Institution
Visa Inc.
Company•London, United Kingdom•
About: Visa Inc. is a company organization based out in London, United Kingdom. It is known for research contribution in the topics: Database transaction & Transaction data. The organization has 1031 authors who have published 1076 publications receiving 36053 citations. The organization is also known as: Visa & Visa Inc.
Papers published on a yearly basis
Papers
More filters
•
27 Sep 2012TL;DR: An identity chaining fraud detection method that allows each current transaction to be linked to other transactions through commonly shared identities is presented in this paper, where the links create a chain of associated transactions which can be analyzed to determine if identity variances occur, which indicates that fraud is detected.
Abstract: An identity chaining fraud detection method that allows each current transaction to be linked to other transactions through commonly shared identities. Over a period of time the links create a chain of associated transactions which can be analyzed to determine if identity variances occur, which indicates that fraud is detected. Additionally, if a specific identity is detected as being fraudulent, that identity can be tagged as fraudulent and can be referenced by a plurality of other merchant transaction chains to determine fraud.
5 citations
•
25 Oct 2018TL;DR: In this article, a system can identify a corresponding string stored in memory based on an incomplete input string by analyzing phonetic and distance metrics for a plurality of strings stored in the memory.
Abstract: Systems, apparatuses, and methods are provided for identifying a corresponding string stored in memory based on an incomplete input string A system can analyze and produce phonetic and distance metrics for a plurality of strings stored in memory by comparing the plurality of strings to an incomplete input string These similarity metrics can be used as the input to a machine learning model, which can quickly and accurately provide a classification This classification can be used to identify a string stored in memory that corresponds to the incomplete input string
5 citations
•
07 Jan 2016TL;DR: In this paper, a cryptographic label is provided for enabling a mobile communications device to perform secure communications, which comprises a flexible printed circuit having a first set of electrical contacts disposed on a top side of the circuit for interfacing to a mobile communication device, a second set of contacts disposed at the bottom side of a circuit to attach the label to a communication card, and a hardware security module disposed in the circuit and coupled to the first and second sets of contacts.
Abstract: A cryptographic label is provided for enabling a mobile communications device to perform secure communications. The label comprises a flexible printed circuit having a first set of electrical contacts disposed on a top side of the circuit for interfacing to a mobile communications device, a second set of electrical contacts disposed on a bottom side of the circuit for interfacing to a communication card, and a hardware security module disposed in the circuit and coupled to the first and second sets of electrical contacts. The label is characterised in that it further includes a skirt attached to the flexible printed circuit, the skirt having an adhesive portion on at least a bottom side thereof which, in use, bonds to a communication card to attach the label to the communication card. The skirt is capable of having printed indicia provided on a top side thereof.
5 citations
•
31 Jan 2020TL;DR: In this paper, a method for creating a smart contract detailing an ordered set of events is disclosed, which can include information about multiple events and responses for each event and can be arranged in a predefined order.
Abstract: A method for creating a smart contract detailing an ordered set of events is disclosed. A smart contract can include information about multiple events and responses for each event. The events and response can be arranged in a predefined order. The responses can include adding new records to a blockchain.
5 citations
•
08 Apr 2011TL;DR: In this article, a server computer receives authorization request messages in the second format from a merchant and generates a new authorization request message in the first format, which the server computer then forwards to the issuer for approval.
Abstract: Present embodiments are directed to a server computer. The server computer establishes a first channel of communication to receive payment device data in a first format (e.g., chip type) and establishes a second channel to receive the payment device data in a second format (e.g., legacy type). The server computer receives an authorization request message in the second format from a merchant and generates a new authorization request message in the first format. The server computer then forwards the new authorization request to the issuer for approval.
5 citations
Authors
Showing all 1032 results
Name | H-index | Papers | Citations |
---|---|---|---|
Ayman Hammad | 43 | 115 | 6489 |
Mark Carlson | 42 | 114 | 5417 |
Patrick Faith | 39 | 101 | 5800 |
Selim Aissi | 31 | 87 | 2974 |
Lisa J. Anderson | 31 | 72 | 6418 |
Payman Mohassel | 28 | 105 | 3784 |
Kevin P. Siegel | 28 | 39 | 3496 |
Patrick Stan | 25 | 42 | 1915 |
Gyan Prakash | 25 | 133 | 2053 |
Konstantinos Markantonakis | 24 | 208 | 2697 |
Glenn Powell | 23 | 31 | 1834 |
Leigh Amaro | 23 | 23 | 2331 |
John F. Sheets | 21 | 41 | 1968 |
Edward W. Fordyce | 20 | 23 | 2222 |
Krishna Prasad Koganti | 19 | 23 | 1284 |