Institution
Visa Inc.
Company•London, United Kingdom•
About: Visa Inc. is a company organization based out in London, United Kingdom. It is known for research contribution in the topics: Database transaction & Transaction data. The organization has 1031 authors who have published 1076 publications receiving 36053 citations. The organization is also known as: Visa & Visa Inc.
Papers published on a yearly basis
Papers
More filters
•
04 Apr 2019TL;DR: In this article, a method for establishing, by a first device, a wireless connection to a second device and transmitting a request, by the first device and to the second device, for location data indicative of a location of the second user, was described.
Abstract: A method is disclosed. The method includes establishing, by a first device, a wireless connection to a second device; transmitting a request, by the first device and to the second device, for location data indicative of a location of the second device; receiving, by the first device and from the second device, the location data indicative of the location of the second device; determining, by the first device, a distance between the first device and the second device based at least in part on the received location data; generating, by the first device, an altered value based on the received location data and the determined distance; and transmitting, by the first device and to the second device, the altered value and an account identifier associated with a user of the first device.
1 citations
•
24 Sep 2018TL;DR: A method includes a server computer receiving, from a user device, a first encrypted biometric template, wherein the server computer stores a plurality of encrypted enrollment biometric templates, and a table comprising a plurality to determine if the encrypted match value corresponds to an unencrypted match value using the table.
Abstract: A method is disclosed. The method includes a server computer receiving, from a user device, a first encrypted biometric template, wherein the server computer stores a plurality of encrypted enrollment biometric templates, and a table comprising a plurality of encrypted match values and corresponding unencrypted match values. The server computer can then, for each of the plurality of encrypted enrollment biometric templates, input the first encrypted biometric template and an encrypted enrollment biometric template into a function to obtain an encrypted match value. The server computer can then, for each of the plurality of encrypted enrollment biometric templates, determine if the encrypted match value corresponds to an unencrypted match value using the table, wherein the unencrypted match value is greater than a threshold. The server computer can then provide a notification to the user device or another device associated with the unencrypted match value.
1 citations
•
09 Feb 2021TL;DR: In this article, a method, system, and computer program product for maintaining a cache obtain request data associated with a plurality of previously processed requests for aggregated data; predict, based on the request data, a subset of the aggregated aggregated datasets associated with subsequent requests and provide an invalidation request to the memory controller managing the cache to evict the cached data stored in the cache and load the subset of aggregate data into the cache during the third time period.
Abstract: A method, system, and computer program product for maintaining a cache obtain request data associated with a plurality of previously processed requests for aggregated data; predict, based on the request data, (i) a subset of the aggregated data associated with a subsequent request and (ii) a first time period associated with the subsequent request; determine, based on the first time period and a second time period associated with a performance of a data aggregation operation that generates the aggregated data, a third time period associated with instructing a memory controller managing a cache to evict cached data stored in the cache and load the subset of the aggregated data into the cache; and provide an invalidation request to the memory controller managing the cache to evict the cached data stored in the cache and load the subset of the aggregated data into the cache during the third time period.
1 citations
•
19 Jul 2016TL;DR: In this article, a method for facilitating a transaction may include generating, via a token server computer, a token for use by a first-entity computer, wherein the token is generated in response to a request received from the first entity computer.
Abstract: A method for facilitating a transaction may include generating, via a token server computer, a token for use by a first entity computer, wherein the token is generated in response to a request received from the first entity computer. The method may also include transmitting, via the token server computer, the token to the first entity computer, wherein the first entity computer transmits the token to a second entity computer. The method may also include receiving, at the token server computer and from the first entity computer, data indicative of the second entity computer successfully receiving the token. The data may include a hashed value derived from at least the token, data indicative of an identity of the second entity computer, and writing, by the token server computer, the data indicative of the second entity computer successfully receiving the token to a registry.
1 citations
•
20 Mar 2015TL;DR: In this article, a system and method for securely transmitting payment credentials to a payment processor is described, where a communications device of a consumer generates a first communicated value having a similar format to a second payment credential portion, and the first value is provided to the payment processor to replace the second value in the transmittal of the payment credentials.
Abstract: A system and method for securely transmitting payment credentials to a payment processor is disclosed. A communications device of a consumer generates a first communicated value having a similar format to a second payment credential portion, and the first communicated value is provided to the payment processor to replace the second payment credential portion in the transmittal of the payment credentials. The communications device receives, from the payment processor, a second communicated value, and generates a payment credential encryption key based at least on the second communicated value. The payment processor generates the encryption key based at least on the first communicated value. The second payment credential portion is encrypted using the encryption key and is transmitted to the payment processor. The second payment credential portion together with a first payment credential portion provided to the payment processor constitute complete payment credentials required to process a financial transaction.
1 citations
Authors
Showing all 1032 results
Name | H-index | Papers | Citations |
---|---|---|---|
Ayman Hammad | 43 | 115 | 6489 |
Mark Carlson | 42 | 114 | 5417 |
Patrick Faith | 39 | 101 | 5800 |
Selim Aissi | 31 | 87 | 2974 |
Lisa J. Anderson | 31 | 72 | 6418 |
Payman Mohassel | 28 | 105 | 3784 |
Kevin P. Siegel | 28 | 39 | 3496 |
Patrick Stan | 25 | 42 | 1915 |
Gyan Prakash | 25 | 133 | 2053 |
Konstantinos Markantonakis | 24 | 208 | 2697 |
Glenn Powell | 23 | 31 | 1834 |
Leigh Amaro | 23 | 23 | 2331 |
John F. Sheets | 21 | 41 | 1968 |
Edward W. Fordyce | 20 | 23 | 2222 |
Krishna Prasad Koganti | 19 | 23 | 1284 |