Institution
Visa Inc.
Company•London, United Kingdom•
About: Visa Inc. is a company organization based out in London, United Kingdom. It is known for research contribution in the topics: Database transaction & Transaction data. The organization has 1031 authors who have published 1076 publications receiving 36053 citations. The organization is also known as: Visa & Visa Inc.
Papers published on a yearly basis
Papers
More filters
•
06 May 2016TL;DR: In this paper, a computer-implemented method for processing payment requests via social media is presented, which includes determining that the payer information is valid, generating an intent-to-pay notice associated with the payment request, and transmitting the intent-To-Pay notice to a payee server associated with a payer based on the payee information.
Abstract: A computer-implemented method for processing payment requests via social media. Including receiving a payment request initiated by a payer via a social media network, including payer information associated with the payer and payee information associated with a payee. The method includes determining that the payer information is valid, generating an intent-to-pay notice associated with the payment request, and transmitting the intent-to-pay notice to a payee server associated with the payee based on the payee information. The method includes receiving a payment information request from the payee server. The payment information request includes information associated with the intent-to-pay notice. The method includes, in response to the payment information request, transmitting payment information to the payee server. The payment information allows the payee to process a payment associated with the payment request.
2 citations
•
16 Apr 2009TL;DR: In this article, a system and method that allows a Payee to request payment from a Payor is disclosed, which does not require that the Payee receive funds from the Payor in a specific account associated with the system.
Abstract: A system and method that allows a Payee to request payment from a Payor is disclosed. The system allows the Payee to issue an invoice in electronic form detailing the payment request to the Payor. The system further allows the Payor to pay the invoice using a suitable payment means, such as a credit card, without requiring any infrastructure investment on the part of the Payee. Finally, the system does not require that the Payee receive funds from the Payor in a specific account that is associated with the system. The system allows the Payee to receive their funds in any account specified by the Payee.
2 citations
•
31 Oct 2017TL;DR: In this paper, a computing device may be configured to receive a set of inputs from other computing devices, including inputs derived by the computing devices utilizing cryptographic keys of the devices and stored in a blockchain such that the inputs are tamper resistant.
Abstract: A computing device may be configured to receive a set of inputs from other computing devices The set of inputs may include inputs derived by the computing devices utilizing cryptographic keys of the computing devices The set of inputs may be stored in a blockchain such that the inputs are tamper resistant A symmetric key may be generated (periodically, upon expiration of a timer, according to a protocol set, upon request, etc) from two or more of the set of inputs The generated symmetric key may be distributed to the computing devices The symmetric key may be utilized to encrypt and decrypt communications between two computing devices
2 citations
•
22 Feb 2018TL;DR: In this paper, encryption key exchange processes are disclosed and a method for initiating communication between a portable communication device including a token and a first limited use encryption key, and an access device is described.
Abstract: Encryption key exchange processes are disclosed. A disclosed method includes initiating communication between a portable communication device including a token and a first limited use encryption key, and an access device. After communication is initiated, the portable communication device receives a second limited use key from a remote server via the access device. The portable communication device then replaces the first limited use key with the second limited use key. The second limited use key is thereafter used to create access data such as cryptograms that can be used to conduct access transactions.
2 citations
•
10 Nov 2016TL;DR: In this article, an extension operates in a manner in which it has access to the underlying merchant data, the extension may allow an expedited payment service to work with virtually any merchant web site.
Abstract: In one aspect, an expedited payment service is accessed through a browser extension. As an extension operates in a manner in which it has access to the underlying merchant data, the extension may allow an expedited payment service to work with virtually any merchant web site.
2 citations
Authors
Showing all 1032 results
Name | H-index | Papers | Citations |
---|---|---|---|
Ayman Hammad | 43 | 115 | 6489 |
Mark Carlson | 42 | 114 | 5417 |
Patrick Faith | 39 | 101 | 5800 |
Selim Aissi | 31 | 87 | 2974 |
Lisa J. Anderson | 31 | 72 | 6418 |
Payman Mohassel | 28 | 105 | 3784 |
Kevin P. Siegel | 28 | 39 | 3496 |
Patrick Stan | 25 | 42 | 1915 |
Gyan Prakash | 25 | 133 | 2053 |
Konstantinos Markantonakis | 24 | 208 | 2697 |
Glenn Powell | 23 | 31 | 1834 |
Leigh Amaro | 23 | 23 | 2331 |
John F. Sheets | 21 | 41 | 1968 |
Edward W. Fordyce | 20 | 23 | 2222 |
Krishna Prasad Koganti | 19 | 23 | 1284 |