, C, and/or D. The losses at lender A may be covered by the equity in the home, however, the losses at lenders B, C, and/or D are complete and non-recoverable since the property has been stripped of any owners' equity.
  • SUMMARY OF THE INVENTION
  • The present invention attempts to remedy the problems discussed above, amongst others, related to fraudulent activities which occur during mortgage transactions between consumers and various lenders.
  • The present invention provides a novel system and method which is able to detect and prevent fraudulent activity by consumers attempting to obtain two or more fraudulent loans on the same property.
  • The present invention further provides a novel system and method wherein lenders are able to identify areas of strengths and areas of weaknesses with respect to mortgage application completion time.
  • The present invention further provides a novel system and method wherein a third party can proactively monitor deals that hit various alert stages and can directly call lenders to suggest further investigation and/or alert them of any suspicious activity.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The above, as well as other advantages of the present invention, will become readily apparent to those skilled in the art from the following detailed description of the preferred embodiments when considered in the light of the accompanying drawing in which:
  • FIG. 1 is a printout of an exemplary report of the present invention.
  • FIG. 2 is diagram of an exemplary embodiment of the Prism Database system.
  • FIG. 3 is another diagram of an exemplary embodiment of the Prism Database system.
  • FIG. 4 is an exemplary report produced by the Prism Database system diagramming various actions taken by the company and industry in the application process.
  • FIG. 5 is another exemplary report produced by the Prism Database system diagramming various actions taken by the company and industry in the application process.
  • FIG. 6 shows one the flow charts of an exemplary embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • The present invention provides a method and system for detecting and preventing fraudulent activity by preventing the funding of multiple loans on the same property/same address.
  • The present invention generally relates to a method and apparatus for collecting information from mortgage applications to determine whether there has been more then one application submitted for the same property to obtain a loan or collateral on that property. However, the preferred embodiments of the present invention may include a method and system for collecting information from approved mortgage applications to determine whether there has been more than one application submitted for loan or collateral to a lender. It should be appreciated that even though the term “approved application” is a commonly used term in the industry which describe an application where the lender has agreed to fund the applicant with no conditions, that there are similar uses for these terms. For example, there are many instances where lenders still use this term when there are certain conditions, pending a search to determine whether there are any liens on the property. The present invention can be used to describe various types of loan applications, even though in the preferred embodiment “approved” applications are being used.
  • The application also uses the term property to describe a piece of land and/or building (e.g., house) located on that land. It should be appreciated that this property may be identified by numerous ways including, but not limited to, property address, parcel number, map coordinates, lot numbers or other similar identifiers as known to one skilled in the art.
  • The present invention collects on a cooperative basis desired mortgage application data from one or more lenders about each of their potential borrowers. In one exemplary embodiment, the only loans submitted to the main database, a.k.a. PRISM database, are those loans that have received preliminary credit approval from the lender. For example, the type of application data that can be collected may include, but is not limited to: (1) Loan Number; (2) Loan Status (Doc. Prep., Closed, Funded, etc.); (3) Loan Status Date; (4) Subject Property Address; (5) Subject Property State; (6) Subject Property Zip; (7) Borrower First Name; (8) Borrower Last Name; (9) Loan Amount; (10) Sale Amount; (11) Appraised Amount; (12) Channel; (13) Loan Purpose (Purchase, Cash Out Refi., Rate/Term Refi., HELOC); and/or (14) Loan Product.
  • The present invention is a fraud detection system comprising a module including a main database, e.g., a server, which may internally include a software program which is able to extract various data from the application submitted by the various lenders, and furthermore, the module is able to compare the data and provide the desired information for each lender. As previously discussed, the general information provided by the module includes alerting the lenders whether an applicant has more than one application on the same property which has been approved by two or more lenders. Moreover, other information can be obtained as discussed below with reference to FIGS. 4 and 5. It should be appreciated that the software program may be placed on another server/database in an alternative embodiment.
  • FIG. 1 illustrates a sample Prism Match Report which is a report generated by the present invention. The section entitled “Multiple Application Pending” shows a situation where there are two mortgage loan applications pending, loan application #05-7615 and loan application #11-8119. The first two digits of the loan number can, for example, indicate the lender number. Therefore, loan application #05-7615 originated from lender #05 and loan application #11-8119 originated from lender #11. Loan application #05-7615 was submitted on Aug. 15, 2006 and loan application #11-8119 was submitted on Aug. 20, 2006. Both loans had their status updated on Aug. 28, 2006. The reason these two mortgage loan applications were flagged was because there were some matches in the loan application profiles. For example, both loan applications target the same property address 39 Greylock Ridge, 14534, and both have the same borrower name. However, the “Action Required” field indicates that there is no immediate action required. The present invention, however still considers this a “watch” situation for both lenders since this is a “potential” fraud situation in the making. Accordingly, the system reports that loan number 11-8119 should be put on “watch” status as indicated in the report in FIG. 1. Furthermore, it should be appreciated that the report could be configured to indicate a “watch” status for both the lenders, depending on the desires of the users, e.g., lenders. [0211 In the second section entitled Possible Fraud Scenario 1, loan application #05-9111 and loan application #15-7115 could possibly have some problems. For example, both loan applications target the same property address 3901 Mineola Way, 33579, and both have the same borrower name. Unlike the previous situation, there could be some problems in this situation because while loan application #05-9111 was approved, loan application #15-7115 is already waiting for loan documents that were sent out, to come back signed. Thus, loan application #15-7115 is much further in the process than loan application #05-911I. Therefore, the action required field indicates that lender #05, the originator of loan application #05-9111, should check with lender #15, the originator of loan application #15-7115, on the status of loan application #15-7115, before lender #05 sends out any loan documents for signature for loan application #05-9111.
  • In the third section entitled Possible Fraud Scenario 2, loan application #05-6515 and loan application #09-3517 have some severe problems. For example, both mortgage loan applications target the same property address 15 Orion, 92506 and both have the same borrower name. Here, there is a strong possibility that fraud is being committed because while loan application #05-6515 has received signed documents, loan application 409-3517 is already being funded. Thus, the action required field indicates that lender #05 should stop loan application #05-6515 and contact lender #09 to notify lender #09 that the borrower is attempting to secure two loans on the same property.
  • FIG. 2 shows a block diagram of the main database system 5. A main database 5, a.k.a. PRISM database, contains information collected from participating mortgage lenders about every loan applicant for each participating mortgage lender. The main database 5 can be accessed by an underwriter 20 from a lender 15 via a loan pipeline 10. The main database 5 can also generate an e-mail alert 25 that is sent to the underwriter 20 in situations where there is important information about a mortgage loan application such as the creation of another mortgage loan application through another lender which is secured on the same property. In the exemplary embodiment shown in FIG. 2, the underwriter 20 can have access to a fraud hotline 35 via a communication device, e.g. phone 30, computer, etc., in case the underwriter 20 has questions regarding how to work with other lenders to stop fraud.
  • In one exemplary embodiment, a third party (e.g., offshore telephonic clearing house) may search the main database 5 for potential fraud without disclosure to the originators. The third party can proactively monitor deals that hit alert stages and can directly call lenders to suggest further investigation and/or alert them of any suspicious activity.
  • As shown in FIG. 3, the reports can also be generated and/or accessed in real time. In that situation, an individual lender user 50 can send real-time submissions 45 to the main database 5 which contains information collected from loan applications. This information is then available to other underwriters 20 and lenders 15. In addition, the individual lender user 50 can receive reports 40 from the main database 5 in real time. These reports can include, for example, an analysis of a mortgage loan application that the individual lender user 50 has submitted to the main database 5. These reports can also include, for example, other mortgage loan applications, which the individual lender user 50 wishes to review. Reports can also be generated on the overall status or status of certain operations of lending institutions. These reports can then, for example, be analyzed on their own, or in context with other reports from the same lending institution or other lending institutions.
  • For example, in FIG. 4, the present invention can compile a chart based on mortgage application data collected. This can be useful, for example, to disclose the percentage of applications that are duplicates or in other words have applications which are filed with other lending institutions that target the same property for collateralization. In the report, for example, there can be a benchmark value disclosing the average value of the industry for comparison. This is indicated as “benchmark value” on the chart in FIG. 4. There can also be a value disclosing the user's value. This is indicated as “your value” on the chart in FIG. 4. Thus, a report, for example, on the percent of duplicated applications for each step of the application process can be shown. For example, the benchmark has 2.5% of their approved applications as duplicates whereas, the particular lender has a 3% duplicate application rate. This means that the subject lender may have inefficiencies since they are the “beneficiary” of more duplicate applications than would be expected based upon industry norms. Funding loans on the same property is a much more onerous problem. In this example, it should be noted that the lender in the example funds about 0.8% of their loans on the same property as other lenders. The industry norm is about 0.2%. This is a huge and financially damaging problem that the lender must fix and this report shows that our lender is being adversely selected by some force in the market. This report will alert management of each lending institution to the problem.
  • Furthermore, the data can be used to analyze the lending institution's own efficiency as compared with an industry benchmark. As can be seen in FIG. 5, the time required for applications in lending institution to complete each phase is listed in the column entitled “Your Value (elapsed days)” while the time required for applications in the industry to complete each phase is listed in the column entitled “Benchmark Value.” The difference between the two times is listed in the column entitled “Difference.” Thus, for the lending institution, the “Pending—Out-for-document signature applications took 10 days to be completed while the industry took 12-days. Thus, the lending institution was actually faster by 2 days. However, for “Pending—Docs received” applications, the lending institution took 12-days to complete while the industry took 15-days. Thus, the lending institution was actually faster by 3 days. Therefore, this can be an area to target for policies and procedures to speed up the application completion time. Thus, the lending institution can now identify which areas are its strengths and which areas are its weaknesses with respect to application completion time.
  • FIG. 6 shows one the flow charts of an exemplary embodiment of the present invention. As shown in step 600, the system collects applications from the various users, e.g., lenders. At step 610, the system analyzes the applications to detect whether 2 or more of the applications have similar data, e.g., same property address. If the system does not find 2 or more data that are similar on any of the applications, the system stops its analysis at step 620. If the system does find two or more applications which have similar data, then in the next step 630, the system checks to see if all of the application statuses are “approved.” If the system determines that all of the applications which have similar data have an approved status, then at step 630, the system sends a “watch” alert to one or more of the users indicating that there are other pending approved applications. If the system determines that of the application which have similar data do not have an approved status, then at step 640, the system sends a “Fraud Alert” to each user communicating that there is potential fraudulent activity going on.
  • It is also to be understood that the following claims are intended to cover all of the generic and specific features of the invention herein described, and all statement of the scope of the present invention which, as a matter of language, might be said to fall therebetween.

Claims (19)

1. A system comprising:
physical data storage configured to store loan applications data; and
a computer system in communication with the physical data storage, the computer system comprising computer hardware, the computer system programmed to:
receive data from a plurality of loan applications associated with real estate properties, wherein the plurality of loan applications data are associated with a plurality of lenders;
store the loan applications data in the physical data storage;
electronically extract, from the loan applications data, subject property information associated with the plurality of loan applications;
compare the extracted subject property information to identify any loan applications from the plurality of loan applications that are using the same subject property as collateral;
electronically extract, from the loan applications data, loan status information associated with the identified loan applications that are using the same subject property as collateral;
analyze the extracted loan status information to determine if the identified loan applications are currently pending and have an approved status; and
generate an alert if the identified loan applications are currently pending and have an approved status.
2. The system of claim 1, wherein the alert comprises an email alert.
3. The system of claim 1, wherein the computer system is further programmed to provide an interface to the plurality of lenders to access the loan applications data stored in the physical data storage.
4. The system of claim 1, wherein the computer system is further programmed to provide an interface to an entity to search the loan applications data stored in the physical data storage.
5. The system of claim 1, wherein the loan application data is selected from a group consisting of a borrower name, an address of a subject property that a borrower seeks to finance, a loan amount, a loan purpose, whether the subject property is owner occupied, the subject property value, a loan status with any status change date and time stamped, and loan-to-value estimates.
6. The system of claim 5, wherein the loan purpose is selected from a group consisting of purchase, refinance, cash out, and home equity line of credit.
7. A system comprising:
physical data storage configured to store loan applications data; and
a computer system in communication with the physical data storage, the computer system comprising computer hardware, the computer system programmed to:
receive data from a plurality of loan applications associated with real estate properties;
store the loan applications data in the physical data storage;
identify any loan applications from the plurality of loan applications that are associated with a target lender by analyzing the loan applications data;
determine a time for the target lender to complete one or more phases in processing a loan application by analyzing the identified loan applications;
determine one or more efficiency ratings for the target lender based at least in part on the determined time for the target lender to complete one or more phases in processing a loan application; and
store the determined one or more efficiency ratings in the physical data storage.
8. The system of claim 7, wherein the one or more efficiency ratings are determined by comparing the target lender to an industry benchmark.
9. The system of claim 7, wherein the one or more phases comprise a funding phase.
10. The system of claim 7, wherein the one or more phases comprise approval of a loan application phase.
11. The system of claim 7, wherein the loan applications data is further analyzed to determine one or more financial risk ratings for the target lender.
12. The system of claim 11, wherein the one or more financial risk ratings relate to a number of duplicate applications for the same property received by the target lender.
13. The system of claim 11, wherein the one or more financial risk ratings are determined by comparing the target lender to an industry benchmark.
14. A non-transitory computer readable storage medium comprising instructions which, when executed by a computer system that includes a data processor and is connected to at least one data repository, perform a method comprising:
(a) receiving, by the computer system through a network communication channel, data from a plurality of loan applications associated with real estate properties;
(b) analyzing, by the data processor of the computer system, the loan applications data to determine one or more efficiency ratings for a lender associated with the loan applications data, wherein the one or more efficiency ratings relate to a time for the lender to complete one or more phases in processing a loan application; and
(c) storing, by the data processor of the computer system, the determined one or more efficiency ratings in the at least one data repository.
15. The non-transitory computer readable storage medium of claim 14, wherein the one or more efficiency ratings are determined by comparing the lender to an industry benchmark.
16. The non-transitory computer readable storage medium of claim 14, wherein the one or more phases comprise a funding phase.
17. The non-transitory computer readable storage medium of claim 14, wherein the loan applications data is further analyzed to determine one or more financial risk ratings for the lender.
18. The non-transitory computer readable storage medium of claim 17, wherein the one or more financial risk ratings relate to a number of duplicate applications for the same property received by the lender.
19. The non-transitory computer readable storage medium of claim 17, wherein the one or more financial risk ratings are determined by comparing the lender to an industry benchmark.
US14/099,632 2006-12-14 2013-12-06 Method and apparatus for detecting fraudulent loans Abandoned US20140101029A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/099,632 US20140101029A1 (en) 2006-12-14 2013-12-06 Method and apparatus for detecting fraudulent loans

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US87004206P 2006-12-14 2006-12-14
US11/623,020 US8612320B2 (en) 2006-12-14 2007-01-12 Method and apparatus for detecting fraudulent loans
US14/099,632 US20140101029A1 (en) 2006-12-14 2013-12-06 Method and apparatus for detecting fraudulent loans

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/623,020 Continuation US8612320B2 (en) 2006-12-14 2007-01-12 Method and apparatus for detecting fraudulent loans

Publications (1)

Publication Number Publication Date
US20140101029A1 true US20140101029A1 (en) 2014-04-10

Family

ID=39528649

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/623,020 Active 2029-01-25 US8612320B2 (en) 2006-12-14 2007-01-12 Method and apparatus for detecting fraudulent loans
US14/099,632 Abandoned US20140101029A1 (en) 2006-12-14 2013-12-06 Method and apparatus for detecting fraudulent loans

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/623,020 Active 2029-01-25 US8612320B2 (en) 2006-12-14 2007-01-12 Method and apparatus for detecting fraudulent loans

Country Status (2)

Country Link
US (2) US8612320B2 (en)
AU (2) AU2007242962B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019169000A1 (en) * 2018-02-27 2019-09-06 Trans Union Llc Fraud prevention exchange system and method
CN110458694A (en) * 2019-08-12 2019-11-15 浙江大搜车软件技术有限公司 Credit risk analysis method, device, computer equipment and readable storage medium storing program for executing

Families Citing this family (86)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8732004B1 (en) 2004-09-22 2014-05-20 Experian Information Solutions, Inc. Automated analysis of data to generate prospect notifications based on trigger events
US20080033852A1 (en) * 2005-10-24 2008-02-07 Megdal Myles G Computer-based modeling of spending behaviors of entities
US7711636B2 (en) * 2006-03-10 2010-05-04 Experian Information Solutions, Inc. Systems and methods for analyzing data
US7587348B2 (en) * 2006-03-24 2009-09-08 Basepoint Analytics Llc System and method of detecting mortgage related fraud
US8036979B1 (en) 2006-10-05 2011-10-11 Experian Information Solutions, Inc. System and method for generating a finance attribute from tradeline data
US7657569B1 (en) 2006-11-28 2010-02-02 Lower My Bills, Inc. System and method of removing duplicate leads
US7778885B1 (en) 2006-12-04 2010-08-17 Lower My Bills, Inc. System and method of enhancing leads
US8606626B1 (en) 2007-01-31 2013-12-10 Experian Information Solutions, Inc. Systems and methods for providing a direct marketing campaign planning environment
US8606666B1 (en) 2007-01-31 2013-12-10 Experian Information Solutions, Inc. System and method for providing an aggregation tool
US8386027B2 (en) * 2007-04-27 2013-02-26 Echo Therapeutics, Inc. Skin permeation device for analyte sensing or transdermal drug delivery
US20080294540A1 (en) 2007-05-25 2008-11-27 Celka Christopher J System and method for automated detection of never-pay data sets
US9690820B1 (en) 2007-09-27 2017-06-27 Experian Information Solutions, Inc. Database system for triggering event notifications based on updates to database records
US7546271B1 (en) * 2007-12-20 2009-06-09 Choicepoint Asset Company Mortgage fraud detection systems and methods
US8340634B2 (en) 2009-01-28 2012-12-25 Headwater Partners I, Llc Enhanced roaming services and converged carrier networks with device assisted services and a proxy
US8898293B2 (en) 2009-01-28 2014-11-25 Headwater Partners I Llc Service offer set publishing to device agent with on-device service selection
US8924469B2 (en) 2008-06-05 2014-12-30 Headwater Partners I Llc Enterprise access control and accounting allocation for access networks
US8346225B2 (en) 2009-01-28 2013-01-01 Headwater Partners I, Llc Quality of service for device assisted services
US8924543B2 (en) 2009-01-28 2014-12-30 Headwater Partners I Llc Service design center for device assisted services
US8832777B2 (en) 2009-03-02 2014-09-09 Headwater Partners I Llc Adapting network policies based on device service processor configuration
US8725123B2 (en) 2008-06-05 2014-05-13 Headwater Partners I Llc Communications device with secure data path processing agents
US8548428B2 (en) 2009-01-28 2013-10-01 Headwater Partners I Llc Device group partitions and settlement platform
US8402111B2 (en) 2009-01-28 2013-03-19 Headwater Partners I, Llc Device assisted services install
US8626115B2 (en) 2009-01-28 2014-01-07 Headwater Partners I Llc Wireless network service interfaces
US8589541B2 (en) 2009-01-28 2013-11-19 Headwater Partners I Llc Device-assisted services for protecting network capacity
US8391834B2 (en) 2009-01-28 2013-03-05 Headwater Partners I Llc Security techniques for device assisted services
US8250207B2 (en) 2009-01-28 2012-08-21 Headwater Partners I, Llc Network based ambient services
US8406748B2 (en) 2009-01-28 2013-03-26 Headwater Partners I Llc Adaptive ambient services
US8275830B2 (en) 2009-01-28 2012-09-25 Headwater Partners I Llc Device assisted CDR creation, aggregation, mediation and billing
US8635335B2 (en) 2009-01-28 2014-01-21 Headwater Partners I Llc System and method for wireless network offloading
US10373198B1 (en) 2008-06-13 2019-08-06 Lmb Mortgage Services, Inc. System and method of generating existing customer leads
US9980146B2 (en) 2009-01-28 2018-05-22 Headwater Research Llc Communications device with secure data path processing agents
US9253663B2 (en) 2009-01-28 2016-02-02 Headwater Partners I Llc Controlling mobile device communications on a roaming network based on device state
US10779177B2 (en) 2009-01-28 2020-09-15 Headwater Research Llc Device group partitions and settlement platform
US10715342B2 (en) 2009-01-28 2020-07-14 Headwater Research Llc Managing service user discovery and service launch object placement on a device
US9578182B2 (en) 2009-01-28 2017-02-21 Headwater Partners I Llc Mobile device and service management
US8606911B2 (en) 2009-03-02 2013-12-10 Headwater Partners I Llc Flow tagging for service policy implementation
US10783581B2 (en) 2009-01-28 2020-09-22 Headwater Research Llc Wireless end-user device providing ambient or sponsored services
US9647918B2 (en) 2009-01-28 2017-05-09 Headwater Research Llc Mobile device and method attributing media services network usage to requesting application
US9755842B2 (en) 2009-01-28 2017-09-05 Headwater Research Llc Managing service user discovery and service launch object placement on a device
US10841839B2 (en) 2009-01-28 2020-11-17 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US9706061B2 (en) 2009-01-28 2017-07-11 Headwater Partners I Llc Service design center for device assisted services
US8793758B2 (en) 2009-01-28 2014-07-29 Headwater Partners I Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US8745191B2 (en) 2009-01-28 2014-06-03 Headwater Partners I Llc System and method for providing user notifications
US10326800B2 (en) 2009-01-28 2019-06-18 Headwater Research Llc Wireless network service interfaces
US9557889B2 (en) 2009-01-28 2017-01-31 Headwater Partners I Llc Service plan design, user interfaces, application programming interfaces, and device management
US9392462B2 (en) 2009-01-28 2016-07-12 Headwater Partners I Llc Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy
US9954975B2 (en) 2009-01-28 2018-04-24 Headwater Research Llc Enhanced curfew and protection associated with a device group
US10064055B2 (en) 2009-01-28 2018-08-28 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US9270559B2 (en) 2009-01-28 2016-02-23 Headwater Partners I Llc Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow
US9955332B2 (en) 2009-01-28 2018-04-24 Headwater Research Llc Method for child wireless device activation to subscriber account of a master wireless device
US8351898B2 (en) 2009-01-28 2013-01-08 Headwater Partners I Llc Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account
US10798252B2 (en) 2009-01-28 2020-10-06 Headwater Research Llc System and method for providing user notifications
US10264138B2 (en) 2009-01-28 2019-04-16 Headwater Research Llc Mobile device and service management
US9565707B2 (en) 2009-01-28 2017-02-07 Headwater Partners I Llc Wireless end-user device with wireless data attribution to multiple personas
US9351193B2 (en) 2009-01-28 2016-05-24 Headwater Partners I Llc Intermediate networking devices
US10484858B2 (en) 2009-01-28 2019-11-19 Headwater Research Llc Enhanced roaming services and converged carrier networks with device assisted services and a proxy
US9572019B2 (en) 2009-01-28 2017-02-14 Headwater Partners LLC Service selection set published to device agent with on-device service selection
US11218854B2 (en) 2009-01-28 2022-01-04 Headwater Research Llc Service plan design, user interfaces, application programming interfaces, and device management
US10200541B2 (en) 2009-01-28 2019-02-05 Headwater Research Llc Wireless end-user device with divided user space/kernel space traffic policy system
US9858559B2 (en) 2009-01-28 2018-01-02 Headwater Research Llc Network service plan design
US10057775B2 (en) 2009-01-28 2018-08-21 Headwater Research Llc Virtualized policy and charging system
US8893009B2 (en) 2009-01-28 2014-11-18 Headwater Partners I Llc End user device that secures an association of application to service policy with an application certificate check
US10248996B2 (en) 2009-01-28 2019-04-02 Headwater Research Llc Method for operating a wireless end-user device mobile payment agent
US10237757B2 (en) 2009-01-28 2019-03-19 Headwater Research Llc System and method for wireless network offloading
US10492102B2 (en) 2009-01-28 2019-11-26 Headwater Research Llc Intermediate networking devices
US9652802B1 (en) 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
US10453093B1 (en) 2010-04-30 2019-10-22 Lmb Mortgage Services, Inc. System and method of optimizing matching of leads
US8515863B1 (en) 2010-09-01 2013-08-20 Federal Home Loan Mortgage Corporation Systems and methods for measuring data quality over time
AU2011299015A1 (en) * 2010-09-09 2013-03-14 Headwater Partners I Llc Wireless network service interfaces
CA2827478C (en) 2011-02-18 2020-07-28 Csidentity Corporation System and methods for identifying compromised personally identifiable information on the internet
US9154826B2 (en) 2011-04-06 2015-10-06 Headwater Partners Ii Llc Distributing content and service launch objects to mobile devices
US11030562B1 (en) 2011-10-31 2021-06-08 Consumerinfo.Com, Inc. Pre-data breach monitoring
US20140025548A1 (en) * 2012-07-17 2014-01-23 Corelogic Solutions, Llc Automated anomaly detection for real estate transactions
US10255598B1 (en) 2012-12-06 2019-04-09 Consumerinfo.Com, Inc. Credit card account data extraction
WO2014159862A1 (en) 2013-03-14 2014-10-02 Headwater Partners I Llc Automated credential porting for mobile devices
US8812387B1 (en) 2013-03-14 2014-08-19 Csidentity Corporation System and method for identifying related credit inquiries
US9633322B1 (en) 2013-03-15 2017-04-25 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US10262362B1 (en) 2014-02-14 2019-04-16 Experian Information Solutions, Inc. Automatic generation of code for attributes
US20160078577A1 (en) * 2014-09-17 2016-03-17 David Michonski Method and system for automating the accountability of service professionals via consumer education and rating
US10339527B1 (en) 2014-10-31 2019-07-02 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US10242019B1 (en) 2014-12-19 2019-03-26 Experian Information Solutions, Inc. User behavior segmentation using latent topic detection
US11151468B1 (en) 2015-07-02 2021-10-19 Experian Information Solutions, Inc. Behavior analysis using distributed representations of event data
US10699028B1 (en) 2017-09-28 2020-06-30 Csidentity Corporation Identity security architecture systems and methods
US10896472B1 (en) 2017-11-14 2021-01-19 Csidentity Corporation Security and identity verification system and architecture
US11681966B2 (en) 2021-02-24 2023-06-20 Fannie Mae Systems and methods for enhanced risk identification based on textual analysis
US11094135B1 (en) 2021-03-05 2021-08-17 Flyreel, Inc. Automated measurement of interior spaces through guided modeling of dimensions

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020133371A1 (en) * 2001-01-24 2002-09-19 Cole James A. Automated mortgage fraud prevention method and system
US20040064401A1 (en) * 2002-09-27 2004-04-01 Capital One Financial Corporation Systems and methods for detecting fraudulent information
US20060149674A1 (en) * 2004-12-30 2006-07-06 Mike Cook System and method for identity-based fraud detection for transactions using a plurality of historical identity records
US20070219819A1 (en) * 2006-03-14 2007-09-20 Title Insurance National Information Exchange Llc Method and system for detecting title fraud
US20070226129A1 (en) * 2006-03-24 2007-09-27 Yuansong Liao System and method of detecting mortgage related fraud

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5797133A (en) * 1994-08-31 1998-08-18 Strategic Solutions Group, Inc Method for automatically determining the approval status of a potential borrower
US6324524B1 (en) * 1998-11-03 2001-11-27 Nextcard, Inc. Method and apparatus for an account level offer of credit and real time balance transfer
US20020156787A1 (en) 2001-02-13 2002-10-24 Jameson Daniel E. Method and system for internet based event planning and event management
US7707103B2 (en) * 2004-03-15 2010-04-27 Arthur J Prieston System and method for rating lenders
US20060224480A1 (en) * 2005-03-29 2006-10-05 Reserve Solutions, Inc. Systems and methods for loan management with variable security arrangements
US8046306B2 (en) 2007-06-29 2011-10-25 Zaio Corporation System, method, and apparatus for property appraisals
AU2011201516B2 (en) 2010-04-06 2014-08-07 Corelogic Solutions, Llc Method, computer program product, device, and system for creating an electronic appraisal report and auditing system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020133371A1 (en) * 2001-01-24 2002-09-19 Cole James A. Automated mortgage fraud prevention method and system
US20040064401A1 (en) * 2002-09-27 2004-04-01 Capital One Financial Corporation Systems and methods for detecting fraudulent information
US20060149674A1 (en) * 2004-12-30 2006-07-06 Mike Cook System and method for identity-based fraud detection for transactions using a plurality of historical identity records
US20070219819A1 (en) * 2006-03-14 2007-09-20 Title Insurance National Information Exchange Llc Method and system for detecting title fraud
US20070226129A1 (en) * 2006-03-24 2007-09-27 Yuansong Liao System and method of detecting mortgage related fraud

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019169000A1 (en) * 2018-02-27 2019-09-06 Trans Union Llc Fraud prevention exchange system and method
US11354670B2 (en) * 2018-02-27 2022-06-07 Trans Union Llc Fraud prevention exchange system and method
CN110458694A (en) * 2019-08-12 2019-11-15 浙江大搜车软件技术有限公司 Credit risk analysis method, device, computer equipment and readable storage medium storing program for executing

Also Published As

Publication number Publication date
AU2007242962B2 (en) 2011-11-24
AU2012201001A1 (en) 2012-03-08
AU2007242962A1 (en) 2008-07-03
AU2012201001B2 (en) 2014-08-07
US8612320B2 (en) 2013-12-17
US20080147454A1 (en) 2008-06-19
AU2012201001B8 (en) 2014-11-27

Similar Documents

Publication Publication Date Title
US8612320B2 (en) Method and apparatus for detecting fraudulent loans
US8412605B2 (en) Comprehensive suspicious activity monitoring and alert system
US8271364B2 (en) Method and apparatus for obtaining, organizing, and analyzing multi-source data
US7546271B1 (en) Mortgage fraud detection systems and methods
US8468088B2 (en) Automated mining and processing of data associated with real estate
US8429050B2 (en) Method for detecting ineligibility of a beneficiary and system
US20120209760A1 (en) Risk identification system and judgmental review interface
CN110852878A (en) Credibility determination method, device, equipment and storage medium
US8566204B2 (en) Method for detecting ineligibility of a beneficiary and system
Brown A comparison of the handling of the financial crisis in the United States, the United Kingdom, and Australia
Postel‐Vinay Debt dilution in 1920s America: lighting the fuse of a mortgage crisis
US20140279386A1 (en) Methods and system for mining and analyzing real estate information
Ramadorai The Secondary Market for Hedge Funds and the Closed Hedge Fund Premium
Smith The structural causes of mortgage fraud
Smith The structural causes of mortgage fraud
Huszár et al. Does mandatory disclosure affect subprime lending to minority neighborhoods?
Echeverry Adverse Selection Without a Housing Boom: Evidence from Fannie Mae's Credit Risk Transfers
Cao‐Alvira et al. On TARP and agency securitization
Mwangangi An analysis of the efficacy of borrower credit scores in predicting credit repayment performance: a case study in agricultural finance corporation-AFC
Ayertey Odonkor An Assessment of Credit Risk Management Practices of Adansi Rural Bank Limited
Yezer Personal Privacy of HMDA in a World of Big Data
Fairchild et al. Risk and Efficiency among CDFIs: A Statistical Evaluation using Multiple Methods
KR20220041395A (en) Server performing real estate risk management using cltv and operating method thereof
Zahra Effects of Credit Information Sharing on Non-performing Loans of Commercial Banks in Kenya
Robinson Preventing Commercial Mortgage Fraud.

Legal Events

Date Code Title Description
AS Assignment

Owner name: BANK OF AMERICA, N.A., TEXAS

Free format text: SECURITY INTEREST;ASSIGNOR:CORELOGIC SOLUTIONS, LLC;REEL/FRAME:032798/0047

Effective date: 20140404

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: CORELOGIC SOLUTIONS, LLC, CALIFORNIA

Free format text: RELEASE OF SECURITY INTEREST RECORDED AT 032798/0047;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:056493/0957

Effective date: 20210604