scispace - formally typeset
Search or ask a question
Institution

Visa Inc.

CompanyLondon, United Kingdom
About: Visa Inc. is a company organization based out in London, United Kingdom. It is known for research contribution in the topics: Database transaction & Transaction data. The organization has 1031 authors who have published 1076 publications receiving 36053 citations. The organization is also known as: Visa & Visa Inc.


Papers
More filters
Patent
13 May 2021
TL;DR: In this paper, the authors propose the use of the Four Party Model to settle transactions between a merchant and a consumer who may use or accept either fiat and/or cryptocurrency, where an intermediary wallet entity may assume the risk of cryptocurrency transactions.
Abstract: Cryptocurrencies may be used within the current Four Party Model to settle transactions between a merchant and a consumer who may use or accept fiat and/or cryptocurrency. An intermediary wallet entity may assume the risk of cryptocurrency transactions. For example, a fiat-fiat transaction may follow the usual settlement process of the Four Party Model. In a crypto-crypto transaction, settlement may occur in real time. But in a fiat merchant/crypto customer transaction, settlement may be made from the customer's crypto wallet to an intermediary wallet. Fiat settlement would then occur between the intermediary and merchant following the Four Party Model. In a crypto merchant/fiat customer transaction, a transfer may be made from the intermediary wallet to the merchant's crypto wallet. Fiat settlement between the customer's bank (issuer) and intermediary can happen in the usual settlement process.
Patent
16 Apr 2020
TL;DR: In this paper, a score transformation table can be used to provide consistency in the risk level for a particular score over time, based on a target score profile and a precision format (e.g., integer or floating point).
Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
Patent
Weller Kevin1
08 Nov 2018
TL;DR: In this paper, a data security system for a portable device with an interaction channel code is described. But the system requires the user to capture an image of the portable device and the interaction channel codes, and the captured image may be converted to image data.
Abstract: A data security system is disclosed. The data security system includes a portable device with an interaction channel code. A user may capture an image of the portable device and the interaction channel code, and the captured image may be converted to image data. The image data may be provided to a remote server computer, which may validate the interaction channel code, and confirm that the transaction being conducted is associated with that interaction channel code.
Patent
21 Sep 2017
TL;DR: In this article, a default value for the card regarding whether the card should be used as a debit card or a credit card was proposed. But the default value was not defined.
Abstract: The claimed system and method allows for an electronic payment system to accept a single card that is both a debit card and a credit card Further, a user may indicate a default value for the card regarding whether the card should be used as a debit card or a credit card
Patent
29 Oct 2020
TL;DR: In this paper, a processor in a thin client may receive transaction data from a portable device of a first portable device type, and the processor may determine that the portable device is the first portable devices type.
Abstract: A method for conducting a transaction is disclosed. A processor in a thin client may receive transaction data from a portable device of a first portable device type. The processor may determine that the portable device is the first portable device type. The processor may apply an encryption protocol associated with a second portable device type to the transaction data to create encrypted data. The processor may transmit the encrypted data to a remote computer, wherein the remote computer utilizes the encryption protocol to decrypt the transaction data, and thereafter process the transaction data to conduct the transaction.

Authors

Showing all 1032 results

NameH-indexPapersCitations
Ayman Hammad431156489
Mark Carlson421145417
Patrick Faith391015800
Selim Aissi31872974
Lisa J. Anderson31726418
Payman Mohassel281053784
Kevin P. Siegel28393496
Patrick Stan25421915
Gyan Prakash251332053
Konstantinos Markantonakis242082697
Glenn Powell23311834
Leigh Amaro23232331
John F. Sheets21411968
Edward W. Fordyce20232222
Krishna Prasad Koganti19231284
Network Information
Related Institutions (5)
Adobe Systems
8K papers, 214.7K citations

77% related

German Research Centre for Artificial Intelligence
3.9K papers, 75.2K citations

77% related

NICTA
2.5K papers, 79.8K citations

76% related

Hasso Plattner Institute
2.7K papers, 58.1K citations

76% related

Swedish Institute of Computer Science
1.3K papers, 56K citations

76% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20221
202137
2020138
2019118
201869
201761