Visa Inc. is an American multinational financial services corporation headquartered in Foster City, California, United States. It facilitates electronic funds transfers throughout the world, most commonly through Visa-branded credit cards and debit cards. Visa does not issue cards, extend credit or set rates and fees for consumers; rather, Visa provides financial institutions with Visa-branded payment products that they then use to offer credit, debit, prepaid and cash-access programs to their customers. In 2008, according to The Nilson Report, Visa held a 38.3% market share of the credit card marketplace and 60.7% of the debit card marketplace in the United States. In 2009, Visa’s global network processed 62 billion transactions with a total volume of $4.4 trillion.Visa has operations across Australia, Oceania, Asia-Pacific, North America, Central and South America, the Caribbean, Western Europe, Central and Eastern Europe, Africa and Middle East. Visa Europe is a separate membership entity that is an exclusive licensee of Visa Inc.'s trademarks and technology in the European region, issuing cards such as Visa Debit and Visa Credit. Wikipedia.
Visa | Date: 2017-02-08
An object that enables electronic commerce is disclosed where the object has a holographic image on security contacts. The security contacts may be in communication with a security element that provides security features. The contacts may be placed in predetermined locations but may be extended to create a complementary identifiable image.
Visa | Date: 2017-03-08
Systems and methods are provided to identify payment data and desensitize the payment data by a secure card reader. Desensitization of the payment data may include replacing sensitive information such as discretionary data with zeroes or other predetermined values. Desensitization may also include replacing sensitive information with fraud detection data such as merchant identifying information. Desensitization of the payment data may leave certain payment data intact for customer tracking or other non-payment related purposes.
Visa | Date: 2017-04-26
Embodiments of the invention relate to efficient methods for authenticated communication. In one embodiment, a first computing device can generate an ephemeral key pair comprising an ephemeral public key and an ephemeral private key. The first computing device can generate a first shared secret using the ephemeral private key and a static second device public key. The first computing device can encrypt request data using the first shared secret to obtain encrypted request data. The first computing device can send a request message including the encrvpted request data, and the ephemeral public key to a server computer. Upon receiving a response message from the server computer, the first computing device can determine a second shared secret using the ephemeral private key and the blinded static second device public key. The first computing device can then decrypt the encrypted response data from the response message to obtain response data.
Visa | Date: 2017-05-24
A method for delivering a key is disclosed. The method includes encrypting a first key using a second uniquely derived key to form an encrypted first key, and providing the encrypted first key to a transaction device. The transaction device contains the second uniquely derived key.
Visa | Date: 2017-01-25
Systems and methods for generating a token are provided. An access device may receive, from a token vault computer, an encryption key and a credential identifier. The access device may generate a token using the encryption key and a current time. The access device may then transmit the token, the current time, and the credential identifier to the token vault computer. The token vault computer may receive the token, a current time, and a credential identifier. The token vault computer may retrieve an encryption key associated with the received credential identifier. The token vault computer may then validate the token based at least in part on the received current time and the retrieved encryption key.
Visa | Date: 2017-04-19
A method and system are provided for authenticating a communication device. The method conducted at a remote server includes the steps of: receiving, from a communication device via a first communication channel, a fingerprint identifying the communication device and a value of a parameter of the communication device specific to the communication device and variable over time; determining whether the value is within a predicted range; and if the value is not within the predicted range or the predicted range has not been established, sending an additional authentication request via a second communication channel. The predicted range is learnt over a given number of interactions between the communication device and the remote server and an expected rate of change of the value.
Visa | Date: 2017-05-31
A communication portal coupled with a processing system and a host having a first resource. The processing system has a second resource addressable by a terminal using a predetermined communication protocol. The communication portal receives a first communication from a terminal identifying the first resource. In response, the communication portal identifies the second resource, stores a data record associating the first resource and the second resource, and provides a response to the first communication to identify the second resource. The terminal then uses the communication protocol adapted for the second resource as a way to request an operation on the first resource. The portal communicates with the processing system to identify a request for an operation on the second resource and in response, communicates with the host to perform a second operation on the first resource based on the stored data record associating the first resource and the second resource.
Visa | Date: 2017-03-22
Embodiments of the invention are directed to methods, apparatuses, and systems for processing transactions using a master applet on a mobile device. One embodiment of the invention is directed to a method comprising a master applet associated with a mobile application of a mobile device determining available applications on a mobile device, displaying the available applications to a user, and receiving a selection of one of the available applications from the user. The method further comprises obtaining encrypted credentials from the selected application, generating an encrypted payload including the encrypted credentials and transaction data using a master applet encryption key associated with the applet, and sending the encrypted payload to a processor computer. The processor computer decrypts the encrypted payload using a master applet decryption key, decrypts the encrypted credentials using a selected application decryption key, and uses the decrypted credentials and transaction data to initiate a transaction.
Visa | Date: 2017-04-05
An entity may store various levels of sensitive and personal data in a secure computing environment. The entity may create permission rules which allow the data to be shared or not shared depending on the circumstances and situation. As an entity such as a human moves through life, the entity may be in touch with numerous electronic devices that act like sensors. The entity may share a token which may allow a sensor or operator of the sensor to access various levels of the sensitive data stored in the secure computing environment.
Visa | Date: 2017-09-13
A method for enabling a value-added transaction involving a vehicle and a merchant via a mobile device is disclosed. Merchant information may be broadcasted from a merchant terminal. Vehicle specific data may be received at the merchant terminal identifying the vehicle in response to the broadcasted merchant information. Transaction data may be provided to the mobile device to initiate an intended transaction. Payment data may be received from the mobile device at the merchant terminal in response to the provided transaction data. Before completing the intended transaction, a value-added transaction offer may be provided to the mobile device. In response to the provided value-added transaction offer, an acceptance of the value- added transaction offer may be received. The intended transaction and the value- added transaction offer may be completed as a single transaction.