Institution
Visa Inc.
Company•London, United Kingdom•
About: Visa Inc. is a company organization based out in London, United Kingdom. It is known for research contribution in the topics: Database transaction & Transaction data. The organization has 1031 authors who have published 1076 publications receiving 36053 citations. The organization is also known as: Visa & Visa Inc.
Papers published on a yearly basis
Papers
More filters
•
27 Sep 2011TL;DR: In this paper, a system stores information identifying an account holder's account and information identifying features that are associated with the account, and the system monitors subsequent transactions to determine a tier that the user is entitled to based on the transactions.
Abstract: Systems and methods are provided to structure services in tiers and provide services as rewards in accordance with the tiers. In one aspect, a system stores information identifying an account holder's account and information identifying features that are associated with the account. Account features include a plurality of services that are organized in tiers and any given tier determines the benefits the account holder is entitled to in connection with a set of services associated with the account feature. The account holder's account is associated with an original tier and the system monitors subsequent transactions to determine a tier that the user is entitled to based on the transactions. The tier includes all of the services that the user was previously entitled to in addition to any new services associated with a tier change.
24 citations
•
12 Sep 2014TL;DR: In this article, a computing apparatus configured to receive authorization requests for a payment transaction initiated in a transaction terminal, determine whether a location of the transaction terminal is in a travel region of the user, and provide an indicator in the authorization request transmitted to an issuer processor in accordance with a result of the determination of whether the transaction terminals is in the travel regions of the users.
Abstract: A computing apparatus configured to: receive an authorization request for a payment transaction initiated in a transaction terminal; determine whether a location of the transaction terminal is in a travel region of the user in accordance with travel information of the user; and provide an indicator in the authorization request transmitted to an issuer processor in accordance with a result of the determination of whether the location of the transaction terminal is in the travel region of the user.
24 citations
•
17 Feb 2016TL;DR: In this article, an authentication method for mobile devices to authenticate a user is presented. But the authentication method is not described. But a mobile device may generate a cryptogram using a user identification (ID) associated with the user, a timestamp, a device ID associated with an associated mobile device, a service provider application, and a service providers device ID, and the generated cryptogram, the user ID, the timestamp, the device ID and the application ID, to be transmitted to the service provider computer.
Abstract: An authentication method is disclosed. To authenticate a user, a mobile device may request identification and verification from the user. Upon receiving a positive identification and verification response from the user, the mobile device may generate a cryptogram using a user identification (ID) associated with the user, a timestamp, a device ID associated with the mobile device, a service provider application ID associated with the service provider application, and a service provider device ID. The mobile device may transmit the generated cryptogram, the user ID, the timestamp, the device ID, the service provider application ID, and the service provider device ID, to a service provider computer associated with the service provider application. The service provider computer may decrypt the cryptogram and compare the decrypted data elements to the received data elements to validate and authenticate the user.
24 citations
•
02 Aug 2013TL;DR: In this article, a computing apparatus is configured to collect data about the account presentation device used to initiate a transaction on a transaction terminal, data about a user using the account display device at the transaction terminal and/or data about details of the transaction.
Abstract: A computing apparatus is configured to collect data about the account presentation device used to initiate a transaction on a transaction terminal, data about the user using the account presentation device at the transaction terminal, and/or data about the details of the transaction. The computing apparatus combine the collected data to generate a code as a substitute of the signature of the user.
23 citations
•
12 Jul 2010TL;DR: In this article, the authors present a method to process a transaction where at least one risk factor associated with a consumer account can be triggered by the transaction, which intersects the transaction with an associated fraud rule, which is in turn applied to the transaction.
Abstract: Embodiments of the invention provide a method to process a transaction. At least one risk factor associated with a consumer account can be triggered by the transaction. The risk factor intersects the transaction with an associated fraud rule, which is in turn applied to the transaction. Risk factors can be customized by an issuer using a user interface.
23 citations
Authors
Showing all 1032 results
Name | H-index | Papers | Citations |
---|---|---|---|
Ayman Hammad | 43 | 115 | 6489 |
Mark Carlson | 42 | 114 | 5417 |
Patrick Faith | 39 | 101 | 5800 |
Selim Aissi | 31 | 87 | 2974 |
Lisa J. Anderson | 31 | 72 | 6418 |
Payman Mohassel | 28 | 105 | 3784 |
Kevin P. Siegel | 28 | 39 | 3496 |
Patrick Stan | 25 | 42 | 1915 |
Gyan Prakash | 25 | 133 | 2053 |
Konstantinos Markantonakis | 24 | 208 | 2697 |
Glenn Powell | 23 | 31 | 1834 |
Leigh Amaro | 23 | 23 | 2331 |
John F. Sheets | 21 | 41 | 1968 |
Edward W. Fordyce | 20 | 23 | 2222 |
Krishna Prasad Koganti | 19 | 23 | 1284 |