Institution
Visa Inc.
Company•London, United Kingdom•
About: Visa Inc. is a company organization based out in London, United Kingdom. It is known for research contribution in the topics: Database transaction & Transaction data. The organization has 1031 authors who have published 1076 publications receiving 36053 citations. The organization is also known as: Visa & Visa Inc.
Papers published on a yearly basis
Papers
More filters
•
15 May 2014TL;DR: In this article, a method and system for provisioning payment credentials usable by a mobile device in conducting a payment is presented, which is conducted at a provisioning system and comprises the steps of: receiving payment credentials from a receiving device, the payment credentials having been obtained from a portable payment device presented by a consumer at the receiving device; receiving, from the receiving devices, an identifier entered by the consumer, identifying a mobile devices or a secure element corresponding to the identifier.
Abstract: A method and system for provisioning payment credentials usable by a mobile device in conducting a payment. The method is conducted at a provisioning system and comprises the steps of: receiving payment credentials from a receiving device, the payment credentials having been obtained from a portable payment device presented by a consumer at the receiving device; receiving, from the receiving device, an identifier entered by the consumer; identifying a mobile device or a secure element corresponding to the identifier; and communicating the payment credentials or a derivation of the payment credentials to the identified mobile device or the secure element to be securely stored in association with the mobile device. The method may include: encrypting the received payment credentials, the encrypted payment credentials having a unique decryption key; and wherein communicating a derivation of the payment credentials communicates the unique decryption key.
35 citations
•
20 Sep 2011TL;DR: In this article, a computing apparatus is configured to represent offer rules based on requirements for the detection of predefined types of events and actions scheduled to be performed in response to each occurrence of the events.
Abstract: In one aspect, a computing apparatus is configured to represent offer rules based on requirements for the detection of predefined types of events and actions scheduled to be performed in response to the detection of each occurrence of the events. The events are independent from each other in processing and are linked via prerequisite conditions to formulate the requirements of an offer campaign. The computing apparatus is configured to store data indicating the completion statuses of the events and process the events, including the scheduled actions, if any, in an atomic way. Thus, the offer rules can be changed on-the-fly during run time execution by the computing apparatus.
35 citations
•
23 Jul 2010TL;DR: In this paper, a system and method for an alternate mobile payment service is described, which includes a server computer for enrolling and storing user account information, and a unique one-time-use identifier for use during a transaction.
Abstract: A system and method are described for an alternate mobile payment service. The system includes a server computer for enrolling and storing user account information. The server computer is also capable of generating a unique one-time-use identifier for use during a transaction. The one-time-use identifier is returned to user as an electronic coupon which may be in the form of a two-dimensional barcode. The coupon may be used at a merchant location to complete a transaction. When the barcode is scanned, it may processed similar to a credit/debit/prepaid card payment.
34 citations
•
18 Jun 2015TL;DR: In this article, a first computing device can generate a first shared secret using the ephemeral private key and a static second device public key, which can then decrypt the encrypted response data from the response message to obtain response data.
Abstract: Embodiments of the invention relate to efficient methods for authenticated communication. In one embodiment, a first computing device can generate an ephemeral key pair comprising an ephemeral public key and an ephemeral private key. The first computing device can generate a first shared secret using the ephemeral private key and a static second device public key. The first computing device can encrypt request data using the first shared secret to obtain encrypted request data. The first computing device can send a request message including the encrvpted request data, and the ephemeral public key to a server computer. Upon receiving a response message from the server computer, the first computing device can determine a second shared secret using the ephemeral private key and the blinded static second device public key. The first computing device can then decrypt the encrypted response data from the response message to obtain response data.
34 citations
•
02 Mar 2012TL;DR: The Cloud Service FACILITATOR APPARATUSES, METHODS and Systems (CSF) as mentioned in this paper transforms user purchase requests, refund requests, and product/service replacement requests via CSF components into transaction records, refunds, and replacement products/services outputs.
Abstract: The CLOUD SERVICE FACILITATOR APPARATUSES, METHODS AND SYSTEMS (“CSF”) transforms user purchase requests, refund requests, and product/service replacement requests via CSF components into transaction records, refunds, and replacement products/services outputs. The CSF may receive a consumer purchase request for a cloud service from a merchant. In response to the request, the CSF may generate a unique record key for the purchase and may transmit the unique record key to the merchant. The CSF may further receive additional transaction information and the unique record key from the merchant. In response to the received information and the unique key, the CSF may provide additional service to the merchant or the consumer.
34 citations
Authors
Showing all 1032 results
Name | H-index | Papers | Citations |
---|---|---|---|
Ayman Hammad | 43 | 115 | 6489 |
Mark Carlson | 42 | 114 | 5417 |
Patrick Faith | 39 | 101 | 5800 |
Selim Aissi | 31 | 87 | 2974 |
Lisa J. Anderson | 31 | 72 | 6418 |
Payman Mohassel | 28 | 105 | 3784 |
Kevin P. Siegel | 28 | 39 | 3496 |
Patrick Stan | 25 | 42 | 1915 |
Gyan Prakash | 25 | 133 | 2053 |
Konstantinos Markantonakis | 24 | 208 | 2697 |
Glenn Powell | 23 | 31 | 1834 |
Leigh Amaro | 23 | 23 | 2331 |
John F. Sheets | 21 | 41 | 1968 |
Edward W. Fordyce | 20 | 23 | 2222 |
Krishna Prasad Koganti | 19 | 23 | 1284 |