Visa Inc. is an American multinational financial services corporation headquartered in Foster City, California, United States. It facilitates electronic funds transfers throughout the world, most commonly through Visa-branded credit cards and debit cards. Visa does not issue cards, extend credit or set rates and fees for consumers; rather, Visa provides financial institutions with Visa-branded payment products that they then use to offer credit, debit, prepaid and cash-access programs to their customers. In 2008, according to The Nilson Report, Visa held a 38.3% market share of the credit card marketplace and 60.7% of the debit card marketplace in the United States. In 2009, Visa’s global network processed 62 billion transactions with a total volume of $4.4 trillion.Visa has operations across Australia, Oceania, Asia-Pacific, North America, Central and South America, the Caribbean, Western Europe, Central and Eastern Europe, Africa and Middle East. Visa Europe is a separate membership entity that is an exclusive licensee of Visa Inc.'s trademarks and technology in the European region, issuing cards such as Visa Debit and Visa Credit. Wikipedia.
Visa | Date: 2017-02-08
An object that enables electronic commerce is disclosed where the object has a holographic image on security contacts. The security contacts may be in communication with a security element that provides security features. The contacts may be placed in predetermined locations but may be extended to create a complementary identifiable image.
Visa | Date: 2017-04-26
Embodiments of the invention relate to efficient methods for authenticated communication. In one embodiment, a first computing device can generate an ephemeral key pair comprising an ephemeral public key and an ephemeral private key. The first computing device can generate a first shared secret using the ephemeral private key and a static second device public key. The first computing device can encrypt request data using the first shared secret to obtain encrypted request data. The first computing device can send a request message including the encrvpted request data, and the ephemeral public key to a server computer. Upon receiving a response message from the server computer, the first computing device can determine a second shared secret using the ephemeral private key and the blinded static second device public key. The first computing device can then decrypt the encrypted response data from the response message to obtain response data.
Visa | Date: 2017-03-08
Systems and methods are provided to identify payment data and desensitize the payment data by a secure card reader. Desensitization of the payment data may include replacing sensitive information such as discretionary data with zeroes or other predetermined values. Desensitization may also include replacing sensitive information with fraud detection data such as merchant identifying information. Desensitization of the payment data may leave certain payment data intact for customer tracking or other non-payment related purposes.
Visa | Date: 2017-04-19
A method and system are provided for authenticating a communication device. The method conducted at a remote server includes the steps of: receiving, from a communication device via a first communication channel, a fingerprint identifying the communication device and a value of a parameter of the communication device specific to the communication device and variable over time; determining whether the value is within a predicted range; and if the value is not within the predicted range or the predicted range has not been established, sending an additional authentication request via a second communication channel. The predicted range is learnt over a given number of interactions between the communication device and the remote server and an expected rate of change of the value.
Visa | Date: 2017-05-24
A method for delivering a key is disclosed. The method includes encrypting a first key using a second uniquely derived key to form an encrypted first key, and providing the encrypted first key to a transaction device. The transaction device contains the second uniquely derived key.
Visa | Date: 2017-03-15
Embodiments of the invention are directed at an enhanced data interface (EDI) for contactless communications between a mobile application operating on a mobile device and an access device (e.g., contactless reader) that allows for enhanced verification between the mobile device and access device. One embodiment of the invention is directed to a method. The method comprises a mobile device receiving a request for available applets from an access device and providing a list of available applets including trusted applet identifiers and untrusted applet identifiers to the access device. The method further comprises receiving a selection of an untrusted applet identifier from the list and an entity identifier associated with the access device, validating that the access device is authorized to access credentials associated with the selected untrusted applet identifier using the entity identifier, and providing the credentials associated with the selected untrusted applet identifier to the access device.
Visa | Date: 2017-05-31
A communication portal coupled with a processing system and a host having a first resource. The processing system has a second resource addressable by a terminal using a predetermined communication protocol. The communication portal receives a first communication from a terminal identifying the first resource. In response, the communication portal identifies the second resource, stores a data record associating the first resource and the second resource, and provides a response to the first communication to identify the second resource. The terminal then uses the communication protocol adapted for the second resource as a way to request an operation on the first resource. The portal communicates with the processing system to identify a request for an operation on the second resource and in response, communicates with the host to perform a second operation on the first resource based on the stored data record associating the first resource and the second resource.
Visa | Date: 2017-01-25
Systems and methods for generating a token are provided. An access device may receive, from a token vault computer, an encryption key and a credential identifier. The access device may generate a token using the encryption key and a current time. The access device may then transmit the token, the current time, and the credential identifier to the token vault computer. The token vault computer may receive the token, a current time, and a credential identifier. The token vault computer may retrieve an encryption key associated with the received credential identifier. The token vault computer may then validate the token based at least in part on the received current time and the retrieved encryption key.
Visa | Date: 2017-04-05
An entity may store various levels of sensitive and personal data in a secure computing environment. The entity may create permission rules which allow the data to be shared or not shared depending on the circumstances and situation. As an entity such as a human moves through life, the entity may be in touch with numerous electronic devices that act like sensors. The entity may share a token which may allow a sensor or operator of the sensor to access various levels of the sensitive data stored in the secure computing environment.
Visa | Date: 2017-03-22
Embodiments of the invention are directed to methods, apparatuses, and systems for processing transactions using a master applet on a mobile device. One embodiment of the invention is directed to a method comprising a master applet associated with a mobile application of a mobile device determining available applications on a mobile device, displaying the available applications to a user, and receiving a selection of one of the available applications from the user. The method further comprises obtaining encrypted credentials from the selected application, generating an encrypted payload including the encrypted credentials and transaction data using a master applet encryption key associated with the applet, and sending the encrypted payload to a processor computer. The processor computer decrypts the encrypted payload using a master applet decryption key, decrypts the encrypted credentials using a selected application decryption key, and uses the decrypted credentials and transaction data to initiate a transaction.