Institution
Visa Inc.
Company•London, United Kingdom•
About: Visa Inc. is a company organization based out in London, United Kingdom. It is known for research contribution in the topics: Database transaction & Transaction data. The organization has 1031 authors who have published 1076 publications receiving 36053 citations. The organization is also known as: Visa & Visa Inc.
Papers published on a yearly basis
Papers
More filters
•
11 Feb 2016TL;DR: In this paper, a dynamic graphic object managed by a financial institution that issues a payment device prevents third-party access to sensitive account data when linking the payment device to marketing documents provided by the third party.
Abstract: A dynamic graphic object managed by a financial institution that issues a payment device prevents third-party access to sensitive account data when linking the payment device to marketing documents provided by the third party. A payment processing server uses an alias for the sensitive data and configures a dynamic graphic object with the alias. The object may also include instructions to link the sensitive data to the alias and allow the payment processing server to monitor transactions with the third party. The payment processing server may then mediate communication between the consumer and the third party without exposing sensitive data.
1 citations
•
20 Jun 2019TL;DR: In this article, a method for automatically generating an account profile for a user or household, including determining a first key identification data element type, determining the first key IDE value, determining a linking IDE element type different than the first IDE, determining at least one linking IDEE value, and determining a second IDEA value, was presented.
Abstract: A method for automatically generating an account profile for a user or household, including: determining a first key identification data element type; determining a first key identification data element value; determining a linking identification data element type different than the first key identification data element type; determining at least one linking identification data element value; determining at least one second key identification data element value; and generating an account profile for the user or profile, the user account profile comprising a plurality of key identification data element values associated with the at least one user. A system and computer program product for automatically generating an account profile for a user or household are also disclosed.
1 citations
•
28 Feb 2019TL;DR: In this paper, a trust token is used to perform secure message transactions between two devices, such as relay, replay, or other man-in-the-middle attacks, decreasing the likelihood that such attacks will succeed.
Abstract: Embodiments of the invention are directed to the utilization of trust tokens to perform secure message transactions between two devices. A trust token transmitted in a message from one device may include first data that is digitally signed by a trust provider computer, and second data that is digitally signed by the device itself. Upon receipt of a message containing a trust token, the recipient may utilize the first data to verify with the trust provider computer that the sender of the message is a trusted party. The trust provider computer may provide the recipient device the public key of the sender. The recipient may utilize the second data and the provided public key to verify that the sender signed the message and that the message is unaltered. These techniques may increase detection of relay, replay, or other man-in-the-middle attacks, decreasing the likelihood that such attacks will be successful.
1 citations
••
14 Sep 2000TL;DR: The Java CardTM2.1.1 Runtime Environment (JCRE) as mentioned in this paper describes a secure virtualmachine environment for smart cards that facilitates the post-issuance loading and installation of applets, via an optional “Installer”.
Abstract: The Java CardTM2.1.1 Runtime Environment (JCRE) Specification [1] describes a secure virtualmachine environment for smart cards that facilitates the post-issuance loading and installation of applets, via an optional “Installer”. The Open Platform (OP) Card Specification [2] provides a robust specification for that installer. It identifies the oncard security features necessary to safeguard the various actors that are involved in a smart card system, including card issuers, application providers as well as cardholders.
1 citations
•
21 Mar 2019TL;DR: In this paper, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for a given access request based on access rules.
Abstract: In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
1 citations
Authors
Showing all 1032 results
Name | H-index | Papers | Citations |
---|---|---|---|
Ayman Hammad | 43 | 115 | 6489 |
Mark Carlson | 42 | 114 | 5417 |
Patrick Faith | 39 | 101 | 5800 |
Selim Aissi | 31 | 87 | 2974 |
Lisa J. Anderson | 31 | 72 | 6418 |
Payman Mohassel | 28 | 105 | 3784 |
Kevin P. Siegel | 28 | 39 | 3496 |
Patrick Stan | 25 | 42 | 1915 |
Gyan Prakash | 25 | 133 | 2053 |
Konstantinos Markantonakis | 24 | 208 | 2697 |
Glenn Powell | 23 | 31 | 1834 |
Leigh Amaro | 23 | 23 | 2331 |
John F. Sheets | 21 | 41 | 1968 |
Edward W. Fordyce | 20 | 23 | 2222 |
Krishna Prasad Koganti | 19 | 23 | 1284 |