Home Blog Page 1636

Getting a grip of revenue

0

At a time when every penny of expenditure has to be signed off in triplicate it is strange to think that mobile operators are losing billions of euros through fraud and leakage but that is what’s happening. Alun Lewis reports on the problems and some ways to counteract them.

The old adage that any chain is only as strong as its weakest link has a particular relevance in mobile communications these days. Making the move towards higher value content and application services may bring with it higher revenues, but it also increases a service provider’s vulnerabilities to fraud and revenue leakage. On top of that, and given the far more complex value chains that are growing out there, any revenue assurance problems that a service provider may have will soon reverberate across that value chain, impacting content providers, mobile commerce merchants and, of course, the paying customer.
While fraud has always been with us — from those now almost nostalgic days of phone phreakers using children’s toy whistles to control the international PSTN during the 1960s — these days it truly has become big business, both for crooks and for those companies seeking to eliminate it. On top of that, the introduction of choice and competition into the telecoms space in the late 1990s brought a far more open and far more complex interconnection environment that was prone to both billing inaccuracies that could add up to millions and to outright fraudulent practice from the telecommunications equivalent of ‘fly by night’ companies

Direct challenge

Taking direct fraud first, much work to combat it is distributed across a number of different bodies such as the international GSMA Fraud Forum and regional bodies such as the Telecommunications UK Fraud Forum (www.tuff.co.uk) and the USA’s Communications Fraud Control Association (www.cfca.org). Many of these organisations reflect particular concerns in different countries, as well as the differences that occur in legislation and approaches to fraud and, for the time being at least, there is little in the way of truly coordinated formal activity between different countries — despite the fact that frauds are increasingly international in focus.
The whole interconnect regime in particular can be vulnerable to both outright fraud, as well as what might more charitably be called ‘creative billing’, as Martin Brown, ceo of Azure, BT’s specialist revenue assurance company, explains, “Revenue assurance is an extremely broad discipline and can cover everything from the efficient management of least cost routing to actual criminal fraud. While telecom-munications fraud has traditionally concentrated on the retail end of things, over the last few years there’s been an increase in companies looking to exploit weaknesses in the intercon-nect environment to make more money than they should.
“For example, a service provider in one country might set up a dialling scheme so that extra digits are added when dialling into another country. The call is received and then trans-ferred — but is billed back at local rates. Similarly, an element of ‘spoofing’ can be invoked so that they’re actually presented to billing systems as being mobile to mobile, for example, when in fact they are mobile to fixed or vice versa and involve a premium charge.
The implications of interconnect are also highlighted by Graham Coffey, wireless solutions manager at Agilent, “While the quality of radio links can lead to a lot of retransmits and longer time on-line, the interconnect regimes behind these services — the GRXs involve a lot more complexity — and vulnerability, especially when roaming is involved.”
The move towards added value and more advanced services also carries direct fraud risks — even in what are known as ‘developing countries’. Azure’s Brown continues, “In many regions in the world, the mobile infrastructure is the only public service that actually works. In South Africa, for example, the lack of ATMs and banks means that many poor people use their phones to transfer money to friends and family and there have been many cases of fraud exploiting this opportunity.”
Pat MaCarthy of ADC believes that we need new approaches to fraud, “Traditional fraud management focuses on detection and action follow up, analysing large electronic data record files and transactions to identify unusual activity. What we need now are fraud provisioning strategies that can identify some of the more common issues in real time and, using ‘Pay Now’ mechanisms, get the user, via their device, to authorise large transactions.”
In many cases however, revenues aren’t being collected because of the inefficiency of the service providers’ own infrastructure. Doug Carr, managing director of mediation company Narus sets out the issues, “It is no secret that many carriers have yet to address the problems of revenue leakage. But even when carriers are aware of the problem, they may well be unaware of its full extent, as fraudulent usage goes undetected.”
This point is echoed by Chris Merrick, wireless director at billing company Convergys, “While most operators have woken up to the importance of revenue services for voice only services, recent figures from Chorleywood Consulting seem incredible given that profitability has been pushed to the top of the operators’ agendas. Chorleywood estimate that operators are currently failing to capture up to 15% of all possible revenues — for an operator with a turnover of £20million, that could add up to an annual loss of £3m (â‚-4.36m). Acquisitions and mergers are a particular headache in this area. In the fixed service environment, for example, UK cable and telecoms operator Telewest inherited 63 switches and 15 billing systems when it acquired or absorbed other licensees. By putting in place a multi-disciplinary team to address revenue assurance they produced additional revenues of UKP3m (â‚-4.36m) per year.”
While these figures are impressive, they in reality reflect the past — and not the future. If the marketeers’ plans come to fruition, we’ll be spending far more on multimedia messaging, content and other entertainment services than we currently do on voice alone. Andrew Rodaway, corporate communications director at Intec raises some interesting caveats, “For a long time now, every year has been going to be the year of revenue assurance. Faced with a variety of challenges, operators now aren’t so much looking to invest in entirely new systems to combat fraud and leakage — what they are doing instead is looking to make far better use of the data that they have available at the moment. It’s important to realise that like many engineering and design problems, there’s a law of diminishing returns on investment,” he says.

Squaring the circle

“When you start adding premium content-based services to the equation, what was a trickle of billing or Quality of Service data can turn into a flood and it can be difficult to correlate and manage this effectively to get meaningful results. Squaring the revenue assurance circle in the 2.5 and 3G world now necessarily involves mediation companies like us interworking with other parts of the value chain, such as media or location-based services servers — which may be owned by entirely separate companies from the mobile operator,” Rodaway concludes.
Before looking at advanced services, we need to establish where we are with current services. Revenue assurance here already has an impact on nascent relationships being formed between operators and content providers. “30% of premium SMS is bad debt,” is the blunt comment of Rob Ellis, MD of iTouch. “The question is who covers this debt? While it is currently met by the operators, they effectively pass it on to content suppliers — bad debt is their argument for keeping out-payments to content partners low. We believe that this is a serious problem, as low out payments are stifling the m-Commerce industry by failing to incentivise content developers to produce compelling content.”
The length and multi-dimensional complexity of this service cycle also create what Frederick Aries, EMEA managing director of Kabira calls ‘pinch points’ in the flow of data — much of which has to be processed in real time to support pre-paid services, “Engineers sometimes get too focused on individual issues when what the ceo wants is an efficient return on investment. When you look at all the problems that can, and do, cause leakage, it’s essential to take as wide a view as possible across the multiple systems involved. Causes, for example, can involve data collection failures, data parsing failures, error log overruns, poor data correlation, time-expired matching, CDR rejections and data source identification errors. Ideally, you need to be able to touch multiple systems at different points if you’re to get a clear view of what’s going wrong and correct it accordingly.”
The other revenue assurance issue closely allied with next generation services involves Quality of Service and how this relates to billing and customer satisfaction. Paul Bassa of Tertio Telecoms says, “Elements of QoS may have been lurking in the revenue assurance toolbox for some time, but when will they really be put to use ? The answer inevitably depends on a combination of evolving technological capabilities and the benefits they could offer users. If a user decides to upgrade from silver to gold service on the spot, will they then be told on completion that they got the service and what the charge was?”
Bill Branagh EMEA vice president of Watchmark believes that there’s a crucial relationship between revenue assurance and QoS, “If you dropped the occasional voice call, the customer might have been unhappy for a short time. Drop an expensive multimedia transaction however and you’ll lose the money as well as the customer’s trust. Unless a mobile service provider is going to waste money over-provisioning, they’ll need to balance QoS and revenues in near real time.”
“Ultimately, revenue assurance in a world of advanced mobile devices and services is going to involve a far closer control of the handset environment,” comments Stephen Artim ceo of device management specialists DoOnGo. “That involves being able to do a lot more to the handset remotely than has previously been possible, in order to block or enable services and updates as the customer relationship changes.”
So, all in all, a longer and potentially more vulnerable chain, but one that has opportunities for everyone involved, but with hopefully smaller chances for crooks to exploit any inherent weaknesses.

Bottom line savings with electronic top-up

0

Operators can add between 10% and 15% to the bottom line figures associated with pre-pay customers, simply by deploying a system that allows customers to top-up their pre-pay accounts automatically using their credit cards or bank accounts, according to Upaid’s ceo, Ashley Ward.

Upaid’s HIPAAS service provides a secure payment method which can be plugged into by operators on one side and by banks and credit card companies on the other. As such it is capable of a whole range of m-payment services. However, as Ward explains, pre-pay top-up is a necessary and highly valuable starting point. “Operators need an instant payback; customers need educating on using mobile phones for things other than person-to-person communication. Therefore you need a stepped approach and pre-pay is the obvious starting point as the benefits to all are clear.”
For customers that benefit comes in the form of an easy, convenient and secure top-up method. The system send an SMS to alert the user that their account is down to a level set during registration, and all the customer has to do is reply to the text with their PIN and the amount. This is then authenticated by cross-referencing the phone’s MSISDN number and the PIN with credit card details given during the one-off registration process.
For the operator, the benefit is a massive reduction in the cost of the operation. Ward explained that, on average, the production, distribution, commission, fraud and leakage associated with scratch cards worldwide accounts for 10-12% of pre-paid turnover. However, he puts that cost at 25% for Europe due to the higher costs of raw materials and labour. Ward therefore stated that by switching to the Upaid service operators can put 10–15% straight to their bottom lines.
Ward further explained that Upaid, which has been in the m-payment market for some time, has changed its own business model. Ward said, “It was pretty much impossible to sell systems into operators and banks but they are interested in accessing a third party service. We no longer sell technology but are now selling a service.” The change in strategy has so far been well received and Upaid is currently trialling its top-up service with VISA.

Mobile data specialists opt for GPRS

0

Having halted development of its proprietary packet data network, UK mobile data provider, Cognito has instead chosen to concentrate on delivering integrated voice and data services for business applications using GPRS and GSM. Adam Hamilton reports.

Cognito’s md Steve Alderson explained that the change of direction “in these dark times” was due to the prevailing assessment by business users that proprietary networks are intrinsically limited.
Cognito’s growth  in the 1990s was based on a successful packet radio system, but despite large amounts spent on research and development, devices quickly became obsolete. By dispensing with onerous network and hardware costs associated with its previous proprietary system the company expects to leverage profitability in ‘niche’ mobile data markets.
Cognito’s new push and pull packet data service is aimed specifically at field service organisations and allows mobile workers to communicate with central database systems, using GPRS, GSM, PSTN, internet and email, via PDAs and laptops. The inclusion of GSM preserves service continuity and resilience where GPRS coverage is absent. Two-way data is managed by the Cognito Network, which delivers transactions immediately or via a store and forward facility, depending on network coverage and device status. Audit trails and status can be determined and voice, internet and email facilities managed.
Handling voice and a GPRS connection simultaneously is for the unequivocal Cognito md one of “the little details that make a system sing.”
December 2001 saw the system running on the Siemens SX45 using Pocket PC software, with an updated version ported to the XDA, for rollout in April 2003.
The solution aims to eliminate paperwork, data-entry duplication and reduce the amount of time call centre staff spend managing calls. It allows user-specified information to be sent to, and be captured by, remote workers, which is then presented on Windows-based Formsplus user-defined templates, which are streamed to, rather than held on, the device. WTP scripting enables the creation of data stores, templates and processing rules without recourse to complex programming and allows application ammendments and remote updates. Therefore, same day invoicing, up-to-the-minute stock management and formatted printing is possible. The system is also flexible enough to handle a variety of data including signatures and barcodes. “I reckon Cognito invented forms ten years ago,” was the earnest assessment of Steve Alderson, elaborating on the interface with management information systems. Cognito also handles the entire process of network authentication, providing user names and passwords and interrogating them at the point of access.
The company has ample experience of developing end-to-end solutions for field services and supplying all the constituents of a packet data system itself; including the network, mobile data units and the operating system. It has overcome past limited potential for software development and fragile solutions using PC/GSM connectors. Its Messager 111 service with ServiceTec had also proved that costs based on usage were difficult to predict and by charging a fixed monthly tariff (currently UKP45 per month and comparable with the Blackberry), costs were reduced. Developing PCs with embedded GSM units as Panasonic, Motorola and Psion had and providing mobile workers with laptops no longer appeals. Present competition from the likes of IBM and Motorola is not felt to be a major concern because  these earlier technologies are not fully realised. “I don’t see the need… for TETRA in this market,” was the emphatic comment from Steve Alderson, in the light of the data services launch.
Cognito is already considering future partnerships for potential expansion and is particularly interested in companies that operate internationally. It already works with the four major UK operators and has two points of presence in the Vodafone network. Six thousand units have been sold so far, despite the market having seen a reduction in service forces. Customers include ntl Group, Rank Leisure Machines, Avery Berkel and Planned Maintenance Engineering, whose acquisition was primarily due to the addition of GSM capability. Confident of its approach, the objective is twenty thousand UK customers in the long term, with imminent expansion into Eire. Holland is also cited as an “interesting” market to explore. The aim for Cognito is to drive value upwards, for a relatively small but lucrative user base, through improved connectivity, integration and value-added services.

Cell location as a service

0

A low-cost, portable and simple alternative to GPS satellite location has been developed using mobile phone signals. Overview Mapping’s Verilocation service is based on cell location and can pinpoint a registered phone with signals garnered from the UK’s four major operators. It displays location data combined with Overmapping’s own digital street-level maps on a website and is accurate to one hundred metres. Designed as a pay-as-you-go application, it is aimed at time/service critical industries considering GPS location and telemetry. However, anyone with a GSM phone could utilise the system, which ties location accurately to the road network, without unnecessary sub-two metre GPS precision.

Overview Mapping is licensed by Ordnance Survey and offers a range of mapping solutions to businesses, including internet portals.

Perfect picture size for MMS

0

Fulfilling the potential of MMS information services can only be achieved if the images received by the user do justice to the subject. This is the view of Brainstorm’s ceo, Craig Massey, who explained that the majority of service delivery systems don’t allow the image to be optimised for each handset. “The key element for content delivery is the user experience, irrespective of handset and therefore we have concentrated on transcoding and image sizing.”

He went on to explain that becuase the screen sizes and resolutions differ dramatically it is imperative that images are re-sized. However, he said, “Most systems re-size images according to pre-set crops.  Effectively what we do is build templates for each and every handset which re-purpose and re-format the image to display it to the best ability. Any cropping is done manually.”
The effect of this was demonstrated by Massey who used the simple example of an image of a goal scored at a football match. The nature of the action means that the vital part of the image could be anywhere on the screen and not necessarily in the middle. It is not predictable and thefrefore an automated crop — centring the image or cropping to pre-set formats — could in a worst case scenario, render the image useless.
The rendering and sizing of images is just a small part of the complete content delivery system offered by Brainstorm and a fuller explanation of this will appear in next month’s content management feature.ETSA ad here

Fill-up your batteries

0

Mobile device batteries, for so long now one of the most constraining features of mobile terminals, could be set for a radical change, according to Jane Dennis of Casio. She said, “Within a year or two battery technology will be capable of re-fuelling.” Following much the same principle as is used with cigarette lighters, (although different fuel) users will be able to re-fuel the battery cells of their mobile phones on the fly, therefore minimising the risk or being left with a useless phone.

Medlock add here

Europe’s WLAN growth to continue

0

The growth of the public wireless local area networking (P-WLAN) market is set to continue in both the USA and Western Europe, driven by business travellers’ appetite for cheap and fast remote access to the Internet, according to a new report published this week by Analysys.

The report, Public WLAN Access in Western Europe and the USA: market analysis and forecasts, anticipates that revenue will grow from USD10.9million (â‚-9.99m) in Western Europe to USD2.64billion (â‚-2.42bn) in Western Europe by 2007.
Hotspots, which are currently being installed in airports, hotels, conference facilities, cafés, restaurants and rail stations, are estimated to grow from Western Europe’s curent 1400 to 30,000, over the same time period.
“Whilst take-up of public WLAN services has been slower than we anticipated, it still represents a significant opportunity for operators and other service providers,” said Maja Kecman, main author of the report. “In both Europe and the USA, telecomms operators have shown interest in the WLAN market as a complement to their existing networks, but have been cautious about investing in an uncertain market where there are still technological and regulatory issues to be resolved,” Kecman explained.
Market uncertainty is compounded by the fact that no single business model has yet emerged, said the authors. The report outlines five main business models, the most common of which involves the hotspot site owner and operator (or wireless Internet service provider) acting as the main players in the P-WLAN value chain.
“We expect the dominant business models to evolve significantly in the next three or four years,” said the report’s co-author, Monica Paolini. “By 2007, the US market will be characterised by a non-integrated value chain, with retail service providers not having exclusive control of the network infrastructure. In Europe, we expect fixed and mobile operators to prevail as they are able to leverage their existing customer base and backhaul agreements more effectively.”

CDRs not enough for fraud detection

0

Basing future fraud prevention on Call Detail Records (CDRs) could leave systems seriously short of the mark, according to Neural Networks.

“The traditional approach to fraud detection has been based on CDRs but with the introduction of data services these are not the only source of communication informa-tion and they also mean that action is always reactive,” said Jason Lane-Sellers, senior fraud consultant at Neural Technologies.
He further stated that as most systems work by setting rules and thresholds that are designed to trigger alarms, the sheer amount of data being passed to fraud analysts makes their jobs impossible from the start. “It is not unusual for 1500–2000 alarms to be  triggered every four hours. A fraud analyst can process a maximum of 17 of these a day.”
What Neural Technologies has produced is a fraud management system that combats both these issues head on. It takes data from a range of sources, including the data-specific elements in the application layer and authentication server, as well as CDRs. It then runs that information through a two-tier automated analysis process. This brings into the process a high level of behaviour modelling and individual profiling which constantly learns from activity on the network and enables the system to deliver a dramatically reduced number of potential fraud alarms to analysts. “60-80% of the alarms which run through the second stage are fraud. With other, single tier systems, this figure is less than 1%.”
He further suggested that this was not only soul-destroying for those faced with analysing the reports but it also affected customers as they could find their accounts stopped by systems unable to identify whether they were perpetrating fraud or not. This is particularly important as, he suggested, “The best fraudsters also look like your best customers.”
A worst case scenario would therefore be an international traveller who consistently found his account blocked when abroad because the system identified him as making ‘unusual behaviour.’ If the system is incapable of learning and inaccurate actions are repeated then the likely outcome is churn.
So confident is the company in its system, that Neural is now offering it to operators on a performance basis. This means that operators will only pay if savings are made. Neural is willing to offer this as a stand-alone option or in conjunction with more traditional payment methods. Sprint, for example, is paying for its system by a combination of licence fee and a capped performance payment.
However Lane-Sellers, himself a former fraud manager at Vodafone UK, had another word of caution for operators, “80% of fraud can be sourced back to the subscription process. It can be hidden as bad debt and then identified as complicated types of fraud but it all comes from that starting point. Operators need to address this and prevent it happening.”

Research into base station safety

0

Additional funding for research into base stations has been announced by the UK Home Office. In one of the world’s first studies, the Mobile Telecommunications and Health Research Programme will look at the prevalence of childhood leukaemias and cancers near base stations.

Another MTHR project will consider whether exposure to RF signals is linked to symptoms reported by mobile phone users. The funding will also benefit an existing pilot study of brain cancers and neurodegenerative diseases in users, and research into TETRA radio. An international committee of experts, chaired by Prof. Lawrie Challis, manages the programme and allocates funding. He noted the “public concern” about exposure to handsets, phone masts and RF emissions and called for further “research to investigate whether they could cause health effects or not.” 

Samsung completes OS set with Series 60 SGH-D700

0

Samsung has again demonstrated a willingness to support multiple operating systems with the creation of the SGH-D700, its first smartphone to be based on Nokia’s Symbian-based Series 60 platform.

The phone, which also includes a swivel screen and a digital camera,  joins previously announced Samsung smartphones such as the Palm OS-based SPH-i500 and SGH-i500, and the soon-to-be-released SPH-i600, which uses Microsoft’s Smartphone 2002.
Slated for availability in Europe during the third quarter of 2003, the clamshell SGH-D700 is tri-band, with an integrated digital camera and the first swivel screen seen on a smartphone.
With the 16-bit rotating TFT display comes a camcorder application to make use of its integrated VGA resolution digital camera. Its video messaging features will link with Nokia’s own 3650 and enables users to exchange video clips through MMS and e-mail. It will also be possible to play back streaming audio and video courtesy of a pre-installed RealOne player.
Software-wise, the SGH-D700 shares a number of applications with Nokia’s 7650 and 3650 models, but also offers more functionality in some areas. Full MMS and POP3/IMAP4/SMTP e-mail support are on the list, as is a voice memo function; voice recognition for dialing names and carrying out certain commands; SyncML support (vCard, vCalendar); support for both MIDI and WAV files being used as ringtones; a WAP 2.0 browser; and vibration alert.
Another trait shared with the Nokia 3650 is the SGH-D700’s MMC Card expansion slot which enables storage expansion. Users can transfer and play back MP3 files from both internal memory and an MMC storage card. (See p23-24 for more information on data storage options). However, Samsung did not disclose whether a dedicated player is being used to play back audio or whether that functionality is provided by the RealOne player.
The SGH-D700 will be equipped with 4MB of internal, non-volatile memory, and will come bundled with a handsfree set. Users will be able to synchronize information with Microsoft Outlook, but Samsung did not comment on     whether this — as with Nokia’s 7650 and 3650 models — will be limited to calendar and contacts information. The SGH-D700 does sport one improvement in the area of synchronization, however, as it supports USB connectivity.

- Advertisement -
DOWNLOAD OUR NEW REPORT

5G Advanced

Will 5G’s second wave deliver value?