Institution
Visa Inc.
Company•London, United Kingdom•
About: Visa Inc. is a company organization based out in London, United Kingdom. It is known for research contribution in the topics: Database transaction & Transaction data. The organization has 1031 authors who have published 1076 publications receiving 36053 citations. The organization is also known as: Visa & Visa Inc.
Papers published on a yearly basis
Papers
More filters
•
27 Aug 2019TL;DR: In this paper, the authors present a system for tracking recurrence across computer systems. But the system is not designed to track the number of interactions between a resource provider computer and a user.
Abstract: Embodiments of the invention are directed to methods, systems, and devices for tracking recurrence across computer systems. One embodiment of the invention is directed to a method including processing, by a transaction processing computer, a plurality of transactions and then storing, by the transaction processing computer, data relating to the plurality of transactions. The transaction processing computer may be configured to use the data to determine a recurrence value indicating at least a frequency or number of interactions between a resource provider computer and a user, and the transaction processing computer may further initiate an action based on the recurrence value.
•
29 Oct 2020TL;DR: In this paper, consensus-based online authentication is discussed, where an encryption device may be authenticated based on an authentication cryptogram generated by the encryption device, and the authenticated cryptogram may be transmitted to a decryption device, which may decrypt the authentication cryptograms, evaluate its contents, and authenticate the encryption devices based on its contents.
Abstract: Methods and systems for consensus-based online authentication are provided. An encryption device may be authenticated based on an authentication cryptogram generated by the encryption device. The encryption device may transmit a request for security assessment to one or more support devices. The support devices may individually assess the encryption device, other security devices, and contextual information. The support devices may choose to participate in a multi-party computation with the encryption device based on the security assessments. Support devices that choose to participate may transmit one or more secret shares or partial computations to the encryption device. The encryption device may use the secret shares or partial computations to generate an authentication cryptogram. The authentication cryptogram may be transmitted to a decryption device, which may decrypt the authentication cryptogram, evaluate its contents, and authenticate the encryption device based on its contents.
•
13 Aug 2019TL;DR: In this paper, a computer-implemented method of detecting suspect transactions on an account of a consumer is presented, which includes receiving purchase information at a payment network system from an electronic purchase device.
Abstract: A computer-implemented method of detecting suspect transactions on an account of a consumer. The method includes receiving purchase information at a payment network system from an electronic purchase device. A phone number for the merchant is attached to the purchase information is determined. If a phone number is not attached, searching for a phone number using the purchase information. If the phone number is found, adding the phone number to the purchase information. The phone number is analyzed for fraudulent activities using an artificial intelligence (Al) engine. If the phone number is determined to be fraudulent by the Al engine, the phone number is added to the Al engine. The transaction is suspended from completing. A notice is communicated to a responsible party of the account. A response is received from the responsible party of how to proceed with the transaction. Process the transaction as indicated by the responsible party.
•
12 Mar 2020TL;DR: In this article, a processor-implemented method for payment selection is proposed, which includes receiving transaction request information for a transaction including the user identifying information and the payment account information of a first user payment account.
Abstract: A processor-implemented method for payment selection. The method comprises receiving user identifying information associated with a user and payment account information associated with a plurality of user payment accounts associated with the user. The method includes receiving transaction request information for a transaction including the user identifying information and the payment account information for a first user payment account. The method includes determining a first potential benefit from completing the transaction using the first user payment account and a second potential benefit from completing the transaction using a second user payment account. The method includes determining that the second potential benefit is greater than the first potential benefit, completing the transaction with the second of the plurality of user payment accounts.
•
[...]
TL;DR: In this paper, an architecture of connected servers supports data analysis with each server using a pattern matching algorithm to determine if an individual's traits match a predetermined species or if a new species should be established.
Abstract: An architecture of connected servers supports data analysis with each server using a pattern matching algorithm to determine if an individual's traits match a predetermined species or if a new species should be established. Each server may have a dedicated database and receive information from relevant sources including various reporting agencies.
Authors
Showing all 1032 results
Name | H-index | Papers | Citations |
---|---|---|---|
Ayman Hammad | 43 | 115 | 6489 |
Mark Carlson | 42 | 114 | 5417 |
Patrick Faith | 39 | 101 | 5800 |
Selim Aissi | 31 | 87 | 2974 |
Lisa J. Anderson | 31 | 72 | 6418 |
Payman Mohassel | 28 | 105 | 3784 |
Kevin P. Siegel | 28 | 39 | 3496 |
Patrick Stan | 25 | 42 | 1915 |
Gyan Prakash | 25 | 133 | 2053 |
Konstantinos Markantonakis | 24 | 208 | 2697 |
Glenn Powell | 23 | 31 | 1834 |
Leigh Amaro | 23 | 23 | 2331 |
John F. Sheets | 21 | 41 | 1968 |
Edward W. Fordyce | 20 | 23 | 2222 |
Krishna Prasad Koganti | 19 | 23 | 1284 |