scispace - formally typeset
Search or ask a question
Institution

Visa Inc.

CompanyLondon, United Kingdom
About: Visa Inc. is a company organization based out in London, United Kingdom. It is known for research contribution in the topics: Database transaction & Transaction data. The organization has 1031 authors who have published 1076 publications receiving 36053 citations. The organization is also known as: Visa & Visa Inc.


Papers
More filters
Patent
Wang Quan1
31 Jan 2020
TL;DR: In this article, the authentication result is determined by the processing server computer based on a comparison of the derivative of the second biometric template to a derivative of a first template accessible to the server computer.
Abstract: Embodiments of the invention are directed to a method. The method may comprise receiving a second biometric template of a user, and providing an authentication request message comprising an electronic identity and a derivative of the second biometric template of the user to a resource provider computer to conduct an interaction. The authentication request may be forwarded to a processing server computer by the resource provider computer, and the user device may receive an authentication response message comprising an authentication result from the processing server computer. The authentication result may be determined by the processing server computer based on a comparison of the derivative of the second biometric template to a derivative of a first biometric template accessible to the processing server computer. The authentication result may also be based on the validity of the electronic identity.

8 citations

Patent
24 Oct 2019
TL;DR: In this paper, a data processing computer may facilitate an exchange of a data transfer message between respective applications of a first and second device by maintaining an electronic record according to the exchange, and data comprising the net transfer value may be transmitted to a blockchain provider.
Abstract: Embodiments of the invention are directed to a method for reducing a computational burden of a blockchain provider. A data processing computer may facilitate an exchange of a data transfer message between respective applications of a first and second device. The data processing computer may maintain an electronic record according to the exchange. A net transfer value may be determined for the record and data comprising the net transfer value may be transmitted to a blockchain provider. Receipt of the data by the blockchain provider may cause the blockchain provider to update a ledger with the net transfer value.

8 citations

Patent
Anne Marie Louie1, Shipra Jha1
13 Feb 2013
TL;DR: In this paper, the authors describe a set of web services to facilitate the management, administration, and fulfillment of account features assigned on the basis of individual payment accounts, including a service configured to query for account features available to a specific account, a service configurable to query disclosure material relevant to an account feature assigned to a particular account, and a service that allows a third party to submit user acceptance of terms and conditions of account feature assignment by an account holder of a specific user.
Abstract: Systems and methods configured to use a set of web services to facilitate the management, administration, and fulfillment of account features assigned on the basis of individual payment accounts The web services include a service configured to query for account features assigned to a specific account, a service configured to query for account features available to a specific account, a service configured to query for disclosure material relevant to an account feature assigned to a specific account, a service configured to submit user acceptance of terms and conditions of an account feature by an account holder of a specific account, and a service configured to request assignment of an account feature to a specific account The web services allow a third party to build customized applications to manage account features for assignment and fulfillment, based on a set of centralized and secured account feature data

8 citations

Patent
10 Aug 2010
TL;DR: In this paper, a merchant's data processing system may provide payment transaction data in a first format (e.g., Track 1 ) to a payment processing network, and if the issuer is one that is expecting or requires that the transaction data be supplied in a second format, then the system performs the data mapping processes needed to provide the data in the second format to the issuer.
Abstract: Systems and associated apparatuses and methods for processing payment transactions. A merchant's data processing system may provide payment transaction data in a first format (e.g., Track 1 ) to a payment processing network. The payment processing network may determine the issuer to which the data will be provided as part of a process for authorizing the payment transaction. It is determined if the issuer is one that is expecting or requires that the data be provided in a second format (e.g., Track 2). If the issuer is one that is expecting or requires that the transaction data be supplied in the second format, then it is determined if the issuer is enrolled in the appropriate data mapping service. If the issuer is enrolled in the data mapping service, then the inventive system performs the data mapping processes needed to provide the data in the second format to the issuer.

7 citations

Patent
10 Mar 2017
TL;DR: In this paper, a machine learning model is used to evaluate malicious activity with respect to an IP address and/or network domain, and a maliciousness score/classification is returned.
Abstract: Embodiments provide for maliciousness scores to be determined for IP addresses and/or network domains. For example, a request to evaluate malicious activity with respect to an IP address/network domain may be received. Multiple, and in some cases disparate, third-party systems may provide malicious activity information associated with the IP address and/or network domain. A feature set may be extracted from the malicious activity information and statistical values may be calculated from the extracted data and added to the feature set. The features set may be provided to a machine learning model as input and a maliciousness score/classification may be returned. A remedial action may be performed in accordance with the output of the machine learning model.

7 citations


Authors

Showing all 1032 results

NameH-indexPapersCitations
Ayman Hammad431156489
Mark Carlson421145417
Patrick Faith391015800
Selim Aissi31872974
Lisa J. Anderson31726418
Payman Mohassel281053784
Kevin P. Siegel28393496
Patrick Stan25421915
Gyan Prakash251332053
Konstantinos Markantonakis242082697
Glenn Powell23311834
Leigh Amaro23232331
John F. Sheets21411968
Edward W. Fordyce20232222
Krishna Prasad Koganti19231284
Network Information
Related Institutions (5)
Adobe Systems
8K papers, 214.7K citations

77% related

German Research Centre for Artificial Intelligence
3.9K papers, 75.2K citations

77% related

NICTA
2.5K papers, 79.8K citations

76% related

Hasso Plattner Institute
2.7K papers, 58.1K citations

76% related

Swedish Institute of Computer Science
1.3K papers, 56K citations

76% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20221
202137
2020138
2019118
201869
201761