scispace - formally typeset
Search or ask a question
Institution

Visa Inc.

CompanyLondon, United Kingdom
About: Visa Inc. is a company organization based out in London, United Kingdom. It is known for research contribution in the topics: Database transaction & Transaction data. The organization has 1031 authors who have published 1076 publications receiving 36053 citations. The organization is also known as: Visa & Visa Inc.


Papers
More filters
Patent
Zhang Jie1
14 Nov 2019
TL;DR: In this article, the authors proposed a method for preventing duplicate processing of a payment transaction, which is based on generating a first data structure with a first predetermined time interval and generating a second data structure for a second time interval, where a first overlap region and second overlap region are defined by a same time interval.
Abstract: A method for preventing duplicate processing of a payment transaction includes: generating a first data structure with a first predetermined time interval and generating a second data structure with a second predetermined time interval. A first overlap region and second overlap region of the first and second predetermined time interval are defined by a same time interval. The method includes receiving first transaction data associated with a first payment transaction, receiving second transaction data associated with a second payment transaction, and determining based on a first transaction ID and a second transaction ID, that the second payment transaction is a duplicate of the first payment transaction. A computer program product and system for preventing duplicate processing of a payment transaction are also disclosed.
Patent
09 May 2019
TL;DR: In this paper, a computer-implemented method for event-based communication and messaging that includes determining general event data associated with an event, determining user data associated associated with a user based on determining the event data, determining pre-event and current event associated with the event, or post-event data associated to the event.
Abstract: Provided is a computer-implemented method for event-based communication and messaging that includes determining general event data associated with an event, determining user data associated with a user based on determining the event data associated with the event, determining pre-event data associated with the event, current event data associated with the event, or post-event data associated with the event based on the general event data associated with the event and the user data associated with the user, determining a current user location of the at least one user, generating at least one message based on the current user location, the at least one message including at least one of the following: pre-event data; current event data; post-event data; or any combination thereof; and communicating the at least one message to a user device of the user. A system and computer program product are also disclosed.
Patent
31 Mar 2020
TL;DR: In this paper, the authors propose to store personal information and other sensitive financial information in a relatively small number of devices, such as a car, refrigerator, or even a laptop.
Abstract: An Internet-connected device, such as a car, refrigerator, or even a laptop can use a second device, such as a cell phone, to support cryptographic operations and communication with token service providers or other processing services requiring pre-provisioned capabilities that may include cryptographic secrets. By removing the need to store personally sensitive data in “Internet of Things” (IoT) devices, a user's personal information and other sensitive financial information may be contained to a relatively small number of devices. This may help prevent theft of goods or services by IoT devices that are not always under the close control of the user.
Patent
02 Sep 2020
TL;DR: In this paper, the usability of a cryptogram generated in a first cryptographic protocol such as triple-DES is improved by using a key store within an insecure memory of the mobile communication device, and transmitting the third cryptogram to an authorization entity or an issue entity.
Abstract: Systems, methods, and computer readable media are provided for improving the usability of a cryptogram generated in a first cryptographic protocol such as triple-DES. The methods may generate a first cryptogram using a first identifier in a first cryptographic protocol, stored in a key store within an insecure memory of the mobile communication device, generate, within a secure memory of the mobile communication device, a second cryptogram using a second identifier in a second cryptographic protocol, stored in the secure memory, combining, the first cryptogram and a number of characters of the second cryptogram equal to the length of the first cryptogram to generate a third cryptogram and transmitting the third cryptogram to an payment processing network to validate a transaction. A transaction associated with the third cryptogram may be validated by an authorization entity or an issue entity.
Patent
09 May 2019
TL;DR: In this paper, a distributed database may maintain reliability associations between pairs of computing devices and each reliability association may indicate a particular device has determined (e.g., locally) that another device is reliable.
Abstract: Embodiments of the invention are directed assessing reliability between two computing devices. A distributed database may maintain reliability associations between pairs of computing devices. Each reliability association may indicate a particular device has determined (e.g., locally) that another device is reliable. In order to determine an amount of reliability between a first computing device and a second computing device, an ordered combination of the reliability associations may be determined utilizing the distributed database. The ordered combination of reliability associations may identify a reliability path between the first computing device and the second computing device. An amount of reliability may be determined based on the reliability path. An interaction between the devices may be allowed or restricted based at least in part on the amount of reliability between the computing devices.

Authors

Showing all 1032 results

NameH-indexPapersCitations
Ayman Hammad431156489
Mark Carlson421145417
Patrick Faith391015800
Selim Aissi31872974
Lisa J. Anderson31726418
Payman Mohassel281053784
Kevin P. Siegel28393496
Patrick Stan25421915
Gyan Prakash251332053
Konstantinos Markantonakis242082697
Glenn Powell23311834
Leigh Amaro23232331
John F. Sheets21411968
Edward W. Fordyce20232222
Krishna Prasad Koganti19231284
Network Information
Related Institutions (5)
Adobe Systems
8K papers, 214.7K citations

77% related

German Research Centre for Artificial Intelligence
3.9K papers, 75.2K citations

77% related

NICTA
2.5K papers, 79.8K citations

76% related

Hasso Plattner Institute
2.7K papers, 58.1K citations

76% related

Swedish Institute of Computer Science
1.3K papers, 56K citations

76% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20221
202137
2020138
2019118
201869
201761