scispace - formally typeset
Search or ask a question
Institution

Visa Inc.

CompanyLondon, United Kingdom
About: Visa Inc. is a company organization based out in London, United Kingdom. It is known for research contribution in the topics: Database transaction & Transaction data. The organization has 1031 authors who have published 1076 publications receiving 36053 citations. The organization is also known as: Visa & Visa Inc.


Papers
More filters
Patent
12 Jul 2018
TL;DR: In this article, the authors present a method to determine an activity metric associated with the user of the access device, determining a value alteration based at least in part on the activity metric, and applying the value alteration to the value for the transaction.
Abstract: A method is disclosed. The method includes receiving an authorization request message for a transaction from an access device. The authorization request message includes a value and an account identifier. The user device is used by a user to conduct a transaction with the resource provider. The method also includes determining an activity metric associated with the user of the user device, determining a value alteration based at least in part on the activity metric, and applying the value alteration to the value for the transaction.
Patent
Lim Kwang Hyun1
25 Aug 2016
TL;DR: In this article, an interactive system configured to interact with users in response to user inputs provided to the system, where the users are instructed to provide the inputs by causing communications in an existing network with the user inputs embedded in the communications, a computing device coupled with the network is configured to monitor communications in the network, and transmit data representing the user input to the interactive system.
Abstract: An interactive system configured to interact with users in response to user inputs provided to the system, where the users are instructed to provide the inputs by causing communications in an existing network with the user inputs embedded in the communications, a computing device coupled with the network is configured to monitor communications in the network to identify the user input in the communications, and transmit data representing the user input to the interactive system. The operations and communications in the existing network are performed with the interactive system; and the communications containing the user inputs are identified via the computing device for addition use in the interactive system.
Patent
28 Nov 2019
TL;DR: In this article, a technique for reducing compromise of sensitive data in a virtual machine is described, in which the program module can overwrite the sensitive data with the encrypted data and send a message that is generated using the leaked sensitive data.
Abstract: Techniques for reducing compromise of sensitive data in a virtual machine are described. During initiation of a secure string instance of a program module in memory allocated to the virtual machine, the program module can receive sensitive data in plaintext and retrieves parameters sourced from outside the allocated memory. During the execution of the program module, the sensitive data can be encrypted using a key based on the parameters to obtain encrypted data. The program module can overwrite the sensitive data with the encrypted data. The program module can receive a trigger to send a message that is generated using the sensitive data. The encrypted data can be decrypted using the key based on the parameters to obtain the sensitive data. After encryption and decryption, the program module can generate the message using the sensitive data and overwrite the sensitive data and the parameters used to encrypt the sensitive data.
Patent
Chen Yuexi1, Marc Kekicheff1
04 Feb 2021
TL;DR: In this article, the authors proposed a secure communication channel between a portable communication device and an access device when the first hash output and the second hash output are equal, and a determination is made if the two hash outputs are equal.
Abstract: A method includes generating, by a portable communication device, a first random code and transmitting the first random code to an access device. The access device receives the first random code, generates a second random code, receives a personal token from a user of the portable communication device, and hashes the first random code, the second random code, and the personal token to form a first hash output. The first hash output and the second random code are received from the access device. The first random code, a stored personal token, and the second random code are hashed to form a second hash output. A determination is made if the first hash output and the second hash output are equal. A secure communication channel is formed between the portable communication device and the access device when the first hash output and the second hash output are equal.
Patent
30 Jul 2020
TL;DR: In this paper, a method for determining whether an association exists between the access device type identifier and one or more application identifiers of a plurality of application identifiers stored on the user device was proposed.
Abstract: A method is disclosed The method includes receiving, by a user device from an access device, an available applications request message The available applications request message includes an access device type identifier The method also includes determining whether an association exists between the access device type identifier and one or more application identifiers of a plurality of application identifiers stored on the user device The plurality of application identifiers respectively correspond to different applications on the user device The method also includes transmitting, by the user device, to the access device, based in part on whether the association exists, an available applications response The available applications response includes the one or more application identifiers of the plurality of application identifiers associated with the access device type identifier

Authors

Showing all 1032 results

NameH-indexPapersCitations
Ayman Hammad431156489
Mark Carlson421145417
Patrick Faith391015800
Selim Aissi31872974
Lisa J. Anderson31726418
Payman Mohassel281053784
Kevin P. Siegel28393496
Patrick Stan25421915
Gyan Prakash251332053
Konstantinos Markantonakis242082697
Glenn Powell23311834
Leigh Amaro23232331
John F. Sheets21411968
Edward W. Fordyce20232222
Krishna Prasad Koganti19231284
Network Information
Related Institutions (5)
Adobe Systems
8K papers, 214.7K citations

77% related

German Research Centre for Artificial Intelligence
3.9K papers, 75.2K citations

77% related

NICTA
2.5K papers, 79.8K citations

76% related

Hasso Plattner Institute
2.7K papers, 58.1K citations

76% related

Swedish Institute of Computer Science
1.3K papers, 56K citations

76% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20221
202137
2020138
2019118
201869
201761