US20140214648A1 - Methods and systems for automatically generating high quality adverse action notifications - Google Patents

Methods and systems for automatically generating high quality adverse action notifications Download PDF

Info

Publication number
US20140214648A1
US20140214648A1 US14/169,400 US201414169400A US2014214648A1 US 20140214648 A1 US20140214648 A1 US 20140214648A1 US 201414169400 A US201414169400 A US 201414169400A US 2014214648 A1 US2014214648 A1 US 2014214648A1
Authority
US
United States
Prior art keywords
variables
borrower
credit
meta
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/169,400
Inventor
John W.L. Merrill
Shawn M. Budde
John B. Candido, III
Lingyun Gu
Farshad Kheiri
James P. McGuire
Douglas C. Merrill
Manoj Pinnamaneni
Marick Sinay
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zestfinance Inc
Original Assignee
Zestfinance Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zestfinance Inc filed Critical Zestfinance Inc
Priority to US14/169,400 priority Critical patent/US20140214648A1/en
Assigned to ZESTFINANCE, INC. reassignment ZESTFINANCE, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CANDIDO, JOHN B., III, MCGUIRE, JAMES P., MERRILL, DOUGLAS C., BUDDE, SHAWN M., PINNAMANENI, MANOJ, GU, LINGYUN, KHIERI, FARSHAD, MERRILL, JOHN W.L., SINAY, MARICK
Publication of US20140214648A1 publication Critical patent/US20140214648A1/en
Priority to US14/954,825 priority patent/US20160155193A1/en
Priority to US16/109,545 priority patent/US20180365765A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • G06Q40/025
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning

Definitions

  • This invention relates generally to the personal finance and banking field, and more particularly to the field of lending and credit notification methods and systems.
  • One preferred method for automatically generating high quality adverse action notifications can include entering and/or importing a borrower dataset and a lender's credit criteria at a first computer (borrower data and lender criteria); processing the dataset variables and/or sets of variables in the lender's algorithms to identify which variables, when changed, result in an increased credit score (field selection); ranking individual variables and/or sets of variables in the borrower dataset to yield the greatest differences in a credit score (field ranking); and generating a report showing which variables and/or sets of variables, when changed, result in an acceptable credit score (reason test generation).
  • the preferred method can further include formatting the reason set generation into an adverse action letter that is understandable and usable by the consumer (adverse action letter generation).
  • adverse action letter generation formatting the reason set generation into an adverse action letter that is understandable and usable by the consumer.
  • the present invention could be used independently (by simply generating adverse action letters) or in the alternative, the present invention could also be interfaced with, and used in conjunction with, a system and method for providing credit to borrowers.
  • An example of such systems and methods is described in U.S. patent application Ser. No. 13/454,970, entitled “System and Method for Providing Credit to Underserved Borrowers, to Douglas Merrill et al, which is hereby incorporated by reference in its entirety (“Merrill Application”).
  • FIG. 1 is a diagram of a system for automatically generating high quality adverse action notifications in accordance with a preferred embodiment of the present invention.
  • FIG. 2 depicts an overall flowchart illustrating an exemplary embodiment of a method by which high quality adverse action notifications are automatically generated.
  • FIG. 3 depicts a flowchart illustrating an exemplary embodiment of a method for important field selection.
  • FIG. 4 depicts a flowchart illustrating an exemplary embodiment of a method for finding the path to adequacy.
  • FIG. 5 a depicts a flowchart illustrating an alternative exemplary embodiment short titled “swapping codes” as contained in the method for determining the path to adequacy.
  • FIG. 5 b depicts a flowchart illustrating an alternative exemplary embodiment short titled “selection by scoring” as contained in the method for determining the path to adequacy.
  • FIG. 5 c depicts a flowchart illustrating an alternative exemplary embodiment short titled “mutation” as contained in the method for determining the path to adequacy.
  • FIG. 5 d depicts a flowchart illustrating an alternative exemplary embodiment short titled “cross-over” as contained in the method for determining the path to adequacy.
  • BORROWER DEVICE shall generally refer to a desktop computer, laptop computer, notebook computer, tablet computer, mobile device such as a smart phone or personal digital assistant, smart TV, gaming console, streaming video player, or any other, suitable networking device having a web browser or stand-alone application configured to interface with and/or receive any or all data to/from the CENTRAL COMPUTER, USER DEVICE, and/or one or more components of the preferred system 10 .
  • the term “USER DEVICE” shall generally refer to a desktop computer, laptop computer, notebook computer, tablet computer, mobile device such as a smart phone or personal digital assistant, smart TV, gaming console, streaming video player, or any other, suitable networking device having a web browser or stand-alone application configured to interface with and/or receive any or all data to/from the CENTRAL COMPUTER, BORROWER DEVICE, and/or one or more components of the preferred system 10 .
  • the term “CENTRAL COMPUTER” shall generally refer to one or more sub-components or machines configured for receiving, manipulating, configuring, analyzing, synthesizing, communicating, and/or processing data associated with the borrower and lender. Any of the foregoing subcomponents or machines can optionally be integrated into a single operating unit, or distributed throughout multiple hardware entities through networked or cloud-based resources. Moreover, the central computer may be configured to interface with and/or receive any or all data to/from the USER DEVICE, BORROWER DEVICE, and/or one or more components of the preferred system 10 as shown in FIG. 1 . The CENTRAL COMPUTER may also be the same device described in more detail in the Merrill Application, incorporated by reference in its entirety.
  • BORROWER'S DATA shall generally refer to the borrower's data in his or her application for lending as entered into by the borrower, or on the borrower's behalf, in the BORROWER DEVICE, USER DEVICE, or CENTRAL COMPUTER.
  • this data may include traditional credit-related information such as the borrower's social security number, driver's license number, date of birth, or other information requested by a lender.
  • This data may also include proprietary information acquired by payment of a fee through privately or governmentally owned data stores (including without limitation, through feeds, databases, or files containing data).
  • this data may include public information available on the internet, for free or at a nominal cost, through one or more search strings, automated crawls, or scrapes using any suitable searching, crawling, or scraping process, program, or protocol.
  • borrower data could include information related to a borrower profile and/or any blogs, posts, tweets, links, friends, likes, connections, followers, followings, pins (collectively a borrower's social graph) on a social network. The list of foregoing examples is not exhaustive.
  • LENDER CRITERIA shall generally refer to the criteria by which a lender decides to accept or reject an application for credit as periodically set in the USER DEVICE or CENTRAL COMPUTER.
  • these criteria may include accept or reject criterion based on individual data points in the BORROWER'S DATA (such as length of current residence>6 months), or based on complex mathematical models that determine the creditworthiness of a borrower.
  • NETWORK shall generally refer to any suitable combination of the global Internet, a wide area network (WAN), a local area network (LAN), and/or a near field network, as well as any suitable networking software, firmware, hardware, routers, modems, cables, transceivers, antennas, and the like.
  • WAN wide area network
  • LAN local area network
  • NETWORKING SOFTWARE any suitable networking software, firmware, hardware, routers, modems, cables, transceivers, antennas, and the like.
  • Some or all of the components of the preferred system 10 can access the network through wired or wireless means, and using any suitable communication protocol/s, layers, addresses, types of media, application programming interface/s, and/or supporting communications hardware, firmware, and/or software.
  • the present invention relates to improved methods and systems for automatically generating high quality adverse action notifications, which includes notifications for individuals, and other types of entities including, but not limited to, corporations, companies, small businesses, and trusts, and any other recognized financial entity.
  • a frame of reference is in order: As many consumers know, a person's credit history is made up of a number of variables, such as the amount of debt the person is presently carrying, their income stability, their repayment history on past debt (lateness or failure to pay), and the length of their credit history. However, consumers do not often appreciate that modern credit scoring systems have significantly increased in sophistication, now containing many variables and meta-variables as well.
  • a preferred operating environment for automatically generating high quality adverse action notifications in accordance with a preferred embodiment can generally include data sources (the borrower's application 13 , and the lender's credit model 15 ), a USER DEVICE 30 , a CENTRAL COMPUTER 20 , a NETWORK 40 , and one or more communication devices from which the borrower is issued an adverse action letter, including a BORROWER DEVICE 12 , Email Server 30 , and/or a Print Server 40 .
  • the preferred system 10 can include at least: data sources (the borrower's application 13 , and the lender's credit model 15 ), and a computer to analyze and process the data sources (CENTRAL COMPUTER 20 and/or a USER DEVICE 30 ), which function to generate high quality adverse action notifications.
  • the borrower's application 13 should include one or more variables in the BORROWER DATA
  • the lender's credit model 15 should include one or more algorithms from the LENDER'S CRITERIA.
  • the preferred system 10 functions to helps borrowers determine the accuracy of his/her credit file as well as provide information to improve his/her creditworthiness, by accessing, evaluating, measuring, quantifying, and utilizing a the novel and unique methodology described below.
  • this invention relates to the preferred methodology for automatically generating high quality adverse action notifications that takes place within the CENTRAL COMPUTER 20 and/or a USER DEVICE 30 , after gathering and/or downloading the BORROWER'S DATA 13 and the LENDER CRITERIA 15 .
  • FIG. 2 provides a flowchart illustrating one preferred method for automatically generating high quality adverse action notifications which involves the following steps: (a) gathering the BORROWER DATA 100 for a failed credit application; (b) important field selection 200 (to compare BORROWER DATA against the LENDER CRITERIA 600 ); (c) field ranking 300 ; (d) reason text generation 400 ; and (e) generating adverse action letters 500 .
  • BORROWER DATA 100 all data from the borrower's failed application is temporarily gathered for collection by a computer (such as the CENTRAL COMPUTER 20 in FIG. 1 ).
  • the BORROWER DATA 100 may include classic financial data such as the borrower's current salary, length of most recent employment, and the number of bankruptcies.
  • the BORROWER DATA 100 may include other unique aspects of the borrower, such as the number of organizations the borrower has been or is currently is involved with, the number of friends the borrower has, or other non-traditional aspects of the borrower's identity and history such those identified in the Merrill Application. Subsets of BORROWER DATA 100 are used to determine the borrower's credit score.
  • fictitious BORROWER DATA 100 for Ms. “A” (a creditworthy applicant), Mr. “B” (a declined applicant), the average approved applicant, and the perfect applicant are shown below:
  • Important field selection is the creation of a list of BORROWER DATA variables whose values either reduce or increase the application's credit score by sufficiently perceptible amounts when those variables are changed, and processed through the LENDER CRITERIA 600 .
  • important field selection 200 may be accomplished by determining the shortest path between the borrower's credit application and the “perfect application” (shortest path 210 ). Alternatively, important field selection 200 may be accomplished by finding the most important changes between the borrower's application and an “adequate application” that is approved for funding (path to adequacy 220 ). Both methods are discussed below:
  • the shortest path 210 is a protocol in which a list of all fields (variables) are identified where there is difference between the BORROWER DATA and the data of a “perfect” applicant. Given that a “perfect” application (one which receives the highest possible score) will always be funded, one way to build an explanation for why a different application was not approved is to find the set of differences between the unfunded application and the perfect application. Thus, as a preliminary step, the preferred method is to record a list of fields on which the two applications differ.
  • BORROWER DATA 100 could include dozens variables or hundreds of thousands of meta-variables. And depending on the sophistication of the Lender's credit scoring system, some or most of those variables and meta-variables may not be used in determining a borrower's credit score.
  • the shortest path 210 may not be helpful to the applicant in (1) identifying flaws in his credit profile and (2) determining what actions would be necessary to improve his creditworthiness. Thus, if an applicant takes selective actions in “remedying” portions of his/her credit profile; those changes may not result in a score improvement that would meet the LENDER CRITERIA 600 . In other words, the borrower may not be able to recognize which variables are important, and which are just chaff.
  • the preferred method in the shortest path 210 includes an intermediate step that eliminates “low impact” fields (which are later omitted from the reason text generation 400 , and in turn, the adverse action letter 500 as shown earlier in FIG. 2 ).
  • the preferred method for eliminating “low impact” fields does not directly identify “low impact” fields. Rather, the focus is to find the “signals” that are important. And in order to find the signals that are important, the preferred method is to pick the variables which require the smallest transformation (i.e. the shortest path) from a given application to an application with a perfect score. A singular path may be chosen at random with signals then selected based on their relative impact. Alternatively, if multiple paths are available, then lists of variable are ranked by frequency, if possible.
  • Path-finding is a well-studied problem in machine learning in either a graph or a continuous domain, and there are many well-studied algorithms for finding optimal or near-optimal paths, including, without limitation: ant colony optimization, swarm-based optimization techniques, steepest and stochastic descent algorithms. In addition, there are many multidimensional optimization algorithms available, which has been a major area of study in computer science since the first computer was built. Other path finding algorithms may be used as well depending on suitability to the data set and/or desired outcome.
  • these path finding algorithms may be applied singularly, or in a hybrid approach, depending on whether the features of the LENDER CRITERIA and/or BORROWER DATA 100 are continuous and/or discrete.
  • a lender criterion might be discrete (e.g., Does the borrower have a job and a checking account?).
  • a borrower signal can also be discrete (e.g., is the borrower employed (yes/no)? Does the borrower have a bank account (yes/no)?).
  • a lender criterion can be continuous (weight the application negatively according to the average amount of ethanol consumed by the applicant each week).
  • the corresponding borrower signal would also be continuous (how many beers have you drunk in the last week? Glasses of wine? Mixed drinks/other distilled liquor products?)
  • the shortest path 210 may be further “filtered” whereby denials for seemingly spurious fields (such as the number of friends one has in social media), could be eliminated from the important field selection 200 list.
  • FIG. 4 provides a second perspective in illustrating the preferred method to find the shortest path 210 .
  • a comparison of known good application(s) 211 would be made against known bad application(s) 212 . From this comparison, a list of identical signals 213 and different signals 214 could be obtained. Thereafter, the incremental changes to the variables/fields that produce different signals 214 would be run against a series of selection tests 215 .
  • One test might determine if changes to individual variables, or sets of variables, result in a sufficiently improved credit score.
  • a second test may eliminate those fields, that when changed, does not result in substantial improvement—or any improvement—in the applicant's credit score.
  • a third test may include a manual filter whereby certain variables/fields are eliminated for administrative purposes.
  • a second preferred method to important field selection 200 may be achieved by finding the most important changes in a path to an adequate application (path to adequacy 220 ).
  • the path to adequacy 220 is likely to return numerous paths to fundability.
  • the preferred method for generating the path to adequacy 220 seeks the shortest paths from a given application to applications that have scores exceeding a specified threshold (where the threshold is no greater than the maximum possible value of the scoring function). The methods for doing so are similar to that found in the shortest path 210 , except that instead of comparing the borrower's profile to a perfect application, it is instead compared to a collection of accepted applicants.
  • the preferred method of the present invention is to identify a set of changes to the failing application when compared to previously collected approved applicants.
  • the preferred approach is probabilistic: taking random subsets of the set of exchanged fields, and measuring the resulting score change. In such instances, the preferred method is to use the score changes over all samples. The result turns out to be a rough weighting of the contribution of the individual fields to the final score change.
  • the third step is field ranking 300 .
  • the preferred approach for field ranking 300 will depend on whether important field selection 200 is accomplished by way of the shortest path method 210 or the path to adequacy 220 .
  • the shortest path method 210 is employed, ranking, although possible, is purely academic. Indeed, and if well specified, the truncation of the shortest path effectively creates an “all or nothing” result of a long list of fields. In other words, since all changes dictated by the shortest path are necessary to make the application fundable, there is no need to rank the important field selection 200 .
  • the preferred method would regulate the number of fields by ranking the fields so that higher-ranked fields contribute more to a passing score than lower-ranked ones.
  • the preferred ranking method would employ a voting strategy.
  • the computer performs many simultaneous searches for many paths to the specified threshold, and then the computer votes based on the number of paths a given field occurs in. Examples include, but are not limited to: membership in the greatest number of paths, changes that have the greatest impact, or some combination thereof. A complete enumeration of the methods is not possible. However, the preferred method will seek to have a meaningful correlation to signal impact, and avoids verging into an arbitrary ranking or scoring function, where possible. Notwithstanding, arbitrary ranking or scoring functions are an alternative method.
  • An alternate method to field ranking 300 is to estimate the “contribution” of each field in each path to the final score difference. As stated above, one method to do so is to take random samples of the fields for any given path and compute the score that arose from just using values in those fields, and take the average difference across all paths containing each field as an importance score (while ranking fields according to their importance).
  • the preferred method for identifying “contributions,” is either accomplished by using (1) a ranking by scoring methodology, or (2) through a genetic algorithm.
  • either electronic method can be used to more efficiently select the most regularly occurring sets of high-impact changes that could be made within a set of paths (or aggregated portions of paths) that result in credit approval.
  • the ranking by scoring method significantly reduces the number of searches for adequate paths (or portions thereof) that would lead to an acceptable credit score. Rather than using a purely random selection of variables, the ranking by scoring groups items into small sets to be evaluated tournament style. Thus, by limiting the number of sets that may be grouped, ranking by scoring effectively ranks a limited, yet decreasingly random population of paths, which is thereafter ranked.
  • a simple example may provide a helpful background: As shown in FIG. 5 a (single associated exchange score), occurs when the values of one set of deficient variables (ID 301 ), has their values replaced (exchange list 303 ) which results in a new, and preferably acceptable, resulting credit score (score 302 ).
  • ranking may be made by “ranking by scoring.”
  • ranking importance scores is accomplished by replacing the values in an initial set of variables (original selection 310 ) with a second set of values (revised ranking by scoring 311 ), and then by scoring the possible replacements. This process is would likely be given a limited universe (e.g., computer, please select 1,000 random sets of variables), then continue exchanging combinations of variables—tournament style—until the most potent changes are identified and ranked.
  • a genetic algorithm In the alternative to ranking by scoring, the use of a genetic algorithm may be employed. Genetic algorithms are a well-studied area of computational science that seeks to generate useful solutions to optimization and search problems. In the instant invention, a genetic algorithm would seek out the “pieces of the paths” that most frequently, and most effectively, produce an acceptable credit score.
  • a genetic algorithm uses the evolutionary processes of crossover and mutation to randomly assemble new offspring from an existing population of solutions.
  • the parent solutions are then “selected” to generate offspring in proportion to their fitness. The more fit, or better matched to the achieving a credit worthy score, an individual model is, the more often it will contribute its genetic information to subsequent generations.
  • a genetic algorithm would first engage in mutation (randomly identifying sets of variables and changing values within those sets of variables), “cross over” the sets of variables (i.e., find the most effective sets of variables and values to change), and then “select” a population of paths that are more impactful than others. This process would be iteratively repeated and optimized through “generations” of changes within the sets of variables to determine how effectively each set of changes lead to a passing credit score. During each successive generation, a proportion of the existing population is selected to breed a new generation. Individual solutions are selected through a fitness-based process, where fitter solutions (sets of changes that quantitatively produce greater changes in the credit score) are typically more likely to be selected.
  • mutation replaces the swap point 320 between one exchange list and another.
  • cross-over replaces an initial set of variables/values (original selection 310 ) and with a second set of variables/values (revised ranking by scoring 311 ) by mutating possible replacements amongst various possibilities.
  • mutation and/or cross-over operate to produce a number of different candidates, which are then ranked by their scores (highest to lowest), and then resampled with a weight according to each score.
  • Applicant C Applicant D Applicant E Age 61 35 37 Employment No, but . . . Yes Yes Checking account No Yes Yes Income $50,000 pension $35,000 $30,000 Distance 0 25 27
  • the most “important reasons” for each of the three applicants would first look for randomly selected sets of swaps. Each of those swaps would then be scored. By comparing each applicant to funded applications, the preferred method would generate a set of frequencies for each variable (or randomly selected set thereof). Using random substitution of values for each variable (or sets of variables) would take an inordinate period of time. Therefore, the preferred method could exchange values individually, or in blocks. This resulting set produces an ordering: application C needed a job and a checking account, application D would need to live closer to work, and application E would need a checking account and to live closer.
  • these ranking protocols fall into two categories: continuous parameters and discrete search space.
  • continuous parameters algorithms search parameters such as regression and Lyapunov functional reduction are particularly well suited.
  • discrete search space other suitable search space algorithms, such as pure random search, simulated annealing, and/or other genetic algorithms are better suited.
  • the preferred method is to gather Mr. B's BORROWER DATA as well as extract the subset of previous applications with scores fundability threshold.
  • the preferred method for important field selection 200 is to create an initial population of exemplars consisting of an index into that subset and a bit vector of the same length as the list of features for the LENDER CRITERIA 600 . Each exemplar will be scored by taking Mr. B's un-awarded loan and replacing the list items where the bit vector is 1 with the values from the indexed element of the subset.
  • the preferred method is to compute the score of Mr. B's modified list. This process will be iteratively repeated until an appropriate termination criterion has been reached (e.g., all paths to fundability have been identified or the method-defined maximum number of paths has been identified).
  • Mr. B is a simple and straightforward genetic algorithm, wherein the preferred method has found that the population converges to a set of exemplars that represent changes to fields/variable that produce significant improvements in Mr. B's creditworthiness (i.e. yielding an acceptable risk profile to issue a loan.).
  • the fourth and fifth steps are reason text generation 400 and generating an adverse action letter 500 .
  • reason text generation 400 involves recording a list of items with the largest possible weights.
  • Credit scoring systems often perform veracity checks with third-party data sources that supply information on the borrower. And if a borrower's profile is inconsistent with what is self-reported and/or has values outside the “norm” of other borrowers, those fields will be flagged, and often result in a deduction from the borrower's credit score. Thus, there is a strong probability that important errors will show up with high ranks. Since the values associated with those errors and the sources from which the erroneous signals were drawn will be listed, consumers will be able to recognize opportunities for significantly improving their scores by correcting errors in credit agency files or in their own application data.
  • adverse action letters 500 requires additional steps and procedures.
  • the creation of adverse action letters 500 may be resolved within the standard boundaries of well-studied machine learning paradigms.
  • the “filtered” field list would then be translated to associated qualitative entries. For example, a variable or meta-variable associated with “number of addresses” would have at least one text entry associated with it (so called “report classes”), such as “your residential address has changed many times in the past five years, indicating that your employment is unstable.”
  • Report classes are lender-defined, examples of which include messages that are prescriptive (“Establish and maintain a bank account for more than 2 years” or “Avoid overdrawing your checking account and try to schedule your essential payments so you aren't late with your bills”), descriptive (“Lexis-Nexis reports have multiple social security numbers associated with your name and address. That could be in error, and, if so, should be corrected,”), and/or monitory (“One or more of the fields in your application exhibits features highly correlated with fraud. You should look at items reported on your application and correct any errors therein.”).
  • the preferred method generates a labeled set of training exemplars which connect the weight pattern for a given application to the report class or classes with which the application is associated. Thereafter, the preferred embodiment could use standard classification techniques such as support vector machines, k means, learned vector quantization, or EM to build a labeling function.
  • standard classification techniques such as support vector machines, k means, learned vector quantization, or EM to build a labeling function.
  • any of the above-described processes and methods may be implemented by any now or hereafter known computing device.
  • the methods may be implemented in such a device via computer-readable instructions embodied in a computer-readable medium such as a computer memory, computer storage device or carrier signal.

Abstract

This invention relates generally to the personal finance and banking field, and more particularly to the field of lending and credit notification methods and systems. Preferred embodiments of the present invention provide systems and methods for automatically generating high quality adverse action notifications based on identifying variations between a declined borrower's profile and that of approved applicants, both with simple and sophisticated credit scoring systems, using specific algorithms.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims priority to U.S. Provisional Application, No. 61/545,496, entitled “METHODS AND SYSTEMS FOR AUTOMATICALLY GENERATING HIGH QUALITY ADVERSE ACTION NOTIFICATIONS” filed Jan. 31, 2013, which application is hereby incorporated in its entirety by reference. This application also relates to U.S. application Ser. No. 13/454,970, entitled “SYSTEM AND METHOD FOR PROVIDING CREDIT TO UNDERSERVED BORROWERS” filed Apr. 24, 2012, which application is also hereby incorporated in its entirety by reference.
  • TECHNICAL FIELD
  • This invention relates generally to the personal finance and banking field, and more particularly to the field of lending and credit notification methods and systems.
  • BACKGROUND AND SUMMARY
  • People use credit daily for purchases large and small. Lenders, such as banks and credit card companies, use “credit scores” to evaluate the potential risk posed by lending money. These measures purport to determine the likelihood that a person will pay his or her debts.
  • But credit scoring systems are a recent innovation. In the 1950's and 1960's, credit decisions were made by bank credit officials, who knew the applicant. Since applicants usually lived in the same town, credit officers would make subjective decisions based on their knowledge of the applicant. Then, in the 1970's, the advent of “FICO scores” made credit far more available, effectively removing the credit officer from the process. As the idea of using statistical computations to measure risk caught on, lenders began using a variety of other credit scoring methods and models. Examples include simple systems (such as those offered by Experian, Equifax, TransUnion) and advanced models with many traditional and non-traditional variables, and many thousands of meta-variables, such as those described by the Applicant in U.S. application Ser. No. 13/454,970 and its related continuations.
  • As a result of decreased physical interaction with lenders and increased computational complexity of calculating “creditworthiness,” consumers' visibility into what “drives” their credit scores diminished.
  • In response, laws such as the Consumer Credit Protection Act and Federal Equal Credit Opportunity Act, were designed, in part, to ensure that borrowers are not denied loans for discriminatory purposes. They were also designed, in part, to educate consumers as to the reasons why they were denied loans.
  • Federal and some state laws require lenders send “adverse action letters” to denied applicants explaining the reasons for those decisions. Theoretically, the letter should also allow an opportunity for the borrower to determine (1) if there is an error in his or her records which has led to the denial of credit; as well as (2) provide the borrower with information that helps identify which part(s) of his/her credit history is problematic.
  • But lenders engage in only minimal compliance, often providing generic reasons for their decisions. Unfortunately, these adverse action letters do very little to actually help consumers verify their credit history and/or determine which actions could increase their creditworthiness (at least, insofar as these mathematical models are concerned). This outcome is not beneficial from a lending policy standpoint as customers aren't getting what they need.
  • However, generating adverse actions letters that provide useful consumer feedback is not a straightforward task. Describing market factors as a reason for denials, in and of itself, is a complex job. But when compounded with the complexity of the newer mathematical credit scoring models, the job of effectively communicating the reasons is far more challenging. Indeed, pinpointing one or more variables—jointly or severally—that correlate to increased credit scores involves a complex analysis that few lenders, if any, would bother to perform, much less communicate to their consumers.
  • Accordingly, improved systems and methods for generating high quality adverse action letters would be desirable.
  • SUMMARY OF THE INVENTION
  • To improve upon existing systems, preferred embodiments of the present invention provide a system and method for automatically generating high quality adverse action notifications. One preferred method for automatically generating high quality adverse action notifications can include entering and/or importing a borrower dataset and a lender's credit criteria at a first computer (borrower data and lender criteria); processing the dataset variables and/or sets of variables in the lender's algorithms to identify which variables, when changed, result in an increased credit score (field selection); ranking individual variables and/or sets of variables in the borrower dataset to yield the greatest differences in a credit score (field ranking); and generating a report showing which variables and/or sets of variables, when changed, result in an acceptable credit score (reason test generation). As described below, the preferred method can further include formatting the reason set generation into an adverse action letter that is understandable and usable by the consumer (adverse action letter generation). Other variations, features, and aspects of the system and method of the preferred embodiment are described in detail below with reference to the appended drawings.
  • The present invention could be used independently (by simply generating adverse action letters) or in the alternative, the present invention could also be interfaced with, and used in conjunction with, a system and method for providing credit to borrowers. An example of such systems and methods is described in U.S. patent application Ser. No. 13/454,970, entitled “System and Method for Providing Credit to Underserved Borrowers, to Douglas Merrill et al, which is hereby incorporated by reference in its entirety (“Merrill Application”).
  • Other systems, methods, features and advantages of the invention will be or will become apparent to one with skill in the art upon examination of the following figures and detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the accompanying claims.
  • BRIEF DESCRIPTION OF THE FIGURES
  • In order to better appreciate how the above-recited and other advantages and objects of the inventions are obtained, a more particular description of the embodiments briefly described above will be rendered by reference to specific embodiments thereof, which are illustrated in the accompanying drawings. It should be noted that the components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention. Moreover, in the figures, like reference numerals designate corresponding parts throughout the different views. However, like parts do not always have like reference numerals. Moreover, all illustrations are intended to convey concepts, where relative sizes, shapes and other detailed attributes may be illustrated schematically rather than literally or precisely.
  • FIG. 1 is a diagram of a system for automatically generating high quality adverse action notifications in accordance with a preferred embodiment of the present invention.
  • FIG. 2 depicts an overall flowchart illustrating an exemplary embodiment of a method by which high quality adverse action notifications are automatically generated.
  • FIG. 3 depicts a flowchart illustrating an exemplary embodiment of a method for important field selection.
  • FIG. 4 depicts a flowchart illustrating an exemplary embodiment of a method for finding the path to adequacy.
  • FIG. 5 a depicts a flowchart illustrating an alternative exemplary embodiment short titled “swapping codes” as contained in the method for determining the path to adequacy.
  • FIG. 5 b depicts a flowchart illustrating an alternative exemplary embodiment short titled “selection by scoring” as contained in the method for determining the path to adequacy.
  • FIG. 5 c depicts a flowchart illustrating an alternative exemplary embodiment short titled “mutation” as contained in the method for determining the path to adequacy.
  • FIG. 5 d depicts a flowchart illustrating an alternative exemplary embodiment short titled “cross-over” as contained in the method for determining the path to adequacy.
  • DEFINITIONS
  • The following definitions are not intended to alter the plain and ordinary meaning of the terms below but are instead intended to aid the reader in explaining the inventive concepts below:
  • As used herein, the term “BORROWER DEVICE” shall generally refer to a desktop computer, laptop computer, notebook computer, tablet computer, mobile device such as a smart phone or personal digital assistant, smart TV, gaming console, streaming video player, or any other, suitable networking device having a web browser or stand-alone application configured to interface with and/or receive any or all data to/from the CENTRAL COMPUTER, USER DEVICE, and/or one or more components of the preferred system 10.
  • As used herein, the term “USER DEVICE” shall generally refer to a desktop computer, laptop computer, notebook computer, tablet computer, mobile device such as a smart phone or personal digital assistant, smart TV, gaming console, streaming video player, or any other, suitable networking device having a web browser or stand-alone application configured to interface with and/or receive any or all data to/from the CENTRAL COMPUTER, BORROWER DEVICE, and/or one or more components of the preferred system 10.
  • As used herein, the term “CENTRAL COMPUTER” shall generally refer to one or more sub-components or machines configured for receiving, manipulating, configuring, analyzing, synthesizing, communicating, and/or processing data associated with the borrower and lender. Any of the foregoing subcomponents or machines can optionally be integrated into a single operating unit, or distributed throughout multiple hardware entities through networked or cloud-based resources. Moreover, the central computer may be configured to interface with and/or receive any or all data to/from the USER DEVICE, BORROWER DEVICE, and/or one or more components of the preferred system 10 as shown in FIG. 1. The CENTRAL COMPUTER may also be the same device described in more detail in the Merrill Application, incorporated by reference in its entirety.
  • As used herein, the term “BORROWER'S DATA” shall generally refer to the borrower's data in his or her application for lending as entered into by the borrower, or on the borrower's behalf, in the BORROWER DEVICE, USER DEVICE, or CENTRAL COMPUTER. By way of example, this data may include traditional credit-related information such as the borrower's social security number, driver's license number, date of birth, or other information requested by a lender. This data may also include proprietary information acquired by payment of a fee through privately or governmentally owned data stores (including without limitation, through feeds, databases, or files containing data). Alternatively, this data may include public information available on the internet, for free or at a nominal cost, through one or more search strings, automated crawls, or scrapes using any suitable searching, crawling, or scraping process, program, or protocol. Moreover, borrower data could include information related to a borrower profile and/or any blogs, posts, tweets, links, friends, likes, connections, followers, followings, pins (collectively a borrower's social graph) on a social network. The list of foregoing examples is not exhaustive.
  • As used herein, the term “LENDER CRITERIA” shall generally refer to the criteria by which a lender decides to accept or reject an application for credit as periodically set in the USER DEVICE or CENTRAL COMPUTER. By way of example, these criteria may include accept or reject criterion based on individual data points in the BORROWER'S DATA (such as length of current residence>6 months), or based on complex mathematical models that determine the creditworthiness of a borrower.
  • As used herein, the term “NETWORK” shall generally refer to any suitable combination of the global Internet, a wide area network (WAN), a local area network (LAN), and/or a near field network, as well as any suitable networking software, firmware, hardware, routers, modems, cables, transceivers, antennas, and the like. Some or all of the components of the preferred system 10 can access the network through wired or wireless means, and using any suitable communication protocol/s, layers, addresses, types of media, application programming interface/s, and/or supporting communications hardware, firmware, and/or software.
  • As used herein and in the claims, the singular forms “a,” “an,” and “the” include plural references unless the context clearly dictates otherwise.
  • Unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art.
  • DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
  • The following description of the preferred embodiments of the invention is not intended to limit the invention to these preferred embodiments, but rather to enable any person skilled in the art to make and use this invention. Although any methods, materials, and devices similar or equivalent to those described herein can be used in the practice or testing of embodiments, the preferred methods, materials, and devices are now described.
  • The present invention relates to improved methods and systems for automatically generating high quality adverse action notifications, which includes notifications for individuals, and other types of entities including, but not limited to, corporations, companies, small businesses, and trusts, and any other recognized financial entity.
  • Prior to describing the preferred system and method, a frame of reference is in order: As many consumers know, a person's credit history is made up of a number of variables, such as the amount of debt the person is presently carrying, their income stability, their repayment history on past debt (lateness or failure to pay), and the length of their credit history. However, consumers do not often appreciate that modern credit scoring systems have significantly increased in sophistication, now containing many variables and meta-variables as well.
  • But credit applications are typically underwritten in a fairly stereotyped fashion. First, information is gathered from an applicant, generating an application. This application is supplemented with other data relevant to the application, including publicly available data (e.g. “Does the applicant have an active lien filed against him/her?”) or proprietary data (e.g. “How many credit applications has this person filed in the last 90 days?”) The resulting record is provided to a “scoring system,” which assigns a numerical score to the application. This score is compared to a threshold, and the applicant receives a loan if the score exceeds that threshold.
  • Given this process, the problem of determining the reasons for a declined application appears straightforward: simply go through the list of variables (also called “signals”) used in the scoring process, and find the ones which could make the score change towards the threshold. This appearance can be deceptive.
  • Modern scoring functions almost never produce monotone base signals. Even scoring systems that use monotone functions such as logistic regression to produce their final outputs use intermediate meta-variables that transform primary signals into distilled signals that are no longer monotone in the values of those primary signals. As a result, knowing that a small change in a given signal locally increases the application's score for a given application gives no assurance that a large change in the same signal will necessarily still increase the application's score. In addition, since a change in a single variable might not have the same effect as a change in several variables together, it would not necessarily be enough to look at one-variable perturbations when searching for “better results.”
  • Because detection of the underlying variables that drive an applicant's score has become exceedingly complex, in turn, intelligibly reporting the right reasons for deficiency in a person's score requires not only sophisticated analysis, but also a translation into understandable language. Indeed, it is because of this complexity that few lenders, if any, would bother to perform the analysis, much less communicate to their consumers. The preferred embodiment of the present invention solves this problem through an automated method and process for performing the analysis and intelligibly communicating the results, as further described below:
  • System
  • As shown in FIG. 1, a preferred operating environment for automatically generating high quality adverse action notifications in accordance with a preferred embodiment can generally include data sources (the borrower's application 13, and the lender's credit model 15), a USER DEVICE 30, a CENTRAL COMPUTER 20, a NETWORK 40, and one or more communication devices from which the borrower is issued an adverse action letter, including a BORROWER DEVICE 12, Email Server 30, and/or a Print Server 40. The preferred system 10 can include at least: data sources (the borrower's application 13, and the lender's credit model 15), and a computer to analyze and process the data sources (CENTRAL COMPUTER 20 and/or a USER DEVICE 30), which function to generate high quality adverse action notifications. To be clear, the borrower's application 13 should include one or more variables in the BORROWER DATA, and the lender's credit model 15 should include one or more algorithms from the LENDER'S CRITERIA. In particular, the preferred system 10 functions to helps borrowers determine the accuracy of his/her credit file as well as provide information to improve his/her creditworthiness, by accessing, evaluating, measuring, quantifying, and utilizing a the novel and unique methodology described below.
  • More specifically, this invention relates to the preferred methodology for automatically generating high quality adverse action notifications that takes place within the CENTRAL COMPUTER 20 and/or a USER DEVICE 30, after gathering and/or downloading the BORROWER'S DATA 13 and the LENDER CRITERIA 15.
  • Method
  • FIG. 2 provides a flowchart illustrating one preferred method for automatically generating high quality adverse action notifications which involves the following steps: (a) gathering the BORROWER DATA 100 for a failed credit application; (b) important field selection 200 (to compare BORROWER DATA against the LENDER CRITERIA 600); (c) field ranking 300; (d) reason text generation 400; and (e) generating adverse action letters 500.
  • In the first step, all data from the borrower's failed application (BORROWER DATA 100) is temporarily gathered for collection by a computer (such as the CENTRAL COMPUTER 20 in FIG. 1). For example, the BORROWER DATA 100 may include classic financial data such as the borrower's current salary, length of most recent employment, and the number of bankruptcies. Additionally, the BORROWER DATA 100 may include other unique aspects of the borrower, such as the number of organizations the borrower has been or is currently is involved with, the number of friends the borrower has, or other non-traditional aspects of the borrower's identity and history such those identified in the Merrill Application. Subsets of BORROWER DATA 100 are used to determine the borrower's credit score.
  • For illustrative purposes, fictitious BORROWER DATA 100 for Ms. “A” (a creditworthy applicant), Mr. “B” (a declined applicant), the average approved applicant, and the perfect applicant are shown below:
  • Perfect
    Variable Ms. “A” Mr. “B” Avg. Applicant Applicant
    Loan Requested $400 $7,500 $1,500 <$3,000
    Income $32K $65K $48K $100K
    Rent $800/mo $1,200/mo $1,000/mo $1,000/mo
    Address
    2 addresses in 7 addresses in 2 addresses in 5 1 addresses in 5
    Information 10 years past 5 years years years
    Late Payments 1 - gas bill. None <2 bills within None
    5 yrs.
    Social Security One (1) Four (4) One (1) One (1)
    Number registered SSN registered SSN registered SSN registered SSN
    Credit Score 82 75 >80 100
    (out of 100)
  • Referring back to FIG. 2, the second step is important field selection 200. Important field selection is the creation of a list of BORROWER DATA variables whose values either reduce or increase the application's credit score by sufficiently perceptible amounts when those variables are changed, and processed through the LENDER CRITERIA 600.
  • As shown in FIG. 3, important field selection 200 may be accomplished by determining the shortest path between the borrower's credit application and the “perfect application” (shortest path 210). Alternatively, important field selection 200 may be accomplished by finding the most important changes between the borrower's application and an “adequate application” that is approved for funding (path to adequacy 220). Both methods are discussed below:
  • Starting with the first method, the shortest path 210: as its name implies, the shortest path 210 is a protocol in which a list of all fields (variables) are identified where there is difference between the BORROWER DATA and the data of a “perfect” applicant. Given that a “perfect” application (one which receives the highest possible score) will always be funded, one way to build an explanation for why a different application was not approved is to find the set of differences between the unfunded application and the perfect application. Thus, as a preliminary step, the preferred method is to record a list of fields on which the two applications differ.
  • By way of example, we again refer to the fictitious credit applicant, Mr. “B” whose shortest path is as follows:
  • Variable Mr. “B” Perfect Applicant Difference
    Loan Requested $7,500 <$3,000 $4,500
    Income $65K $100K $35K
    Rent $1,200/mo $1,000/mo $200/mo
    Addresses 7 addresses 1 address 6 addresses
    SSN Four (4) One (1) 3 SSN
    Credit Score
    75 100 25
  • It is important to remember that BORROWER DATA 100 could include dozens variables or hundreds of thousands of meta-variables. And depending on the sophistication of the Lender's credit scoring system, some or most of those variables and meta-variables may not be used in determining a borrower's credit score. The shortest path 210, may not be helpful to the applicant in (1) identifying flaws in his credit profile and (2) determining what actions would be necessary to improve his creditworthiness. Thus, if an applicant takes selective actions in “remedying” portions of his/her credit profile; those changes may not result in a score improvement that would meet the LENDER CRITERIA 600. In other words, the borrower may not be able to recognize which variables are important, and which are just chaff.
  • As a result, the preferred method in the shortest path 210 includes an intermediate step that eliminates “low impact” fields (which are later omitted from the reason text generation 400, and in turn, the adverse action letter 500 as shown earlier in FIG. 2).
  • Contrary to logical conclusions, the preferred method for eliminating “low impact” fields does not directly identify “low impact” fields. Rather, the focus is to find the “signals” that are important. And in order to find the signals that are important, the preferred method is to pick the variables which require the smallest transformation (i.e. the shortest path) from a given application to an application with a perfect score. A singular path may be chosen at random with signals then selected based on their relative impact. Alternatively, if multiple paths are available, then lists of variable are ranked by frequency, if possible.
  • Path-finding is a well-studied problem in machine learning in either a graph or a continuous domain, and there are many well-studied algorithms for finding optimal or near-optimal paths, including, without limitation: ant colony optimization, swarm-based optimization techniques, steepest and stochastic descent algorithms. In addition, there are many multidimensional optimization algorithms available, which has been a major area of study in computer science since the first computer was built. Other path finding algorithms may be used as well depending on suitability to the data set and/or desired outcome. Thus, depending on the nature of the algorithms in the LENDER CRITERIA 600, these path finding algorithms may be applied singularly, or in a hybrid approach, depending on whether the features of the LENDER CRITERIA and/or BORROWER DATA 100 are continuous and/or discrete.
  • To illustrate the differences between continuous and discrete LENDER CRITERIA and/or BORROWER DATA 100, additional examples may be helpful. A lender criterion might be discrete (e.g., Does the borrower have a job and a checking account?). Similarly, a borrower signal can also be discrete (e.g., is the borrower employed (yes/no)? Does the borrower have a bank account (yes/no)?). Conversely, a lender criterion can be continuous (weight the application negatively according to the average amount of ethanol consumed by the applicant each week). And the corresponding borrower signal would also be continuous (how many beers have you drunk in the last week? Glasses of wine? Mixed drinks/other distilled liquor products?)
  • The shortest path 210 may be further “filtered” whereby denials for seemingly spurious fields (such as the number of friends one has in social media), could be eliminated from the important field selection 200 list.
  • FIG. 4 provides a second perspective in illustrating the preferred method to find the shortest path 210. In order to find the shortest path 210, a comparison of known good application(s) 211 would be made against known bad application(s) 212. From this comparison, a list of identical signals 213 and different signals 214 could be obtained. Thereafter, the incremental changes to the variables/fields that produce different signals 214 would be run against a series of selection tests 215. One test might determine if changes to individual variables, or sets of variables, result in a sufficiently improved credit score. A second test may eliminate those fields, that when changed, does not result in substantial improvement—or any improvement—in the applicant's credit score. A third test may include a manual filter whereby certain variables/fields are eliminated for administrative purposes.
  • Referring back to FIG. 3, a second preferred method to important field selection 200 may be achieved by finding the most important changes in a path to an adequate application (path to adequacy 220).
  • Unlike the shortest path method 210, which generally returns one path (or depending on the tests employed in determining the “perfect application,” a few paths), the path to adequacy 220 is likely to return numerous paths to fundability.
  • The preferred method for generating the path to adequacy 220 seeks the shortest paths from a given application to applications that have scores exceeding a specified threshold (where the threshold is no greater than the maximum possible value of the scoring function). The methods for doing so are similar to that found in the shortest path 210, except that instead of comparing the borrower's profile to a perfect application, it is instead compared to a collection of accepted applicants.
  • There are a lot more path(s) to adequacy 200 than path(s) to perfection. Unfortunately, the range of possible “acceptable” applications usually is not structured nicely. There are many subtle interactions among different signals in an application. This means that some set of signals is likely to occur. Often, however, there are so many sets of changes that it would be effectively impossible to examine each possibility to reach an acceptable application. Instead, the preferred method of the present invention is to identify a set of changes to the failing application when compared to previously collected approved applicants.
  • Depending on the sophistication of the LENDER CRITERIA, the number of subsets of the list of exchanged fields grows exponentially in the number of fields. It is impossible to enumerate all of them. Instead, the preferred approach is probabilistic: taking random subsets of the set of exchanged fields, and measuring the resulting score change. In such instances, the preferred method is to use the score changes over all samples. The result turns out to be a rough weighting of the contribution of the individual fields to the final score change.
  • By way of example, we again refer to the fictitious credit applicant, Mr. “B” whose path to adequacy is as follows:
  • Variable Mr. “B” Sample Applicant Difference
    Loan Requested $7,500 $1,500 $6,000
    Income $65K $48K N/A
    Rent $1,200/mo $1,000/mo $200/mo
    Addresses 7 addresses 2 addresses 5 addresses
    SSN Four (4) One (1) 3 SSN
    Credit Score
    75 100 25
  • Referring back to FIG. 2, the third step is field ranking 300. The preferred approach for field ranking 300 will depend on whether important field selection 200 is accomplished by way of the shortest path method 210 or the path to adequacy 220.
  • If the shortest path method 210 is employed, ranking, although possible, is purely academic. Indeed, and if well specified, the truncation of the shortest path effectively creates an “all or nothing” result of a long list of fields. In other words, since all changes dictated by the shortest path are necessary to make the application fundable, there is no need to rank the important field selection 200.
  • If the path to adequacy 220 is employed, the preferred method would regulate the number of fields by ranking the fields so that higher-ranked fields contribute more to a passing score than lower-ranked ones.
  • Because more than one shortest path to the threshold is likely to exist, the preferred ranking method would employ a voting strategy. In the preferred method, the computer performs many simultaneous searches for many paths to the specified threshold, and then the computer votes based on the number of paths a given field occurs in. Examples include, but are not limited to: membership in the greatest number of paths, changes that have the greatest impact, or some combination thereof. A complete enumeration of the methods is not possible. However, the preferred method will seek to have a meaningful correlation to signal impact, and avoids verging into an arbitrary ranking or scoring function, where possible. Notwithstanding, arbitrary ranking or scoring functions are an alternative method.
  • For example, assume that Mr. B's BORROWER DATA has 26 possible paths to adequacy 220. And within those lists, a “loan amount-to-income” meta-variable appears 21 times, the variable “social security numbers” appears in 16 times, and the variable “number of addresses” appears 4 times. Let's further assume that one of the protocols in the field ranking 300 says that fields that appear in at least 20% of the total paths (or 5 occurrences) should be reported. In this example, “loan amount-to-income” and “number of social security numbers” would be highest, and in this order.
  • An alternate method to field ranking 300 is to estimate the “contribution” of each field in each path to the final score difference. As stated above, one method to do so is to take random samples of the fields for any given path and compute the score that arose from just using values in those fields, and take the average difference across all paths containing each field as an importance score (while ranking fields according to their importance).
  • However, the preferred method for identifying “contributions,” (also known as creating “weighted importance scores”) is either accomplished by using (1) a ranking by scoring methodology, or (2) through a genetic algorithm.
  • In the instant invention, either electronic method can be used to more efficiently select the most regularly occurring sets of high-impact changes that could be made within a set of paths (or aggregated portions of paths) that result in credit approval.
  • The ranking by scoring method significantly reduces the number of searches for adequate paths (or portions thereof) that would lead to an acceptable credit score. Rather than using a purely random selection of variables, the ranking by scoring groups items into small sets to be evaluated tournament style. Thus, by limiting the number of sets that may be grouped, ranking by scoring effectively ranks a limited, yet decreasingly random population of paths, which is thereafter ranked.
  • A simple example may provide a helpful background: As shown in FIG. 5 a (single associated exchange score), occurs when the values of one set of deficient variables (ID 301), has their values replaced (exchange list 303) which results in a new, and preferably acceptable, resulting credit score (score 302).
  • As shown in FIG. 5 b, when multiple fields are deficient, ranking may be made by “ranking by scoring.” In essence, ranking importance scores is accomplished by replacing the values in an initial set of variables (original selection 310) with a second set of values (revised ranking by scoring 311), and then by scoring the possible replacements. This process is would likely be given a limited universe (e.g., computer, please select 1,000 random sets of variables), then continue exchanging combinations of variables—tournament style—until the most potent changes are identified and ranked.
  • In the alternative to ranking by scoring, the use of a genetic algorithm may be employed. Genetic algorithms are a well-studied area of computational science that seeks to generate useful solutions to optimization and search problems. In the instant invention, a genetic algorithm would seek out the “pieces of the paths” that most frequently, and most effectively, produce an acceptable credit score.
  • At its core, a genetic algorithm uses the evolutionary processes of crossover and mutation to randomly assemble new offspring from an existing population of solutions. The parent solutions are then “selected” to generate offspring in proportion to their fitness. The more fit, or better matched to the achieving a credit worthy score, an individual model is, the more often it will contribute its genetic information to subsequent generations.
  • In the present invention, a genetic algorithm would first engage in mutation (randomly identifying sets of variables and changing values within those sets of variables), “cross over” the sets of variables (i.e., find the most effective sets of variables and values to change), and then “select” a population of paths that are more impactful than others. This process would be iteratively repeated and optimized through “generations” of changes within the sets of variables to determine how effectively each set of changes lead to a passing credit score. During each successive generation, a proportion of the existing population is selected to breed a new generation. Individual solutions are selected through a fitness-based process, where fitter solutions (sets of changes that quantitatively produce greater changes in the credit score) are typically more likely to be selected.
  • The number of initially selected sets of variables, and generations which traditionally be limited (e.g., computer please pick 1,000 sets of variable or computer please limit your search to 100 generations) to limit processing times.
  • To illustrate the concept graphically, mutation is illustrated in FIG. 5 c. In essence, mutation replaces the swap point 320 between one exchange list and another.
  • As shown in FIG. 5 d, “cross-over” replaces an initial set of variables/values (original selection 310) and with a second set of variables/values (revised ranking by scoring 311) by mutating possible replacements amongst various possibilities.
  • Generally the average fitness will increase, since only the best solutions from the first generation are selected for breeding, along with a small proportion of less fit solutions. These less fit solutions ensure diversity within the population of parent solutions and therefore ensure the genetic diversity of the subsequent generation of children.
  • In other words, mutation and/or cross-over operate to produce a number of different candidates, which are then ranked by their scores (highest to lowest), and then resampled with a weight according to each score.
  • An example may be helpful to further explain mutation and cross-over. Consider a system with five input signals: age, employment status, bank account status, income, and distance between home and work. The LENDER CRITERIA specifies that only applicants with employment and checking accounts are accepted. Moreover, the LENDER CRITERIA will result in a rejection if the applicant earns less than $40,000 per year and/or the applicant lives more than twenty miles from the applicant's place of employment. Age is completely ignored. Three hypothetical rejected applicants could have the following data:
  • Applicant C Applicant D Applicant E
    Age 61 35 37
    Employment No, but . . . Yes Yes
    Checking account No Yes Yes
    Income $50,000 pension $35,000 $30,000
    Distance  0 25 27
  • In the preferred method, the most “important reasons” for each of the three applicants (C, D, and E) would first look for randomly selected sets of swaps. Each of those swaps would then be scored. By comparing each applicant to funded applications, the preferred method would generate a set of frequencies for each variable (or randomly selected set thereof). Using random substitution of values for each variable (or sets of variables) would take an inordinate period of time. Therefore, the preferred method could exchange values individually, or in blocks. This resulting set produces an ordering: application C needed a job and a checking account, application D would need to live closer to work, and application E would need a checking account and to live closer.
  • On a broader note, these ranking protocols fall into two categories: continuous parameters and discrete search space. For continuous parameters, algorithms search parameters such as regression and Lyapunov functional reduction are particularly well suited. However, for discrete search space, other suitable search space algorithms, such as pure random search, simulated annealing, and/or other genetic algorithms are better suited.
  • To recap and further illustrate a practical example of the first three steps in FIG. 2 (Gathering BORROWER DATA 100, performing important field selection 200 by comparing to the LENDER CRITERIA 600, and Field Ranking 300), let's take the example of Mr. B and compare (1) his scored application which did not meet the threshold of fundability to (2) other applications previously scored that were fundable.
  • First, the preferred method is to gather Mr. B's BORROWER DATA as well as extract the subset of previous applications with scores fundability threshold. Next, and assuming the Important Field selection is accomplished by the path to adequacy 220, the preferred method for important field selection 200 is to create an initial population of exemplars consisting of an index into that subset and a bit vector of the same length as the list of features for the LENDER CRITERIA 600. Each exemplar will be scored by taking Mr. B's un-awarded loan and replacing the list items where the bit vector is 1 with the values from the indexed element of the subset. Finally, the preferred method is to compute the score of Mr. B's modified list. This process will be iteratively repeated until an appropriate termination criterion has been reached (e.g., all paths to fundability have been identified or the method-defined maximum number of paths has been identified).
  • Thereafter, all of the important field selection 200 entries will be field ranked 300. In this step, a new set of exemplars is randomly selected and weighting according the score. Mr. B's important field selection 200 entries are “mutated” to create a subset of those exemplars by either replacing the index of the associated above-threshold loan or by randomly flipping some number of bits in the bit string. Thereafter, Mr. B's “mutated” important field selection 200 entries are “crossed over.” Here, “cross-over” is accomplished by taking a subset of the exemplars by picking pairs of items, and, for each such pair, selecting a single point in the exemplar's bit string, and exchanging the contents of the bit strings beyond that point. The process is repeated until all possible paths to adequacy are ranked and/or voted according to “contribution” of each field has been computed, and sorted from most influential to least influential.
  • It should be noted that the example of Mr. B is a simple and straightforward genetic algorithm, wherein the preferred method has found that the population converges to a set of exemplars that represent changes to fields/variable that produce significant improvements in Mr. B's creditworthiness (i.e. yielding an acceptable risk profile to issue a loan.).
  • Referring back to FIG. 2, the fourth and fifth steps are reason text generation 400 and generating an adverse action letter 500.
  • There are two aspects of reporting the results of the search. First is reporting the variables that are likely to be wrong (reason text generation 400). Second, reporting the reasons for the adverse action (adverse action letter 500). These are not the same, and solving each requires different mechanisms.
  • Reporting the variables that are likely to be wrong (reason text generation 400) is straightforward, given the weighted contributions computed in the previous section. The preferred method for reason text generation 400 involves recording a list of items with the largest possible weights.
  • Credit scoring systems often perform veracity checks with third-party data sources that supply information on the borrower. And if a borrower's profile is inconsistent with what is self-reported and/or has values outside the “norm” of other borrowers, those fields will be flagged, and often result in a deduction from the borrower's credit score. Thus, there is a strong probability that important errors will show up with high ranks. Since the values associated with those errors and the sources from which the erroneous signals were drawn will be listed, consumers will be able to recognize opportunities for significantly improving their scores by correcting errors in credit agency files or in their own application data.
  • At the end of the search and ranking steps, we have one or more “recipes” for transforming a below-threshold loan into an above-threshold one. Unfortunately, the contents of those recipes are not ready to present to an applicant, as they simply are information of the form “this signal might be associated with a change in the score for your application.”
  • Thus, reporting the intelligible reasons for the adverse action letters 500 requires additional steps and procedures. The creation of adverse action letters 500 may be resolved within the standard boundaries of well-studied machine learning paradigms. In essence, the “filtered” field list would then be translated to associated qualitative entries. For example, a variable or meta-variable associated with “number of addresses” would have at least one text entry associated with it (so called “report classes”), such as “your residential address has changed many times in the past five years, indicating that your employment is unstable.”
  • Report classes are lender-defined, examples of which include messages that are prescriptive (“Establish and maintain a bank account for more than 2 years” or “Avoid overdrawing your checking account and try to schedule your essential payments so you aren't late with your bills”), descriptive (“Lexis-Nexis reports have multiple social security numbers associated with your name and address. That could be in error, and, if so, should be corrected,”), and/or monitory (“One or more of the fields in your application exhibits features highly correlated with fraud. You should look at items reported on your application and correct any errors therein.”).
  • The preferred method generates a labeled set of training exemplars which connect the weight pattern for a given application to the report class or classes with which the application is associated. Thereafter, the preferred embodiment could use standard classification techniques such as support vector machines, k means, learned vector quantization, or EM to build a labeling function.
  • Any of the above-described processes and methods may be implemented by any now or hereafter known computing device. For example, the methods may be implemented in such a device via computer-readable instructions embodied in a computer-readable medium such as a computer memory, computer storage device or carrier signal.
  • The preceding described embodiments of the invention are provided as illustrations and descriptions. They are not intended to limit the invention to precise form described. In particular, it is contemplated that functional implementation of invention described herein may be implemented equivalently in hardware, software, firmware, and/or other available functional components or building blocks, and that networks may be wired, wireless, or a combination of wired and wireless. Other variations and embodiments are possible in light of above teachings, and it is thus intended that the scope of invention not be limited by this Detailed Description, but rather by Claims following.

Claims (5)

What is claimed is:
1. A central computer server communicatively coupled to a public network, the central computer server having a non-transitory computer-usable medium with a sequence of instructions which, when executed by a processor, causes said processor to execute an electronic process that automatically generates high quality adverse action notifications, said process comprising:
collecting an electronic dataset for a borrower which contains a credit score and a plurality of variables and meta-variables that describe specific aspects of the borrower to generate a borrower profile;
independently and collectively processing the plurality of variables and meta-variables in the borrower dataset against a lender's criteria for creditworthiness;
identifying sets of variables and meta-variables in the borrower profile that, when changed, result in an improved measure of creditworthiness, wherein the identifying step includes analyzing at least one shortest path between the borrower dataset and the dataset of at least one of: (i) a perfect applicant and (ii) an average approved applicant; and
generating a report that interprets the at least one shortest path, and variables and meta-variables therein, into plain language through which the borrower may understand how to improve the borrower's credit score.
2. The central computer server of claim 1, wherein the lender's criteria for creditworthiness is measured by a credit score.
3. The central computer server of claim 1, wherein the process further includes ranking the identified sets of variables and meta-variables in the borrower profile that, when changed, result in an improved credit score, said ranking using at least one of the following steps:
voting strategy; and
calculating a weighted contribution of relevant fields in the at least one shortest path that meets or exceeds the lender criteria.
4. The central computer server of claim 3, wherein the process further comprises calculating the weighted contribution of each relevant field in each of the at least one shortest path to a final score difference, wherein the calculating step includes at least one of:
randomly sampling;
ranking by scoring; and
genetic algorithm.
5. The central computer server of claim 4, wherein the step of generating a report that interprets the at least one shortest path, and variables and meta-variables therein, into plain language through which the borrower may understand how to improve the borrower's credit score, includes at least one of the following steps:
recording weighted contributions;
translating the values of one or more variables and meta-variables that comprise the weighted contributions into qualitative text strings;
generating a labeled set of training exemplars that connect a weight pattern for a given application to report classes of variables and meta-variables with which the application is associated; and
generating reports that are issued to the borrower from the labeled set of training exemplars.
US14/169,400 2013-01-31 2014-01-31 Methods and systems for automatically generating high quality adverse action notifications Abandoned US20140214648A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US14/169,400 US20140214648A1 (en) 2013-01-31 2014-01-31 Methods and systems for automatically generating high quality adverse action notifications
US14/954,825 US20160155193A1 (en) 2013-01-31 2015-11-30 Methods and systems for automatically generating high quality adverse action notifications
US16/109,545 US20180365765A1 (en) 2013-01-31 2018-08-22 Adverse action systems and methods for communicating adverse action notifications for processing systems using different ensemble modules

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201361759081P 2013-01-31 2013-01-31
US14/169,400 US20140214648A1 (en) 2013-01-31 2014-01-31 Methods and systems for automatically generating high quality adverse action notifications

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/954,825 Continuation US20160155193A1 (en) 2013-01-31 2015-11-30 Methods and systems for automatically generating high quality adverse action notifications

Publications (1)

Publication Number Publication Date
US20140214648A1 true US20140214648A1 (en) 2014-07-31

Family

ID=51224029

Family Applications (3)

Application Number Title Priority Date Filing Date
US14/169,400 Abandoned US20140214648A1 (en) 2013-01-31 2014-01-31 Methods and systems for automatically generating high quality adverse action notifications
US14/954,825 Abandoned US20160155193A1 (en) 2013-01-31 2015-11-30 Methods and systems for automatically generating high quality adverse action notifications
US16/109,545 Pending US20180365765A1 (en) 2013-01-31 2018-08-22 Adverse action systems and methods for communicating adverse action notifications for processing systems using different ensemble modules

Family Applications After (2)

Application Number Title Priority Date Filing Date
US14/954,825 Abandoned US20160155193A1 (en) 2013-01-31 2015-11-30 Methods and systems for automatically generating high quality adverse action notifications
US16/109,545 Pending US20180365765A1 (en) 2013-01-31 2018-08-22 Adverse action systems and methods for communicating adverse action notifications for processing systems using different ensemble modules

Country Status (3)

Country Link
US (3) US20140214648A1 (en)
CN (1) CN105308640A (en)
WO (1) WO2014121019A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017041527A1 (en) * 2015-09-09 2017-03-16 腾讯科技(深圳)有限公司 Information processing method, terminal and server, and computer storage medium
JP2017054495A (en) * 2015-09-12 2017-03-16 スルガ銀行株式会社 Preliminary credit frame and recommendation credit frame calculation device
WO2020077837A1 (en) * 2018-10-16 2020-04-23 深圳壹账通智能科技有限公司 Service data accounting method, apparatus and device, and computer-readable storage medium
US11257152B2 (en) 2020-04-13 2022-02-22 Alipay (Hangzhou) Information Technology Co., Ltd. Method and system for optimizing allocation of borrowing requests
US11475515B1 (en) * 2019-10-11 2022-10-18 Wells Fargo Bank, N.A. Adverse action methodology for credit risk models
US11682074B2 (en) 2018-04-13 2023-06-20 Gds Link Llc Decision-making system and method based on supervised learning

Families Citing this family (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10176491B2 (en) 2013-03-13 2019-01-08 Eversight, Inc. Highly scalable internet-based randomized experiment methods and apparatus for obtaining insights from test promotion results
WO2014160163A1 (en) * 2013-03-13 2014-10-02 Precipio, Inc. Architecture and methods for promotion optimization
US11270325B2 (en) 2013-03-13 2022-03-08 Eversight, Inc. Systems and methods for collaborative offer generation
US10636052B2 (en) 2013-03-13 2020-04-28 Eversight, Inc. Automatic mass scale online promotion testing
US11138628B2 (en) 2013-03-13 2021-10-05 Eversight, Inc. Promotion offer language and methods thereof
US11288696B2 (en) 2013-03-13 2022-03-29 Eversight, Inc. Systems and methods for efficient promotion experimentation for load to card
US10140629B2 (en) * 2013-03-13 2018-11-27 Eversight, Inc. Automated behavioral economics patterns in promotion testing and methods therefor
US10991001B2 (en) 2013-03-13 2021-04-27 Eversight, Inc. Systems and methods for intelligent promotion design with promotion scoring
US11068929B2 (en) 2013-03-13 2021-07-20 Eversight, Inc. Highly scalable internet-based controlled experiment methods and apparatus for obtaining insights from test promotion results
US10438230B2 (en) * 2013-03-13 2019-10-08 Eversight, Inc. Adaptive experimentation and optimization in automated promotional testing
US11288698B2 (en) 2013-03-13 2022-03-29 Eversight, Inc. Architecture and methods for generating intelligent offers with dynamic base prices
US10438231B2 (en) * 2013-03-13 2019-10-08 Eversight, Inc. Automatic offer generation using concept generator apparatus and methods therefor
US10915912B2 (en) 2013-03-13 2021-02-09 Eversight, Inc. Systems and methods for price testing and optimization in brick and mortar retailers
US10846736B2 (en) 2013-03-13 2020-11-24 Eversight, Inc. Linkage to reduce errors in online promotion testing
US10984441B2 (en) 2013-03-13 2021-04-20 Eversight, Inc. Systems and methods for intelligent promotion design with promotion selection
US10445763B2 (en) * 2013-03-13 2019-10-15 Eversight, Inc. Automated promotion forecasting and methods therefor
US9940639B2 (en) * 2013-03-13 2018-04-10 Eversight, Inc. Automated and optimal promotional experimental test designs incorporating constraints
US10706438B2 (en) 2013-03-13 2020-07-07 Eversight, Inc. Systems and methods for generating and recommending promotions in a design matrix
US10909561B2 (en) 2013-03-13 2021-02-02 Eversight, Inc. Systems and methods for democratized coupon redemption
US10789609B2 (en) 2013-03-13 2020-09-29 Eversight, Inc. Systems and methods for automated promotion to profile matching
US9940640B2 (en) * 2013-03-13 2018-04-10 Eversight, Inc. Automated event correlation to improve promotional testing
US10127240B2 (en) 2014-10-17 2018-11-13 Zestfinance, Inc. API for implementing scoring functions
US10460339B2 (en) 2015-03-03 2019-10-29 Eversight, Inc. Highly scalable internet-based parallel experiment methods and apparatus for obtaining insights from test promotion results
US9720953B2 (en) 2015-07-01 2017-08-01 Zestfinance, Inc. Systems and methods for type coercion
US11941659B2 (en) 2017-05-16 2024-03-26 Maplebear Inc. Systems and methods for intelligent promotion design with promotion scoring
CN109308660B (en) * 2017-07-27 2023-03-10 财付通支付科技有限公司 Credit assessment scoring model evaluation method, apparatus, device and storage medium
US11941650B2 (en) 2017-08-02 2024-03-26 Zestfinance, Inc. Explainable machine learning financial credit approval model for protected classes of borrowers
US11847574B2 (en) 2018-05-04 2023-12-19 Zestfinance, Inc. Systems and methods for enriching modeling tools and infrastructure with semantics
US11537934B2 (en) 2018-09-20 2022-12-27 Bluestem Brands, Inc. Systems and methods for improving the interpretability and transparency of machine learning models
US11429976B1 (en) 2019-01-31 2022-08-30 Wells Fargo Bank, N.A. Customer as banker system for ease of banking
US11816541B2 (en) 2019-02-15 2023-11-14 Zestfinance, Inc. Systems and methods for decomposition of differentiable and non-differentiable models
JP7276757B2 (en) 2019-03-18 2023-05-18 ゼストファイナンス,インコーポレーテッド Systems and methods for model fairness
CN113128544A (en) * 2020-01-15 2021-07-16 富士通株式会社 Method and device for training artificial intelligence model
US11720962B2 (en) 2020-11-24 2023-08-08 Zestfinance, Inc. Systems and methods for generating gradient-boosted models with improved fairness

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030046223A1 (en) * 2001-02-22 2003-03-06 Stuart Crawford Method and apparatus for explaining credit scores
US20030101080A1 (en) * 2001-11-28 2003-05-29 Zizzamia Frank M. Method and system for determining the importance of individual variables in a statistical model
US20070106550A1 (en) * 2005-11-04 2007-05-10 Andris Umblijs Modeling marketing data
US20070112668A1 (en) * 2005-11-12 2007-05-17 Matt Celano Method and apparatus for a consumer interactive credit report analysis and score reconciliation adaptive education and counseling system
US7280980B1 (en) * 2000-08-01 2007-10-09 Fair Isaac Corporation Algorithm for explaining credit scores
US7711635B2 (en) * 2001-02-22 2010-05-04 Fair Isaac Corporation System and method for helping consumers understand and interpret credit scores

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5222192A (en) * 1988-02-17 1993-06-22 The Rowland Institute For Science, Inc. Optimization techniques using genetic algorithms
US6941287B1 (en) * 1999-04-30 2005-09-06 E. I. Du Pont De Nemours And Company Distributed hierarchical evolutionary modeling and visualization of empirical data
US20040199456A1 (en) * 2000-08-01 2004-10-07 Andrew Flint Method and apparatus for explaining credit scores
US7610229B1 (en) * 2002-05-30 2009-10-27 Experian Information Solutions, Inc. System and method for interactively simulating a credit-worthiness score
CN1890686A (en) * 2003-09-24 2007-01-03 鲁特宛有限公司 System and method for efficiently processing multiple credit applications
US20080154809A1 (en) * 2006-10-20 2008-06-26 Genalytics, Inc. Use and construction of categorical interactions using a rule gene in a predictive model
US8515842B2 (en) * 2010-09-14 2013-08-20 Evolution Finance, Inc. Systems and methods for monitoring and optimizing credit scores
JP5099202B2 (en) * 2010-09-30 2012-12-19 ブラザー工業株式会社 Developing device, process unit, and image forming apparatus

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7280980B1 (en) * 2000-08-01 2007-10-09 Fair Isaac Corporation Algorithm for explaining credit scores
US20030046223A1 (en) * 2001-02-22 2003-03-06 Stuart Crawford Method and apparatus for explaining credit scores
US7711635B2 (en) * 2001-02-22 2010-05-04 Fair Isaac Corporation System and method for helping consumers understand and interpret credit scores
US20030101080A1 (en) * 2001-11-28 2003-05-29 Zizzamia Frank M. Method and system for determining the importance of individual variables in a statistical model
US20070106550A1 (en) * 2005-11-04 2007-05-10 Andris Umblijs Modeling marketing data
US20070112668A1 (en) * 2005-11-12 2007-05-17 Matt Celano Method and apparatus for a consumer interactive credit report analysis and score reconciliation adaptive education and counseling system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017041527A1 (en) * 2015-09-09 2017-03-16 腾讯科技(深圳)有限公司 Information processing method, terminal and server, and computer storage medium
JP2017054495A (en) * 2015-09-12 2017-03-16 スルガ銀行株式会社 Preliminary credit frame and recommendation credit frame calculation device
US11682074B2 (en) 2018-04-13 2023-06-20 Gds Link Llc Decision-making system and method based on supervised learning
WO2020077837A1 (en) * 2018-10-16 2020-04-23 深圳壹账通智能科技有限公司 Service data accounting method, apparatus and device, and computer-readable storage medium
US11475515B1 (en) * 2019-10-11 2022-10-18 Wells Fargo Bank, N.A. Adverse action methodology for credit risk models
US11257152B2 (en) 2020-04-13 2022-02-22 Alipay (Hangzhou) Information Technology Co., Ltd. Method and system for optimizing allocation of borrowing requests

Also Published As

Publication number Publication date
US20160155193A1 (en) 2016-06-02
US20180365765A1 (en) 2018-12-20
CN105308640A (en) 2016-02-03
WO2014121019A1 (en) 2014-08-07

Similar Documents

Publication Publication Date Title
US20180365765A1 (en) Adverse action systems and methods for communicating adverse action notifications for processing systems using different ensemble modules
US20200210899A1 (en) Machine learning model training method and device, and electronic device
US20220122171A1 (en) Client server system for financial scoring with cash transactions
US20180260891A1 (en) Systems and methods for generating and using optimized ensemble models
CA2828751A1 (en) System and method for suspect entity detection and mitigation
AU2019101189A4 (en) A financial mining method for credit prediction
CN110930218A (en) Method and device for identifying fraudulent customer and electronic equipment
US20230124948A1 (en) Ai-based vehicle transaction support system and method for use therewith
CN111639690A (en) Fraud analysis method, system, medium, and apparatus based on relational graph learning
Eddy et al. Credit scoring models: Techniques and issues
Costea Applying fuzzy logic and machine learning techniques in financial performance predictions
Davis et al. Explainable machine learning models of consumer credit risk
WO2019194696A1 (en) Automated system for creating and managing scoring models
US20220164374A1 (en) Method of scoring and valuing data for exchange
Tunç Feature selection in credibility study for finance sector
Spiess Machine learning explainability & fairness: Insights from consumer lending
Yazdani Developing a model for validation and prediction of bank customer credit using information technology (case study of Dey Bank)
Fernández et al. Predicting going concern opinion for hotel industry using classifiers combination.
US20220237520A1 (en) Method of machine learning training for data augmentation
Olofsson A machine learning ensemble approach to churn prediction: Developing and comparing local explanation models on top of a black-box classifier
Gubin et al. The most important variables for credit risk model
Parvin et al. A machine learning-based credit lending eligibility prediction and suitable bank recommendation: an Android app for entrepreneurs
Zurada Rule Induction Methods for Credit Scoring
Lai Credit Default Analysis and Prediction Based on Machine Learning
Caplescu et al. Improvements in PD models. A case-study approach

Legal Events

Date Code Title Description
AS Assignment

Owner name: ZESTFINANCE, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MERRILL, JOHN W.L.;BUDDE, SHAWN M.;CANDIDO, JOHN B., III;AND OTHERS;SIGNING DATES FROM 20140225 TO 20140423;REEL/FRAME:032741/0525

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION