Institution
Visa Inc.
Company•London, United Kingdom•
About: Visa Inc. is a company organization based out in London, United Kingdom. It is known for research contribution in the topics: Database transaction & Transaction data. The organization has 1031 authors who have published 1076 publications receiving 36053 citations. The organization is also known as: Visa & Visa Inc.
Papers published on a yearly basis
Papers
More filters
•
13 May 2021TL;DR: In this paper, the authors propose the use of the Four Party Model to settle transactions between a merchant and a consumer who may use or accept either fiat and/or cryptocurrency, where an intermediary wallet entity may assume the risk of cryptocurrency transactions.
Abstract: Cryptocurrencies may be used within the current Four Party Model to settle transactions between a merchant and a consumer who may use or accept fiat and/or cryptocurrency. An intermediary wallet entity may assume the risk of cryptocurrency transactions. For example, a fiat-fiat transaction may follow the usual settlement process of the Four Party Model. In a crypto-crypto transaction, settlement may occur in real time. But in a fiat merchant/crypto customer transaction, settlement may be made from the customer's crypto wallet to an intermediary wallet. Fiat settlement would then occur between the intermediary and merchant following the Four Party Model. In a crypto merchant/fiat customer transaction, a transfer may be made from the intermediary wallet to the merchant's crypto wallet. Fiat settlement between the customer's bank (issuer) and intermediary can happen in the usual settlement process.
•
16 Apr 2020TL;DR: In this paper, a score transformation table can be used to provide consistency in the risk level for a particular score over time, based on a target score profile and a precision format (e.g., integer or floating point).
Abstract: Resources can be secured by a resource security system. The resource security system can determine whether to grant or deny access to resources using authorization information in an access request. The resource security system can also determine whether the access request is legitimate or fraudulent using risk scoring models. A score transformation table can be used to provide consistency in the risk level for a particular score over time. The score transformation table can be based on a target score profile and a precision format (e.g., integer or floating point). The score transformation table can dynamically adapt based on the trending top percent of risk and can account for changes in the distribution of scores over time or by weekday. The scores can be used to determine an access request outcome. Access to the resource can be accepted or rejected based on the outcome.
•
08 Nov 2018TL;DR: In this paper, a data security system for a portable device with an interaction channel code is described. But the system requires the user to capture an image of the portable device and the interaction channel codes, and the captured image may be converted to image data.
Abstract: A data security system is disclosed. The data security system includes a portable device with an interaction channel code. A user may capture an image of the portable device and the interaction channel code, and the captured image may be converted to image data. The image data may be provided to a remote server computer, which may validate the interaction channel code, and confirm that the transaction being conducted is associated with that interaction channel code.
•
21 Sep 2017TL;DR: In this article, a default value for the card regarding whether the card should be used as a debit card or a credit card was proposed. But the default value was not defined.
Abstract: The claimed system and method allows for an electronic payment system to accept a single card that is both a debit card and a credit card Further, a user may indicate a default value for the card regarding whether the card should be used as a debit card or a credit card
•
29 Oct 2020TL;DR: In this paper, a processor in a thin client may receive transaction data from a portable device of a first portable device type, and the processor may determine that the portable device is the first portable devices type.
Abstract: A method for conducting a transaction is disclosed. A processor in a thin client may receive transaction data from a portable device of a first portable device type. The processor may determine that the portable device is the first portable device type. The processor may apply an encryption protocol associated with a second portable device type to the transaction data to create encrypted data. The processor may transmit the encrypted data to a remote computer, wherein the remote computer utilizes the encryption protocol to decrypt the transaction data, and thereafter process the transaction data to conduct the transaction.
Authors
Showing all 1032 results
Name | H-index | Papers | Citations |
---|---|---|---|
Ayman Hammad | 43 | 115 | 6489 |
Mark Carlson | 42 | 114 | 5417 |
Patrick Faith | 39 | 101 | 5800 |
Selim Aissi | 31 | 87 | 2974 |
Lisa J. Anderson | 31 | 72 | 6418 |
Payman Mohassel | 28 | 105 | 3784 |
Kevin P. Siegel | 28 | 39 | 3496 |
Patrick Stan | 25 | 42 | 1915 |
Gyan Prakash | 25 | 133 | 2053 |
Konstantinos Markantonakis | 24 | 208 | 2697 |
Glenn Powell | 23 | 31 | 1834 |
Leigh Amaro | 23 | 23 | 2331 |
John F. Sheets | 21 | 41 | 1968 |
Edward W. Fordyce | 20 | 23 | 2222 |
Krishna Prasad Koganti | 19 | 23 | 1284 |