Institution
Visa Inc.
Company•London, United Kingdom•
About: Visa Inc. is a company organization based out in London, United Kingdom. It is known for research contribution in the topics: Database transaction & Transaction data. The organization has 1031 authors who have published 1076 publications receiving 36053 citations. The organization is also known as: Visa & Visa Inc.
Papers published on a yearly basis
Papers
More filters
•
11 Jan 2011TL;DR: In this paper, the authors present a supplier enrollment program in which suppliers who are not enrolled in a payment processing network such as Visa are aggregated, commercial data about them is obtained and appended to the data, and the resulting sales leads are distributed to acquirers.
Abstract: Methods and systems are presented for a supplier enrollment program in which suppliers who are not enrolled in a payment processing network such as Visa are aggregated, commercial data about them is obtained and appended to the data, and the resulting sales leads are distributed to acquirers. If the acquirer fails to sign up the supplier within a predetermined time limit, then the sales lead is pulled back from the acquirer and rotated to another acquirer to let the other acquirer attempt to sign up the supplier.
•
24 Jan 2019TL;DR: In this paper, a merchant processor may send authorization requests over a first communication channel to an acquirer processor, which may then forward the requests to a payment network via a second communication channel.
Abstract: Techniques are provided for fallback authorization routing. A merchant processor may receive authorization requests from one or more merchant systems. These authorization requests may be to authorize a transaction. The merchant processor may transmit these authorization requests over a first communication channel to an acquirer processor, which may then forward the requests to a payment network. If the merchant processor determines that the acquirer processor is not receiving the authorization requests, or is otherwise unavailable, the merchant processor may, as a fallback, transmit the authorization requests directly to the payment network through a second communication channel, thereby bypassing the acquirer processor. When the merchant processor receives some indication that the acquirer processor is available to process authorization requests, new authorization requests can be transmitted to the acquirer processor via the first communication channel.
•
17 Mar 2020
TL;DR: In this paper, the authors proposed a system and method for identifying and communicatively targeting financial devices to promote recurring transactions, which includes the steps: receiving, with at least one processor, financial device data for a plurality of transactions over a sample time period, including transaction time, transaction count, transaction amount, merchant category, transaction type, or any combination thereof.
Abstract: Described are a system and method for identifying and communicatively targeting financial devices to promote recurring transactions. The method includes the steps: receiving, with at least one processor, financial device data for a plurality of transactions over a sample time period, the financial device data including transaction time, transaction count, transaction amount, merchant category, transaction type, or any combination thereof. The method also includes identifying, with at least one processor, at least one target financial device from the financial device data based at least partially on at least one of the parameters having a value in a specified range for the at least one parameter. The method further includes receiving, with at least one processor, identification data of at least one target financial device holder, and automatically generating and transmitting at least one communication to the at least one target financial device holder.
•
17 Oct 2019
TL;DR: In this article, a method for automatically detecting errors in at least one data entry in a database, the data entry including an input string of characters that do not match at least a predefined string, is presented.
Abstract: A method for automatically detecting errors in at least one data entry in a database, the at least one data entry including an input string of characters that do not match at least one predefined string of characters. The method includes generating a first image map; generating at least one classification parameter by comparing the first image map to a second image map, the second image map based at least partially on the predefined string of characters; determining that the input string of characters correlates to the predefined string of characters; and modifying the at least one data entry to match the predefined string of characters in response to determining that the input string of characters correlates to the predefined string of characters. Various other methods and systems for automatically detecting errors in at least one data entry in a database are also disclosed.
•
18 Jan 2018TL;DR: A system and method which includes hardware and software is described in this article, which may enable secure transactions from a vehicle in a secure manner using a secure transaction system and a method.
Abstract: A system and method which includes hardware and software is disclosed which may enable secure transactions from a vehicle
Authors
Showing all 1032 results
Name | H-index | Papers | Citations |
---|---|---|---|
Ayman Hammad | 43 | 115 | 6489 |
Mark Carlson | 42 | 114 | 5417 |
Patrick Faith | 39 | 101 | 5800 |
Selim Aissi | 31 | 87 | 2974 |
Lisa J. Anderson | 31 | 72 | 6418 |
Payman Mohassel | 28 | 105 | 3784 |
Kevin P. Siegel | 28 | 39 | 3496 |
Patrick Stan | 25 | 42 | 1915 |
Gyan Prakash | 25 | 133 | 2053 |
Konstantinos Markantonakis | 24 | 208 | 2697 |
Glenn Powell | 23 | 31 | 1834 |
Leigh Amaro | 23 | 23 | 2331 |
John F. Sheets | 21 | 41 | 1968 |
Edward W. Fordyce | 20 | 23 | 2222 |
Krishna Prasad Koganti | 19 | 23 | 1284 |