Institution
Visa Inc.
Company•London, United Kingdom•
About: Visa Inc. is a company organization based out in London, United Kingdom. It is known for research contribution in the topics: Database transaction & Transaction data. The organization has 1031 authors who have published 1076 publications receiving 36053 citations. The organization is also known as: Visa & Visa Inc.
Papers published on a yearly basis
Papers
More filters
•
[...]
TL;DR: The change in user accounts can include transfers of a user account or user account identifier from one user account issuer to another user account account issuer as discussed by the authors, which can be initiated by a user or issuer associated with the user account.
Abstract: Server computers and methods for updating or changing user alert message settings when changes are made to one or more user accounts are disclosed. The change in the user accounts can include transfers of a user account or user account identifier from one user account issuer to another user account issuer. The change in user accounts can be initiated by a user or issuer associated with the user account. When changes are made to the user accounts or changes are made to the user alert message settings, the server computer can confirm the changes with the user or issuer associated with the user accounts that are changed.
5 citations
•
21 Dec 2017TL;DR: In this article, a system for generating a master token to be associated with a set of tokens is described, where the master token is used to complete a transaction, and an authorization request may be received by the primary authorization computer that includes the master tokens.
Abstract: Described herein is a system for generating a master token to be associated with a set of tokens. In some embodiments, a number of tokens may be obtained by a communication device, which may be provided to a primary authorization computer. The primary authorization computer may generate a master token to be associated with each of those tokens. When the master token is used to complete a transaction, an authorization request may be received by the primary authorization computer that includes the master token. Upon receiving this, the primary authorization computer may obtain approval from a number of secondary authorization computers associated with the tokens, and may generate an authorization response based on those approvals.
5 citations
•
04 Jan 2017TL;DR: In this article, a front-end computer executing a first version of a software can receive a request message from a requesting computer, generate a request payload using the request message, transmit the request payload to a processor computer, receive a response payload from the processor computer and generate a reply message using the response payload, and provide, to a validation computer that is executing a second version of the software, the request messages, request payload, the requested payload and response payload.
Abstract: Embodiments of the invention are directed to techniques for redirecting data streams from a production environment to validate non-production software code. In some embodiments, a front-end computer executing a first version of software can receive a request message from a requesting computer, generate a request payload using the request message, transmit the request payload to a processor computer, receive a response payload from the processor computer, generate a reply message using the response payload, and provide, to a validation computer that is executing a second version of the software, the request message, the request payload, and the response payload. The validation computer can generate a modified request payload using the request message and a modified reply message using the response payload. To detect potential errors in the second version, the modified request payload is compared with the request payload and the modified reply message is compare with the reply message.
5 citations
•
20 Jul 2009TL;DR: In this article, a system, method and server for pushing advanced warning alerts to account issuers based on consumer data element level triggering events and fraud and unauthorized use reports is disclosed.
Abstract: The present invention is directed to a system, method and server to assist account issuers in managing risk, fraud and unauthorized use. A system, method and server for use in pushing advanced warning alerts to issuers based on consumer data element level triggering events and fraud and unauthorized use reports is disclosed. The ability to the push the alerts to issuers with a permissible purpose for receiving the information in the alerts provides a real-time, online and cost effective way of providing issuers with valuable risk management tools.
5 citations
•
14 Jul 2017TL;DR: In this article, a user may initiate a transaction that causes a resource provider computer to transmit an authentication request message to a directory server computer for authentication, and if authentication is successful, the token may be included in an authentication response message transmitted by the directory server computers to the resource provider computers.
Abstract: Systems and methods of the invention are directed to provisioning a token by a secure authentication system. A user may initiate a transaction that causes a resource provider computer to transmit an authentication request message to a directory server computer. The directory server computer may transmit the authentication request message to an access control server computer for authentication. Subsequent to receiving the authentication request message, the directory server computer may request a token for the transaction from a token provider computer. If authentication is successful, the token may be included in an authentication response message transmitted by the directory server computer to the resource provider computer. The token may then be utilized by the resource provider computer in lieu of sensitive user information for any suitable purpose. In some embodiments, user-specific-data provided by the access control server computer may be included in the authentication response message.
5 citations
Authors
Showing all 1032 results
Name | H-index | Papers | Citations |
---|---|---|---|
Ayman Hammad | 43 | 115 | 6489 |
Mark Carlson | 42 | 114 | 5417 |
Patrick Faith | 39 | 101 | 5800 |
Selim Aissi | 31 | 87 | 2974 |
Lisa J. Anderson | 31 | 72 | 6418 |
Payman Mohassel | 28 | 105 | 3784 |
Kevin P. Siegel | 28 | 39 | 3496 |
Patrick Stan | 25 | 42 | 1915 |
Gyan Prakash | 25 | 133 | 2053 |
Konstantinos Markantonakis | 24 | 208 | 2697 |
Glenn Powell | 23 | 31 | 1834 |
Leigh Amaro | 23 | 23 | 2331 |
John F. Sheets | 21 | 41 | 1968 |
Edward W. Fordyce | 20 | 23 | 2222 |
Krishna Prasad Koganti | 19 | 23 | 1284 |