Documente Academic
Documente Profesional
Documente Cultură
of
Telecommunications
September 2007
LEGAL NOTICES
ACCESS, ACCESSibility, ACCESS S&E, Brience, CCNS, Crossroads, Cell-U-Rator, ChurnManager,
CloneDetector, Customer Positive File, DataFlash, DataNet, EDT, Electronic Data Transport, Encrypt-A-Key,
Fleet-On-Track, FMR Plus, Follow Me Roaming Plus, FraudChallenger, FraudForce, FraudInterceptor,
FraudManager, FraudX, GlobalRoam, GUIDELINES, INLink, inpack, INPort, INPosition, LATALink,
LAWBUST, Phone Me Anywhere, Phone Me Anywhere Plus, PMA, PMA Plus, RoamerXchange,
SOLUTIONS Conference, S.T.A.R.S. STREAMLINER, S.T.A.R.S. STREAMLINER Terminal Access
Reporting System, STREAMLINER, TransAction Manager, Syniverse, Syniverse Datanet, Syniverse logo,
Syniverse Spark design, UniRoam, Visibility and Whatever It Takes
are services, products, service marks, or trademarks of Syniverse Technologies.
SmartAlert Real Time Analysis System is a registered mark of Verizon Data Services Incorporated.
SmartAlert is a mark of Verizon Data Services Incorporated.
All other marks are the properties of their respective owners.
As used herein, denotes registration in the United States.
Copyright 2001 - 2007 Syniverse Technologies Inc.
All rights reserved under U.S. and International laws.
This material is the exclusive property of Syniverse Technologies.
Any reproduction or distribution without the express prior written approval
of Syniverse Technologies is strictly prohibited.
Acronyms
AC
ACCESS
ACCESS S&E
ACD
ACH
ADP
ADS
AIN
ALI
AMA
AMPS
ANI
ANSI
AORS
AP
API
ARP
ARPU
ASCII
ASE
ASM
ASN.1
ATIS
ATM
AVL
BAIC
BAOC
BARG
BIC-Roam
BID
BOIC
BOIC-exHC
BTA
CA
CALEA
CAMEL
CAP
CAVE
CCITT
CCNS
CCS
CCSA
CDMA
CDPD
CDR
CEPT
CFB
CFNR
authentication center
Automated Clearinghouse Calls Exchange Settlement System
ACCESS Settlement & Exchange
automatic call distribution
automatic clearinghouse
Application Database Platform
automatic database synchronization
Advanced Intelligent Network
automatic location identifier
automated message accounting
Advanced Mobile Phone System
automatic number identification
American National Standards Institute
ACCESSibility Online Reporting System
adjunct processor
Application Program Interface
authorized receipt point
average revenue per unit
American Standard Code for Information Interchange
Application Service Element
Account Status Monitor
Abstract Syntax Notation One
Alliance for Telecommunications Industry Solutions
asynchronous transfer mode
automatic vehicle location
Barring of All Incoming Calls
Barring of All Outgoing Calls
Billing and Accounting Rapporteurs Group
Barring of Incoming Calls when Roaming
Billing Identification or Billing Identifier
Barring of Outgoing International Calls
Barring of Outgoing International Calls except to Home Country
basic trading area
certification authority
Communications Assistance for Law Enforcement Act
Customized Application Mobile Enhanced Logic
competitive access provider
cellular authentication and voice encryption
Consultative Committee on International Telegraphy & Telephony
cellular carrier network services
common channel signaling
common channel signaling application
code division multiple access
cellular digital packet data
call detail record
Confrence Europene des Administrations des Postes et des Tlcommunications
call forward on busy
call forward on no reply
CFU
CGI
CGSA
CIBER
CLASS
CLEC
CLIP
CLIR
CLLI
CMP
CMRS
CMS
CNAM
COLP
COLR
COW
CPE
CPF
CPN
CPNI
CPS
CRIP
CRL
CSO
CSS
CSR
CTIA
CUG
CUR
DASH
DBA
DCMS
DCS
DDI
DDL
DECT
DES
DLL
DMH
DN
DNIS
DNS
DPC
DRP
DSN
DSS
DTMF
EDI
EDT
EE
EIR
EMS
EPI
ERMES
ESID
ESMR
ESN
ETSI
exm
FCC
FDMA
FENE
FIPS
FSN
FSS
FTAM
FTP
FWA
GENDIO
GHz
GIF
GLR
GMSC
GMT
GPRS
GPS
GSM
GSMA
GT
GTT
GUI
GXE
HDML
Hz
HLDL
HLR
HPLMN
HTML
HTTP
HTTPS
ICC
ICE
ICP
ICRL
IDEA
IFAST
ILEC
IMEI
IMF
IMSI
IMTA
IN
INF
INPort
INS
InterNIC
IP
IPDR
IPM
IPC
IREC
IREG
IRM
IS41
ISDN
ISG
ISO
ISP
ISUP
ISVM
ITA
ITU
IVR
IXC
JPEG
KHz
KMC
LAN
LATA
LDAP
LDMTS
LEC
LMCC
LMDS
LIDB
LNP
LRC
LRN
LSMS
LSOA
LSP
LTI
MABEL
MAP
MBI
MCC
MCL
MD
MD5
MDN
ME
MEP/TCP
MEP/VSP
MEPX.25
MHz
MID
MIME
MIN
MMI
MMS
MNC
MOC
MoU
MOU
MPE
MREDD
MRFAC
MS
MSA
MSC
MSCID
MSISDN
MST
MSU
MTA
MTC
MTP
MTSO
NACN
NAIG
NAM
NAMPS
NANP
NENA
NDA
NIML
NOI
NNSP
NPA
NPAC
NPAC SMS
NPA-NXX
NPDB
NSDPF
NSP
NNSP
NTIA
OCC
OC
OCH returns
OCOS
OID
OMAP
OMECS
Multi-endpoint X.25
megahertz
mobile identification digits
Multipurpose Internet Mail Extension
mobile identification number
man-machine interface
Multimedia Messaging Service
mobile network code
mobile originated call
Memorandum of Understanding
minutes of use
Message Processing Engine
multi-routing extensible data director
Manufacturers Radio Frequency Advisory Committee
mobile station
metropolitan statistical area
mobile switching center
mobile switching center identification
mobile station Integrated Service Digital Network number
memory segment transfer
mobile station unit or message service unit
major trading area
mobile terminated call
Message Transfer Part
mobile telephone switching office
North American Cellular Network
North American Interest Group
numeric assignment module
narrowband AMPS
North American Numbering Plan
National Emergency Number Association
non-disclosure agreement
Network Interface Management Language
Notice of Inquiry
New Network Service Provider
numbering plan area
Number Portability Administration Center
Number Portability Administration Center Service Management System
Area code-exchange-line number
Number Portability Database
Non-Signaling Data Protocol for Fraud
New Service Provider or Network Service Provider
New Network Service Provider
National Telecommunications and Information Administration
other charges and credits
Open Connectivity
other clearinghouse returns
Origination Class of Service
object identifier
Operations, Maintenance, and Administration Part
Online Message Error Correction System
OMF
OPC
OSP
ONSP
OSP
OSS
OTASP
PAMR
PAR
PAS
PCA
PCIA
PCN
PCS
PDA
PDC
PDESC
PDF
PDU
PFM
PGP
PGS
PIC
PIN
PING
PLMN
POP
POPs
POTS
PPDX
PPP
PQI
PQO
PR1
PR2
PSN
PSTN
PUK
RA
RAID
RAN
RBOC
RCS
RCV
RDDS
RF
RSA
RSC
SA
SCCP
SCE
SCP
SDR
SERG
SGML
SIBB
SID
SIF
SIM
SIO
SLIP
SLP
SLR
SLS
SM
SMG
SMPP
SMR
SMS
SNMP
SOA
SOP
SP
SPC
SPID
SQL
SRAM
SS
SS7
SSD
SSL
SSP
S.T.A.R.S.
STP
SWID
SWNO
TACL
TADIG
TAP
TCAP
TCL
TCOS
TCP/IP
TDMA
TDN
TDP
TDR
TDS
TFA
TFP
TFR
TIA
TLDN
TMan
TMSI
TN
TNI
TPM
TN
TPT
TRP
TSI
TSIAPL
TUP
TWG
ULS
UMTS
URL
USTA
UTC
UVS
UWCC
VAT
VHS
VIDB
VLR
VOLSER
VPLMN
VRU
VSN
VSP
W3C
W-CDMA
WAN
WAP
WCS
Web
WIN
WLL
WNP
WPR
WPRR
WSMS
XML
Symbols
*18
Code entered on a wireless telephone to alert a switch that a roamer wants to activate call
forwarding.
*19
Code entered on a wireless telephone to alert a switch that a roamer wants to cancel call
forwarding.
800 calling hit
Incoming call placed by a criminal. Hackers use automated programs to dial thousands of 800
numbers until they find a vulnerable system.
800 Database Access
Syniverse service that provides access to customer-selected 800 databases for 800 number lookups
and routing information.
1.5-way paging
Term coined by SkyTel Communications Inc. to refer to guaranteed message receipt or advanced
messaging, features that ensure a subscriber will receive messages that were sent when the
subscriber was out of range.
1.7-way paging
Paging service that offers more than guaranteed messaging, but not as much as full two-way
paging. Subscriber has limited response messaging but no capability to create responses.
1818
Code entered on a personal digital cellular (PDC) phone to enable call delivery or force
registration. The subscriber can then use the PDC phone to place and receive calls while traveling
in Japan.
3GWP
3rd Generation Working Party. A subcommittee established within the Billing and Accounting
Rapporteurs Group (BARG) of the Global System for Mobile Communication (GSM) Association
to define the charging principles for Universal Mobile Telecommunications System (UMTS).
5ESS
Registered trademark name for Lucent Technologies, Inc. electronic switching system.
access fraud
A
A band
Type of license granted to a Personal Communications Services (PCS) carrier/operator in the U.S.
An A-block license allows the license holder to provide PCS service in a major trading area
(MTA). An A-block license holder can use 30 MHz of the spectrum. Other PCS licenses include
B-block, C-block, D-block, E-block, and F-block.
A-B switch
Allows a wireless phone to be programmed to select service from either an A-side or a B-side
carrier/operator.
A-Key
64-bit parameter associated with a mobile station (MS) and known only to the MS and its
associated authentication center (AC). The A-Key and electronic serial number (ESN) are usually
programmed into the handset by the manufacturer.
A-side carrier/operator
Standard language for the description of data defined in 1988. Reference International
Telecommunications Union (ITU) TX X.208. International Standards Organization (ISO) 8824.
AC
A roamer settlement and exchange service provided by Syniverse to meet the data exchange,
control, and financial settlement needs of wireless carriers/operators. Stands for Automated
Clearinghouse Calls Exchange Settlement System.
access charge
Flat, monthly fee charged to a subscriber for the use of a wireless system (whether or not the
subscriber makes or receives any calls). Depending on the service plan (rate plan) chosen, this fee
may include a number of free minutes of connect time.
access control
Special fee local phone companies are allowed to charge customers for the right to connect with
the local phone network. Cellular subscribers contribute to access fees and pay a federal excise
tax.
access fraud
1) Type of fraud that occurs when a wireless phones electronic serial number (ESN) or mobile
identification number (MIN) is manipulated to emulate a legitimate wireless subscriber.
2) Subscribing for service using false information.
11
Connect a signaling end point, such as a service control point (SCP) or service switching point
(SSP), to a signal transfer point (STP). Only messages originating from or sent to a signaling end
point are transmitted on an A link.
ACCESS S&E Services
Roamer settlement and exchange service developed and provided by Syniverse to meet the data
exchange, control, and financial settlement needs of Global System for Mobile Communication
(GSM) operators/carriers. ACCESS is the acronym for Automated Clearinghouse Calls Exchange
Settlement System, and S&E stands for Settlement and Exchange.
ACCESS server
Server at Syniverse that connects with ACCESSibility servers at each member carrier/operator
site and transmits daily settlement data.
ACCESSibility server
Server located at each member carrier/operators site that receives and maintains settlement data
from the ACCESS server.
ACCESSibility Online Reporting System (AORS)
State of the art decision support system that allows ACCESS members to retrieve and select
settlement data for customized reporting, graphing, and analysis.
account
Customer of record with a specific wireless carrier/operator. It is the receipt point of a wireless
phone bill.
account level summary
Point in an account structure that summarizes the charges at or below that level.
account specific charges
Charges that are specific to an account level only, which cannot be directly associated with a
phone. These charges are applied directly to summary bill accounts.
Account Status Monitor (ASM)
Independent turbo processes that evaluate call records, track subscriber usage, and detect
indications of fraudulent activity. Each turbo process specializes in detecting a certain kind of
fraud.
account structure modeling
Code indicating a function for administering supplementary services , invoked either manually by
a subscriber or automatically by the network. Action types include registration, activation,
deactivation, erasure, interrogation, and invocation.
actions
Recommended responses to be taken when a particular alarm or threshold event generates a case
in FraudX. The responses are automatic, automatic queue, and manual.
12
aged messages
activation
Process of setting up call forwarding after a *18 message has been acknowledged by the home and
serving switches.
active case list
Table of active cases of suspected fraud created by FraudX detection and analysis components.
Cases are listed by the highest ranked fraud type and by confidence rating within the fraud type.
actual line range
Range of numbers a carrier/operator actually uses. A license may include the range 0000-9999 but
the carrier/operator may not use all the available numbers.
ad hoc reports
Type of advanced antenna technology that continually monitors a received signal and dynamically
adapts signal patterns to optimize wireless system performance.
adjacent channel interference
Signal impairment to one frequency due to the presence of another signal on a nearby frequency.
adjunct processor (AP)
Computer located outside a telephone switching system that issues commands to the switch.
adjustment
The term AMPS, originated by AT&Ts Bell Laboratories, before the breakup of the Bell System
in 1984, refers to its analog cellular technology. The AMPS standard has been the foundation for
the industry in the United States, although it has undergone numerous modifications in recent
years.
advice of charge
Supplementary service that provides a subscriber with cost estimates for services.
age
Refers to the age of a call record; that is, the time that elapsed since the call was completed.
Roaming partners bilaterally agree on age limits. For example, Syniverse defines two age limits: a
standard age limit (36 hours) and an exceptional age limit (30 days), and requires a
carrier/operator to transmit records within the standard age limit.
age edit
ACCESS S&E Services check to determine if a call record is older than the age limit to which
roaming partners have agreed.
aged messages
Messages (call records) that exceed the industry standard limit, measured from call date to date of
receipt by the authorized receipt point (ARP). These messages are rejected by the settlement and
exchange service provider and returned to the serve carrier/operator.
13
agent
Entity that distributes wireless prepaid accounts associated with a particular program.
agent program
Logical model of telephone call processing. The model contains entities such as calls and legs, and
operations such as split leg, join leg, and merge call.
air charges
Frequency in megahertz (MHz) and the protocol (Advanced Mobile Phone System (AMPS), code
division multiple access (CDMA), Global System for Mobile Communication (GSM), and
Personal Digital Cellular (PDC) used to communicate between a mobile handset and a base
station.
air rate period
Airtime rate period for a call at the time that the call began. Rate periods are peak, off peak, offoff peak, generic, and other.
airtime
Minutes spent talking on a wireless telephone. Most carrier/operators bill customers for the
minutes of airtime used in a month for outgoing and incoming calls.
air use minutes and seconds
Notification sent to when an alert threshold criteria is met. The term often is used interchangeably
with alert but, to avoid confusion, alarm is used to refer to the result of an alert that triggers.
alarm counts
Number of times each alarm occurred within a carrier/operator-specified time; used in determining
the system confidence in reporting cases of potential fraud based on system-defined rules.
alert
Refers to the rules that establish a threshold criteria. The term often is used interchangeably with
alarm but, to avoid confusion, alarm is used to refer to the result of an alert that triggers.
ALI
Alternate name for someone or something. In computer systems and languages, an alias is an
alternate name for a defined object that is typically shorter and more recognizable than the original
name.
Alliance for Telecommunications Industry Solutions
A standards organization that fosters the identification of standards, guidelines and operating
procedures, which make interoperability of telecommunications products and services possible;
one of two North American telecommunications standards organizations that focus on backbone
networks (http://www.atis.org/).
14
allow unknown
Option chosen by a serving carrier/operator to allow a roamer system access when a validation
response is not received within a specified amount of time. More commonly known as assume
positive. (See assume positive.)
Allowed, Bad (Out-of-Range) ESN
Fraud identification status used in FraudManager in which an electronic serial number (ESN)
was discovered to be out of range, after an earlier call was allowed.
Allowed, Negative Current, Switch Update Required
Fraud identification status used in FraudManager in which a switch negative file update was in
progress at the time the call was allowed.
Allowed, No Status Available
Fraud identification status used in FraudManager in which there is either no general location
register (GLR) status on the roamer and no response from the home switch, or the roamer is not
validated positive in a predetermined amount of time, (30 days).
Allowed, Positive Current
Fraud identification status used in FraudManager in which the general location register (GLR)
status is positive and the authorization period has not expired or in which the roamer is positively
validated by the home switch.
Allowed, Positive Expired
Fraud identification status used in FraudManager that indicates the total number of registrations
that are allowed by Electronic Data Services (EDS).
Allowed, Tumbling Detected, No Switch Update Requested
Fraud identification status used in FraudManager in which tumbling is detected but the serving
switch requests no update of the industry negative file (INF) or the switch negative file - The call
is allowed. The field indicates the number of calls allowed for this reason.
AMA
Data consisting of a record for each wireless call placed. While call record (message) formats
vary, all records include information such as the date of the call, time of the call, duration of the
call, mobile identification number and electronic serial number (MIN/ESN) of the phone making
the call, and phone number called. AMA data is captured at a mobile telephone switching office
(MTSO), recorded on magnetic tape, and forwarded to the rating/billing vendor. The billing
vendor removes home call information for customer billing and converts roamer call information
to the Cellular Intercarrier Billing Exchange Record (CIBER) format for forwarding to a
clearinghouse, such as ACCESS. (See also automated message accounting.)
AMPS
Non-profit, privately funded organization that coordinates the development of U.S. voluntary
national standards. ANSI is the U.S. representative to non-treaty international standards-setting
entities including the International Organization for Standardization (ISO) and the International
Electrotechnical Commission (IEC).
15
Common format for text files, in which each alphabetic, numeric, or special character is
represented with a 7-digit binary number. 128 possible characters are defined.
ANI
Traditional method of modulating radio signals so they can carry information. Amplitude
modulation (AM) and frequency modulation (FM) are the two most common methods of analog
modulation.
analytical tools
Small (usually) application program included as a portion of an Internet World Wide Web (Web)
browser page.
application administrator
User who is given permission to perform system administration tasks such as adding and deleting
users, maintaining system tables, creating rules, approving actions, and marking fraud calls.
Application Database Platform (ADP)
Platform on which Syniverses Prepaid Wireless system runs. The software environment for the
application database platform (ADP) consists of a database and connectivity to the PCs.
Application Program Interface (API)
Program interface between two different programs that are API-compliant. It is a set of calling
conventions that define how a service is invoked through a software package.
Application Service Element (ASE)
Contains the elements that are used by the Operations, Maintenance, and Administration Part
(OMAP) to provide message routing verification tests and circuit validation tests.
archive
Electronic storage process by which data in a database is converted to files and transferred to data
cartridge tape.
area code
First three digits of a telephone number which identify the area of the country in which it is used.
The local calling area for wireless service may include more than one area code. (See NPA.)
16
authentication
ARP
Approach to computer software design in which an application uses programmed rules to evaluate
input, thus simulating human ability to reason. In sophisticated AI programs, a system does not
react the same way forever, but uses received input to learn new responses.
ASCII
Extent of verification a certification authority applies to validate the identity contained in a digital
certificate, dictated by how the digital certificate is expected to be used such as in electronic
commerce, online information services, or e-mail. Assurance levels include certifying the
uniqueness of the name, performing trusted third-party verification, and performing in-person
verification.
asynchronous transfer mode (ATM)
Multiplexed (MUX) information transfer and switching method in which information is organized
into fixed-length (53 octet) cells and transmitted according to each applications instantaneous
need. ATM is similar to packet switching because bandwidth is allocated on demand.
ATIS
Ability to prove or verify that a given transaction or event occurred and that it was processed and
recorded accurately for a particular functional entity.
authentication
Process of verifying the identity of a wireless phone by a combination of its electronic serial
number (ESN), mobile identification number (MIN), and A-Key for the purpose of providing or
denying wireless service. Information is exchanged between a mobile telephone and its associated
authentication center (AC) to confirm its identity. Syniverse offers comprehensive authentication
services through its Encrypt-A-Key product family. (See also verification.)
17
Provides authentication services for a service providers subscribers who are roaming in an
authentication-capable market. An AC retains the algorithms and encryption keys required to
generate the authentication parameters that are used to verify user identification. Syniverses
Encrypt-A-Key Network Authentication Center (NAC) provides this service for its subscribers.
authentication request (AUTHREQ)
Form delivered with a rented Global System for Mobile Communication (GSM) phone that
subscribers must sign and return, indicating they agree to the rental phone terms and conditions.
authorized receipt point (ARP)
Entity designated by a home carrier/operator to receive roamer call data and perform Cellular
Intercarrier Billing Exchange Record (CIBER) or Transferred Account Procedure (TAP) edits or
Telecommunications Industry Association/EIA-41 (TIA/EIA-41) or Global System for Mobile
Communication (GSM) edits; and other custom edits for purposes of settlement and exchange
with the carrier/operator's roaming partners. An entity recognized by CIBERNET as an official
point of contact to accept, process, and forward roamer call data on behalf of carriers/operators.
AUTHREQ
Electronic storage procedure, which occurs as part of a weekly manual backup routine. During
auto-archive, ACCESSibility data is automatically extracted from the database, converted to
files, and placed on the server disk drive.
auto-restore
Automatically restoring the entry of the mobile identification number and electronic serial number
(MIN/ESN) on the industry negative file (INF) , if that MIN/ESN combination has not appeared in
roamer call data, industry-wide, for a predetermined amount of time, such as the past 60 days.
Negative file entries with reason codes non-pay (N), fraud (F), or bandit (B) may be restored
automatically. Entries with reason code special stolen or non-returned (S) can be restored
manually only by the carrier/operator that made the original entry.
auto-shutdown
Automatic denial of additional service to a fraudulent roamer, after the switch deny file has been
updated with the fraudulent electronic serial number (ESN).
Automated Clearinghouse Calls Exchange Settlement System
(See ACCESS.)
automated message accounting (AMA)
Process by which call detail data is captured at a mobile telephone switching office (MTSO),
recorded on magnetic tape, and forwarded to a rating or billing vendor. (See also AMA data.)
automatic actions
Steps FraudX takes without operator intervention in response to defined fraud types and alarms.
When defined conditions are met, the automatic action is taken immediately, bypassing user
approval.
18
B-side carrier/operator
Process that serves as an interface to Syniverses Prepaid Wireless database for all specific queries
and updates.
automatic clearinghouse
Electronic funds transfer system governed by operating rules that provide for the inter-bank
clearing of electronic payments for participating financial institutions.
automatic database synchronization (ADS)
Used by Compaq Telecom Network Services (CTNS) for automatic database synchronization.
automatic location identifier (ALI)
Working with automatic number identification (ANI), the use of a database to associate a physical
location with a telephone number.
automatic number identification (ANI)
Feature that refreshes the display of data in an online report to show new activity since the report
was last requested or refreshed.
automatic vehicle location (AVL)
Combining a location-sensing device, such as a global positioning satellite (GPS) receiver, with a
wireless communications link to locate a vehicle or other mobile asset, such as a trailer or heavy
machinery).
autonomous registration
Feature that allows a roamer whose wireless phone is turned on, to automatically register for call
delivery and validation without placing a call or dialing a star (*) code. This feature requires
Interim Standard 41 (IS-41) compliant switches. Also known as power up registration.
average revenue per unit (ARPU)
One indicator of a wireless business operating performance. ARPU measures the average
monthly revenue generated for each customer unit that a carrier/operator has in operation.
Declining ARPU is generally a negative indicator that a carrier/operator is adding too many lowrevenue generating customers.
AVL
B
B band
Type of license granted to a Personal Communications Services (PCS) carrier/operator in the U.S.
The B-block license allows the license holder to provide PCS service in a major trading area
(MTA). B-block license holders can use 30 MHz of the spectrum. Other PCS licenses in the U.S
include A-block, C-block, D-block, E-block, and F-block.
B-side carrier/operator
One of two types of carrier/operator the Federal Communication Commission (FCC) designates to
provide wireless telephone service. B-side licenses are awarded to wireline carriers/operators.
19
backbone
Part of a communications network. Generally links nodes or local networks into a diverse
arrangement of communications facilities that support multiple users either inside a building,
across a city, or between countries. A communications backbone, like the human backbone,
provides a central support system and is typically one of the most permanent parts of a
communications network.
backup
Process of copying a file or files to another storage device such as a disk or tape to ensure data can
be recovered if the primary copy is accidentally deleted or damaged. (See also restore.)
BAIC
CIBERNET designation for a wireless call made with a mobile identification number and an
electronic serial number (MIN/ ESN) that includes a MIN that is unassigned or does not match the
MIN that is assigned to the ESN. The industry negative file (INF) reason code is B.
bandwidth
Supplementary service that prevents incoming calls from reaching a mobile phone.
Barring of All Outgoing Calls (BAOC)
Supplementary service that prevents outgoing calls from being placed from a mobile phone.
Barring of Incoming Calls when Roaming (BIC-Roam)
Supplementary service that prevents incoming calls from reaching a mobile phone when it is
outside the subscribers home country.
Barring of Outgoing International Calls except to Home Country (BOIC-exHC)
Supplementary service that prevents outgoing calls from being placed from a mobile phone to
countries other than the one where the phone is currently located and the home country of the
subscriber using the phone.
Barring of Outgoing International Calls (BOIC)
Supplementary service that prevents outgoing calls from being placed from the mobile phone to
countries other than the one where the phone is currently located.
base station
Central radio transmitter or receiver that maintains communications with mobile phones within a
given range, typically a cell site. (See also cell, and cell site.)
basic trading area (BTA)
Small geographic area in the United States, roughly equivalent to a city and its surrounding area,
that Personal Communications Services carriers/operators licensed to serve. The United States is
divided into approximately 493 BTAs.
20
big endian
batch
Group of Major Accounts Billing Exchange Logistical (MABEL) records submitted to a major
accounts consolidator or a group of Cellular Intercarrier Billing Exchange Record (CIBER)
formatted call records forwarded from a serve system identification (SID) to a home SID. The
CIBER record group is also sometimes referred to as a pack.
batch report
Report that bunches related information together, such as payroll records, for further processing or
analysis. A batch report is generally the result of batch processing and, unlike interactive or real
time processing, does not depend on operator intervention.
batches in transit
Cellular Intercarrier Billing Exchange Record (CIBER) data exchanged between two settlement
and exchange providers. The data contains call records from the current settlement cycle which
have not been processed by both service providers before the close of the settlement period.
baud rate
Measure of transmission speed over an analog telephone line. Baud rate, which is the number of
changes per second in an analog sine wave, is different from bits per second (bps), which is the
transfer rate of digital bits on a line. Advanced coding techniques permit more than one bit to be
placed on a baud. A 9600 bps modem is actually a 2400 baud modem with advanced coding that
impresses four bits on each baud.
Bbc service
Identification of services used within a call; consists of the service type, service code, radio
channel used, and transparency indicator.
bearer service code
Two-character code that defines a specific bearer service group (all data circuit synchronous
services, all dedicated PAD access services, etc.).
bearer services
Category of transmission service provided by the Global System for Mobile Communication
(GSM) system that covers computer data services.
Bellcore
Company formed at the breakup of the Bell System in order to continue the telecommunications
research and development work of Bell Laboratories. It is owned, jointly, by the Regional Bell
Operating Companies (RBOCs) that were created when the Bell System was broken up.
bent-pipe technology
Satellite technology to transmit calls from one point on Earth to a satellite and back down to
another point.
BIC-Roam
Describes the sequence in which multi-bytes are stored in a computers memory; the most
significant byte is stored in the lowest memory address, which is the address of the data.
21
Legally binding document executed by two carriers/operators to provide service to each others
roaming subscribers with provisions for rates, privileges, and special services.
bill period
Committee established by the Global System for Mobile Communication (GSM) Association to
handle charging, tariff, billing, and accounting issues for the GSM network.
billing cycle
Output of a billing system that consists of call detail record (CDR) data that has been rated. Data
input is generally an electronic feed and the most current billing data is usually for the prior billing
period.
billing identification
A North American Interest Group Transferred Account Procedure II (NAIG TAP II) used to
identify a specific location, such as a city. A NAIG TAP II billing record includes information
about the serving billing identifier (BID), where a subscriber roams, and the home BID, where the
subscriber is from.
billing identifier (BID)
A 15- or 16-bit value assigned to a wireless carrier in North America that identifies a portion of a
service area for accounting purposes; for example, to identify markets within a system that is
defined by a single SID. Commonly used as part of a market identification number that ultimately
comprises the mobile switching center identification (MSCID).
billing information
Output of a billing system that consists of call detail records (CDR) and feature use data that have
been rated.
billing period
An nn-day interval - usually 30 days - that can start on any day of the month. A carrier/operator
can use up to 30 billing periods, which are assigned to different segments of its subscriber base to
level processing and workload in the billing system.
billing vendor
Service company that takes raw automated message accounting (AMA) data from wireless
switches and processes it to produce customer bills and Cellular Intercarrier Billing Exchange
Record (CIBER) data which are sent to a clearinghouse for settlement and exchange with roaming
partners.
bimonthly manual archive
Electronic storage process through which archived files which have been automatically and
manually selected are copied from the ACCESSibility server disk drive to data cartridge tape and
then automatically deleted from the archive directory.
binary file
File containing codes that are not part of the American Standard Code for Information Interchange
(ASCII) character set. A binary file can contain any type of information that can be represented by
an 8-bit byte for 256 possible values.
22
Business Monitor
bit stream
Form that digital data takes when it flows on a link. The data is a series of electric pulses
representing bits, hence a bit stream.
blacklisting
Service definition included in FraudForce that, when imposed in a service area, generates a
denial response back to the visited switch, preventing any calls from being placed or received.
BOIC
Connects a signal transfer point (STP) to another STP. Typically a quad of B links connect STPs
at the same Signaling System 7 (SS7) level. For example, B links connect the STPs of one
network to the STPs of another network. Because the distinction between B links and diagonal
links (D links) is somewhat arbitrary, they are sometimes referred to as B/D links.
broadband
Synonymous with PCS created in the A-through F-Block PCS auctions and used for voice and
data.
broadcast system identification (broadcast SID)
SID that is broadcast from a cell site to mobile stations (MSs) to identify a market when the
market has only a billing identifier (BID). BIDs are never broadcast from a cell site but are used
only for CIBERNET or billing purposes.
browned out
Term used to refer to an area code and exchange (NPA/NXX) that has been pulled for fraud.
browser
Client program, such as Microsoft Internet Explorer or Netscape Navigator, that uses Hypertext
Transfer Protocol (HTTP) to enable users to navigate in a World Wide Web (Web) and interact
with its content, such as view pages, copy and print material, and download files).
browser certificate
Digital certificate used by a browser such as Netscape Navigator or Microsoft Internet Explorer.
(See also certification.)
BTA
Application that helps Syniverse customers monitor clearing and roaming data in a proactive
manner, so you know about problems quickly and can take steps to solve them. The application
enables you to quickly pinpoint affected markets, so you need not sift through a lot of data when
troubleshooting.
23
business rules
Business rules are compiled and stored for use by software that translates input. For example, in
number portability, business rules are applied to messages to accomplish such things as mapping
(e.g., map St. to Street) and validation (e.g., Account Number is always required).
bypassable error
Failure during the file verification or record-level editing process that two roaming partners agree
should not result in rejection of the file or record. Also referred to as an overridable error.
C
C band
Applications that collect records of calls but discard incomplete records or fail to collect records
for all types of calls, such as misdials or interrupted calls). Thieves try to take advantage of these
systems by tricking them into discarding records for valid calls, then electronically adding
impulses to place fraudulent calls.
call attempt
Incomplete call. Occurs when a cellular subscriber tries to place a call, but is unsuccessful for
some reason, such as interference, equipment malfunction, or blocking by a fraud control system.
(See also completed call.)
call barring
Supplementary service preventing certain categories of outgoing or incoming calls from reaching
or being placed from a mobile phone. (See also BAOC, BOIC, BOIC-exHC, and BIC-Roam.)
call blocking
Action of denying a wireless phone user the ability to make calls. Usually initiated by a fraud
control system and executed by the serving switch.
call charges
Charges levied on a specific portion of a wireless telephone call. Examples of charges are local
airtime, long distance, or roamer airtime.
24
call hijacker
Device that accumulates call records. A site collector serves as a data repository that reformats
data based on application needs and forwards it to application systems. Syniverses call collection
system for CloneDetector and FraudX is TransAction Manager.
call cluster
Calls made within a predetermined time frame between the last calls disconnect time and the
following calls seize time.
call control
Signals that pass between switches, which are used to control a subscribers phone call. Call
control makes phones ring, plays busy signals, or routes calls to voice mail, etc.
call count
Contains unrated call record information that is sent directly from a wireless switch. A CDR data
feed may be real-time or near real-time, depending on the switchs temporary storage capacity. A
call record typically includes both feature and billing related information such as. the identity of
the person originating or receiving the call; the date, time and duration of the call; the number
called; and any charges billed to the call.
Call Evaluation Driver
FraudX component that receives call records from the Call Input Handler, determines what type
of fraud analysis each record requires, and sends them to the appropriate evaluation modules.
call forward on busy (CFB)
Supplementary service that allows calls to be forwarded to another number when a mobile phone
is busy.
call forward on no reply (CFNR)
Supplementary service that allows calls to be forwarded to another number when the mobile
phone is not answered within a user-specified period of time.
call forward unconditional (CFU)
Supplementary service that allows calls to be forwarded to another number. (See also CFU, CFB,
and CFNR.)
call forwarding hit
Fraud related to hijacking calls. Fraud perpetrators overpower the signal of a subscriber after a call
is placed, then establish a three-way call to reach their fraudulent party.
call hijacker
Fraud user who takes control of the traffic channel assigned to a legitimate mobile phone by
boosting the fraudulent mobile units power level above that of the legitimate users phone. (See
also hijacker.)
25
call holding
Service that allows a subscriber to put an active call on hold, so the subscriber can accept an
incoming call or place a new outgoing call.
Call Input Handler
FraudX component that reads call records from Transaction Manager listlogs. The Call Input
Handler validates information in call records, ensures all required information is present,
determines what kind of fraud testing is required, and writes the call records to listlogs that are
accessed by the Call Evaluation Driver.
call management platform (CMP)
Hardware and software. It typically consists of an interface switch, redundant voice response units
(VRUs), and RISC-based computers.
call processing
System and process that establishes connections in a switching system. The system scans trunk
and station ports for service requests. For each request, the system checks stored instructions and
look-up tables, and then makes the connection accordingly.
call record
Electronically stored call information. Includes the mobile identification number (MIN) and
electronic serial number (ESN) of the unit originating the call; date, time, and duration of the call;
number called; and any charges billed to the call by the serving carrier/operator. Also called a
message. (See also message and call detail record.)
call selling operations
Fly-by-night operation that offers call-anywhere service for X-dollars per minute. Typically
involves cloned phones and stolen long distance cards for international dialing.
call teardown
Disconnecting a call in progress when fraud is determined. Some Interim Standard 41 (IS-41)
switches have this capability. A call teardown is initiated by a QualDir message from
FraudManager or an IS-41 home switch. (See also QualDir.)
call waiting
Supplementary service that notifies a subscriber of an incoming call while the phone is in use with
another call.
called number
Enhanced telecommunications feature that displays a callers phone number on a wireless handset.
calling behavior
Defrauding local and long-distance carriers/operators by stealing calling cards or calling card data
to obtain legitimate card numbers, which can then be used to place fraudulent calls.
calling line identification presentation (CLIP)
Supplementary service that enables a called party to receive the phone number of the caller.
calling line identification restriction (CLIR)
Supplementary service allowing a caller to block use of the calling line identification presentation
(CLIP) service to identify the callers phone number.
26
Syniverse service that enables a carrier/operator to display a callers name and telephone number
on the subscribers handset or computer. The name is provided by Signaling System 7 (SS7)
message transport to all major calling name databases and service providers in the U.S. The
service uses an access link (A-link) connection to Syniverses SS7 hub.
calling number
Uses a mobile identification number (MIN) to identify the mobile unit placing a call.
CAMEL
Unique electronic identification number on the back of a pager. It is used to uniquely identify a
specific paging unit.
CAPs
Company that provides local, long distance, or wireless telephone service. (See also operator.)
carrier/operator code
Call records that fail the secondary edit process and are returned to the serving carrier/operators
billing vendor.
cascading style sheet (CSS)
World Wide Web (Web) page that defines the appearance of elements on a Web page and the
order of precedence when definitions of any style element conflict. The Cascading Style Sheet,
level 1 recommendation from the World Wide Web Consortium (W3C) is implemented in the
latest versions of Netscape and Microsoft Web browsers.
case
Body of information resulting from call records that create enough alarms to indicate suspicious
activity. A case provides detailed information about the suspicious activity. It includes an assigned
fraud type and confidence level that indicates the degree of certainty that fraud occurred.
case details window
Fraud Analyst Assistant application window in FraudX that shows alarm conditions, related call
data, system findings, and recommended actions for cases on specific mobile identification
number and electronic serial number (MIN/ESN) pairs.
case status
Status of a case. For example, never opened or previously opened but in receipt of a new alarm.
casual calling fraud
Long-distance thieves who penetrate the system of a user doing business with a particular interexchange carrier/operator (IXC) and then make a high number of calls through a different IXC,
gaining illegal access to the second IXCs network through casual calling. For example, 1-0-NNN.
27
CAVE
1) Area covered by a base station. Mobile stations (MSs) within a cell transmit data to and receive
data from that cells base station on radio frequencies that do not interfere with the frequencies
used in adjacent cells. As a MS crosses cell boundaries, the call transfers to the next cells base
station. 2) Service area covered by a fixed-location, low-power cellular transmitting and receiving
station. Wireless technology relies on the handoff of service from one cell to another as a person
using a wireless phone travels.
cell ID
Identification number that describes the cell in which a call originates or terminates.
cell site
Physical location of a wireless service transmitter and receiver. A single wireless switch can serve
multiple cell sites consisting of a wireless antenna tower, RF equipment, and control systems.
cell site distance
Physical distance between two cell sites, switches, or system identifications (SIDs).
cell site on wheels (COW)
Syniverse message rating system that calculates, edits, and converts (automated messaging
accounting (AMA) data into rated toll and airtime billing information for wireless customer
billing.
cellmate
Eavesdropping cloning factory sealed in a briefcase and sold by offshore vendors through the
Internet. The deluxe version contains a scanner for reading radio frequencies, and a laptop
computer loaded with software that interprets cell phone numbers and saves them to a database. It
may also include a tape recorder to capture conversations from a targeted wireless phone.
28
CEPT
celltracker
Scanning device that looks like a wireless phone and is used to eavesdrop on other wireless phone
conversations.
cellular
Communications systems that use the radio telephone technology of limited-coverage cells with
the automatic handoff of calls-in-progress between cells.
cellular authentication and voice encryption (CAVE)
Algorithm used to produce a unique number, given a unique set of input variables. Because CAVE
always produces the same answer, given the same input variables, it is used by associated wireless
entities to verify the identity of the entity. For example, if an authentication center (AC) CAVE
calculation matches the result provided by a mobile station (MS), the AC assumes the MS is a
valid user and is not a clone.
Cellular Carrier Network Services (CCNS)
Syniverses long distance and network services, provided at highly competitive rates, that include
inbound, outbound, and infrastructure services.
cellular digital packet data (CDPD)
Open standard for using existing cellular systems to transmit data, as opposed to voice. The
technology breaks data files into packets and sends them along idle channels of existing wireless
networks.
cellular fraud
Deliberate attempt to obtain wireless phone service without paying for it.
cellular geographic service area (CGSA)
Service area composed of one or more counties in which a wireless telephone company is
authorized to operate.
cellular geographic service area (CGSA) index
Industry-standard record format used to transfer roamer billing data in Advanced Mobile Phone
System (AMPS) networks; ensures smooth and consistent processing of roaming records for
settlement and liability among wireless carriers/operators. The Cellular Intercarrier Billing
Exchange Record (CIBER) is the AMPS counterpart to Transferred Account Procedure (TAP) in
Global System for Mobile Communication (GSM) networks and is primarily used in North
America.
cellular subscriber station (CSS)
In Interim Standard 41 (IS-41) terminology, interface equipment used to terminate a radio signal
path at a user site.
Cellular Telecommunications Internet Association (CTIA)
29
Validation of digital certificates through a hierarchy of trust. Each certificate is linked to the
signature certificate of the certificate-issuing entity. Certificates are validated by following the
trust hierarchy to the root certification authority (CA). The path through which the certificates are
validated is called the certificate chain.
certificate extensions
1) The full set of public X.509 extensions. 2) Private extensions that can be added to bind
customer-specific information to the public key in a digital certificate.
Certificate Management System (CMS)
Named set of rules that indicates applicability of a certificate to a particular community or class of
application with common security requirements. For example, a given certificate policy might
apply to a type of certificate for authenticating electronic data interchange transactions for trading
goods within a given price range.
certificate renewal
Process by which a new digital certificate is created for an existing public key.
certificate revocation list (CRL)
Time-stamped list that identifies digital certificates that have been revoked before their expiration
date. A CRL is signed by a certification authority (CA) and made available to the public.
certificate user
Entity that needs to know, with certainty, the public key of another entity.
certification
Process by which a certification authority (CA) issues a digital certificate for a users public key
and returns that certificate to the users client system or posts that certificate in a repository.
certification authority (CA)
Trusted third-party signer or authorizer of digital certificates. The CA vouches for the identity of
the user and binds that identity to the users public key to create a digital certificate.
Certification authority (CA) certificate
Statement of the practices employed by a certification authority (CA) in issuing digital certificates.
CFB
30
CHARS
CGSA index
Process of linking records that represent different services used within the same call by means of a
unique identification contained in all the chained records.
challenge response intelligent peripheral (CRIP)
Automated challenge/response system that interacts with callers suspected of fraud. CRIP accepts
calls suspected of fraud, challenges the caller to enter a personal identification number (PIN),
accepts dual tone multi-frequency (DTMF) responses from the caller, and authorizes the caller for
wireless phone use or routes the call to the callers home customer service representative (CSR).
channel
Frequency pair used for one wireless phone call. One frequency is for transmitting and the other is
for receiving.
CHARC
Prefix in the roaming administration report naming scheme. The final C indicates a control
report.
CHARD
Prefix in the roaming administration report naming scheme. The D indicates a daily report.
charge
Cost billed to a subscriber. In a call detail record (CDR), the charge field is the cost for the use of
the service the record describes.
charge start date
Date on which an item associated with an individual charge begins being billed. For example, the
date of a phone call.
charge start time
Time at which an item associated with an individual charge begins being billed. For example, the
start of a phone call.
chargeable duration
Duration of the use of a basic service being charged in a call detail record (CDR). For example,
the length of the phone call.
chargeable service
Any service for which a charge is incurred and recorded in a Transferred Account Procedure
(TAP) file.
chargeable units
Units in a detail record that are considered chargeable items. For example, minutes or data
segments.
charged item
Field indicating the element to which a charge applies. A charge may be a duration-based, eventbased, volume-based, or inter-network accounting charge.
CHARM
Prefix in the roaming administration report naming scheme. The M indicates a monthly report.
CHARS
Prefix in the roaming administration report naming scheme. The S indicates settlement period.
31
churn
Type of error resulting from primary edits. Indicates that the Cellular Intercarrier Billing
Exchange Record (CIBER) data contains errors in industry formatting standards such as out-ofrange electronic serial numbers (ESNs) or a wrong data type.
CIBERNET
Process for the exchange of roamer billing records among roaming partners. Billing records are
converted from one billing format to another, validated or edited for errors, and processed for the
calculation and reporting of financial positions among roaming partners by a third party entity.
Other elements that are essential to inter-carrier/operator relationships and may be performed by
the clearinghouse include wholesale and retail rating of records and financial net settlement (the
actual exchange of funds among roaming partners).
clearinghouse
32
CNAM Service
CLIP
Breaking into a telephone box to tap into a business telephone line for the purpose of selling long
distance service. The service may be sold directly at the point of illegal entry or the line may be
transferred to a nearby telephone booth from which service is sold.
CLIR
Fraudulent mobile unit that uses the mobile identification number and electronic serial number
(MIN/ESN) of a legitimate wireless phone. While the MIN/ESN is good, the user is not the person
who owns the MIN/ESN. Clones are created by illegally programming a legitimate MIN/ESN into
another phone. (See also complete clone, counterfeit, simple clone, and tumbling.)
CloneDetector System
Interception and illegal programming of a valid mobile identification number and an electronic
serial number (MIN/ESN) into another wireless phone.
cloning fraud
Unauthorized use of a mobile identification number (MIN), electronic serial number (ESN), and
possibly personal identification number (PIN) to alter or clone another wireless telephone to
mimic the original so the legitimate customer is billed for the calls instead of the thief.
closed user group (CUG)
Supplementary service that allows a group of subscribers to form a group in which all members
may call one another without restriction but access to and from numbers outside the CUG is
restricted or denied.
cluster
Link together switches of the same manufacturer and type for direct communication of validation
and call delivery information.
CMP
33
Digital technology used by wireless companies that use advanced coding enabling cellular systems
to transmit data, as opposed to voice. With CDMA, each conversation is digitized and then tagged
with a code. A mobile phone is instructed to decipher only a specific code to connect the correct
conversation. The process is analogous to an English-speaking person picking out in a room of
French speakers the only other person who can speak English. (See also digital modulation.)
collision alarm
The type of alarm that occurs when wireless calls are made simultaneously from two different
phones with the same mobile identification number and electronic serial number (MIN/ESN).
This indicates cloning fraud.
Collocation, co-location
Placement of multiple antennas at a common physical site to reduce environmental impact and
speed zoning approvals and network deployment. Collocation can be affected by competitive and
interference factors. Some companies act as brokers, arranging for sites and coordinating several
carrier/operators antennas at a single site.
COLP
International organization that recommends and approves standards for telematics and data
services, systems, and networks. In English, it translates to the Consultative Committee on
International Telegraphy & Telephony (CCITT); also known as the International
Telecommunications Union - Telecommunications Services Section (ITU-T).
Commercial Credit Card Validation
Syniverse service that provides access to commercial credit card validation (CCCV) services
through agreements with major bankcard clearinghouses for calls billed to bankcards.
commercial mobile radio service (CMRS)
Form of signaling used by telecommunications service providers for call setup and features. It
features a group of voice circuits that share a common channel for carrying signaling information.
common channel signaling application (CCSA)
Signaling System 7 (SS7) based call processing application that uses common channel signaling
(CCS).
common control
Networking method that provides, on a single separate line, the control signals for setting up and
controlling customers phone calls over multiple lines.
common gateway interface (CGI)
Specification for communicating data between a World Wide Web (Web) server and another
application.
34
connect time
Unique 11-digit identifier for a switching entity such as a central office or MTSO.
common name
Element of the distinguished name, as described in the X.509 specification; a users name or a
servers domain name.
Communications Assistance for Law Enforcement Act (CALEA)
Act that does not expand Law Enforcements fundamental statutory authority to conduct
electronic surveillance, but ensures that after Law Enforcement obtains appropriate legal authority
carriers will have the necessary capability and sufficient capacity to assist Law Enforcement
regardless of their specific systems or services.
competitive access providers (CAPs)
Companies that provide competitive local service rather than long distance service.
competitive local exchange carrier (CLEC)
A carrier, other than the ILEC, that provides connections to end user premises and access to a long
distance network in an area where local competition has been introduced. A CLEC competes for
local exchange, long distance, and Internet access services. A CLEC may build or rebuild wired or
wireless local loops, or lease loops from other companies to provide selected services. CLECs
include PCS providers and some utility and cable companies.
complete clone
Fraudulent mobile unit that uses the electronic serial number (ESN), mobile identification number
(MIN), authentication keys, call count, and other identifiers of another mobile station (MS).
completed call
Call that is answered and meets the minimum chargeable duration requirements.
composite file
File that consists of multiple individual Transferred Account Procedure (TAP) files and is
bracketed by a composite file header and composite file trailer record. In North American Interest
Groups (NAIG) TAP II, the composite file header and composite file trailer records are called the
superheader and supertrailer records, respectively.
Confrence Europene des Administrations des Postes et des Tlcommunications
Financial clearinghouse used by some European telephone companies for the settlement of mainly
wireline charges but in some cases, also for mobile services. In English, it translates to European
Conference of Posts and Telecommunications Administrations.
confidence level
Numeric indicator that the FraudX system uses to rate the level of confidence that a generated
alarm indicates actual fraud.
confidentiality
Characteristic that indicates information is protected from being viewed while in transit or when
stored in an information system. With cryptographically provided confidentiality an unauthorized
person cannot intercept encrypted data without it being compromised.
connect time
Time a wireless phone is in radio contact with a cell site, not to be confused with the time a
conversation actually lasts. Connect time is measured from the time the phones In Use indicator
lights up until the time it goes off when the End key is pressed.
35
Supplementary service that allows calling parties to receive the line identity of the called party.
This may differ from the dialed number; for instance, if the called party forwards the call to
another number).
connected line identification restriction (COLR)
Supplementary service that allows called parties to block use of the connected line identification
presentation (COLP) service to identify their line.
connection-oriented services
In the Service Connection Control Part (SCCP) level of the Signaling System 7 (SS7) protocol,
connection-oriented services create a logical connection between end-users of the signaling
network before transferring information. This technique is not commonly used.
connectionless services
In the Service Connection Control Part (SCCP) level of the Signaling System 7 (SS7) protocol,
connectionless services transfer information between end-users through normal packet switching
without establishing a logical connection. This technique is widely used by applications.
consolidated invoices
Ability of the STREAMLINER system to consolidate and report nearly any aspect of a corporate
accounts wireless usage, organized in a way that fits the accounts business.
consolidator
Carrier/operator liaison between the wireless industry and a corporate account. The consolidator is
the single point of contact for the corporate account, fulfilling the account management role on
behalf of itself and participating carriers/operators.
consolidator code
Telephones, PBXs, and other communications devices located in the home or office.
control signal
Signal sent from a cell site to a wireless phone (or vice versa) that carries information needed for
the cooperation of the two devices. This signal is sent on a separate channel from the voice
channel.
conversion
Process of converting a Transferred Account Procedure (TAP) file from one version of TAP to
another. If the visited and home public land mobile networks (VPLMN and HPLMN) use different
TAP versions, ACCESS S&E Services converts the file to the version used by the HPLMN as
designated by Transferred Account Data Inter-exchange Group (TADIG) rules.
cookie
Mechanism a server computer uses to store information on a client computer. A cookie is a data
element that can contain virtually any kind of information, including the cookies name, expiration
date, and the name of the server that generated the cookie.
36
crontab file
corporate account
Major account, usually a corporation, spanning more than one wireless market and serviced by
more than one carrier/operator.
corporate certificate
Fraudulent mobile unit that uses the mobile identification number (MIN) and electronic serial
number (ESN) of a legitimate wireless phone. (See also clone.)
country code
Two-or three-digit prefix used to identify a country outside the North American Numbering Plan
(NANP) when dialing a number in that country.
COW
In the North American Interest Group Transferred Account Procedure II (NAIG TAP II) call
records, a negative value in a charge, usage charge, or tax charge field. Credits cannot be included
in TAP 1 or TAP 2 call records because negative values are not allowed in those billing formats.
credit alarm
Type of alarm that occurs when a subscribers calling activity exceeds the subscribers credit
limit.
CRIP
Directory entry or other distribution source for certificate revocation lists (CRLs). A CRL
distributed through a CRL distribution point contains revocation entries for revoked certificates
issued by one certification authority (CA).
cron
Daemon that performs tasks at specified times and dates, according to instructions in a crontab
file. These tasks and the time when they are to be carried out are usually kept in files located in
two directories: /usr/lib and /usr/spool/cron. (See also daemon and crontab file.)
crontab file
File that enables a user to set up programs for repeated execution by specifying the dates and
times at which the specified commands are to be executed.
37
Connect signal transfer points (STPs) that perform identical functions, to create a mated pair. C
links are used only when an STP has no other route available to a destination signaling point due
to link failure(s). (See also mated pair.)
cross talk
Agreement between two certification authorities (CAs) that, if one authority certifies a given
entity, the other authority will accept that certification within its own structure.
cross-market
Single sign on service used with a secure web infrastructure to provide access to Syniverse Webenabled products and services. It allows use of a single identification and password to access any
product or service of authorized use.
Crosstalk
Software that enables communication between two computer systems. Crosstalk is the designated
standard for ACCESS communications.
cryptographic algorithm
Mathematical procedure used with a secret key that transforms original input into a form that is
unintelligible without special knowledge of the secret information and the algorithm. Such
algorithms are the basis for digital signatures and key exchange.
cryptography
Enciphering and deciphering messages in a secret code. Also called encrypting and decrypting.
CSO
(See Cell-U-Rator.)
customer-branded certification authority (CA) service
Certification authority services for organizations that do not want to own, operate, and manage
their own CA facilities.
custom local area signaling services (CLASS)
38
daemon
Model or structure that contains any subscriber or combination of subscribers who belong to a
consolidator.
Customer Positive File (CPF) service
Syniverse service that offers pre-call validation to roamers with carriers/operators that are not
Interim Standard 41 (IS-41) enabled. Carriers/operators maintain lists of customers whose home
switches are not IS-41 compliant, to enable switches of other carriers/operators who use
FraudManager to validate roamers from within FraudManager without having to query the home
switch.
customer proprietary network information (CPNI)
Carrier-maintained data, about specific customer service and use. The Federal Communication
Commission (FCC) restricts CPNI use for marketing and bans marketing efforts specifically
aimed at high-usage customers.
customer provided equipment (CPE)
Telephones, PBXs, and other communications devices located in the home or office.
customer service
Department that handles queries and requests that cannot be handled by an interactive voice
response (IVR) system. Customer service employs customer service representatives to respond to
customers requests. (See also customer service representative.)
customer service operations (CSO)
Department at a wireless carrier/operator; the primary contact that a subscriber speaks to when
dialing a help desk number or *611 on the wireless phone.
Custom Local Area Signaling Services (CLASS)
Primary point of contact for subscribers who call a customer service operations (CSO) department.
Customized Application Mobile Enhanced Logic (CAMEL)
Global System for Mobile Communication (GSM) feature for including intelligent network (IN)
functions in a GSM system. CAMEL is used when roaming between networks, allowing the home
network to monitor and control calls made by its subscribers.
cutoff date and time
Date and time at which a period ends and a Transferred Account Procedure (TAP) file is
generated.
D
D-block license
Background UNIX process (pronounced demon) that carries out tasks on behalf of every user. A
daemon sleeps until an event occurs which requires its help. A daemon can perform its tasks
automatically or periodically; its system management functions are usually transparent to users.
(See also cron.)
39
daily roamer
Term used in ACCESS S&E Services to describe a roamer who obtained service from another
carrier/operator at least once during the settlement period. A daily roamer is counted each day that
the roamer uses this alternative service. (See also unique roamer.)
daily roamer service charge
One-time, per-day charge applied to a roamer using a mobile phone outside the home area.
Sometimes referred to as a roamer surcharge.
DASH
Collection of logically related records or files. A database consolidates many records previously
stored in separate files so that a common pool of data records serves as a single central file for
many data processing applications.
database replication process
Process of copying a file, database, call information, or other computer information from one
location to another location.
DataNet
Syniverse service that manages roaming data collection, translation, and routing of call detail
records (CDRs).
DataFlash Financial System
Site data collector system that interfaces between Syniverses TransAction Manager and a
mobile switching center (MSC).
data communication carrier wave
Steady signal that is varied by a data or voice signal applied to it. The steady wave carries the data
or voice. One example of a carrier wave is the tone or tones heard when one modem is connected
to another. If the connection is broken (or never established), the modem may display an error
message of No Carrier.
Data Dictionary Language (DDL)
Tandem product that allows creation and maintenance of standard record definitions.
data encryption standard (DES)
Algorithm or block cipher that uses a 56-bit key and operates on a block of 64 bits. Created by
IBM and endorsed by the U.S. government in 1977, the DES is relatively fast and is often used to
encrypt large amounts of data at one time.
data integrity
Process of ensuring that data is not altered in an unauthorized fashion. Assurance that changed or
altered content of a message is detectable. Digital signatures are often used to ensure data
integrity. If a signed message is corrupted in transit, signature verification will fail.
data message handler (DMH)
Standard protocol using Interim Standard 41.A (IS-41A) to handle wireless data messages.
data network
Communications network that carries data between computers, as opposed to a network that
carries communications between people or signals between switches.
40
DEFINE names
data privacy
Process of ensuring that data is viewed only by those authorized to see it. Data encryption is often
used to ensure privacy.
dataset name (DSN)
Identifying name of a particular data file that is forwarded to or received from a rating/billing
system.
data volume
Amount of data transferred during the use of a bearer service, measured in segments of 64 octets.
data volume reference
Field in a call detail record (CDR) that is set to a unique value to indicate that the data volume
field in that call record could not be determined at the time the record was generated. The same
reference value will occur in a later record containing the correct data volume value, it is
generated when the information is available.
DCMS
Act of making a service, rate plan, or feature unavailable or the date a subscriber is no longer
allowed to use a mobile unit or service.
dead spot
Location in a cell where wireless radio signals cannot be received. This may be caused by physical
obstacles such as mountains or tall buildings), interference from other radio sources, or multi-path
interference, reflected signals that cancel out the main signal.
decimal
Numbering system, based on the digits 09. Also known as Base 10. Electronic serial numbers
(ESNs) expressed in decimal form are 11 digits long. (See also hexadecimal.)
DECT
Circuit leased by a customer for exclusive use. Also referred to as a private line.
default
Predefined standard choice made by a computer system when a user has not overridden the
default.
default processing
In an Interim Standard 41 (IS-41) environment, action a system takes, based on what the serving
carrier/operator specifies, to allow or deny system access to a roamer when a validation response
is not received within a specified amount of time. (See also Denied, No Status Available.)
DEFINE names
Method of assigning a logical name to a physical object using a disk file, Structured Query
Language (SQL) catalog, or tape drive. On Tandem, DEFINE names begin with an equal sign (=).
41
Partial CRL that contains only entries for certificates that have been revoked since issuance of a
base CRL.
Denied, Bad Electronic Serial Number (ESN)
Fraud identification status in which the ESN was detected out of range, before the call was
connected.
Denied, Call Teardown Successfully Attempted
Fraud identification status in which the mobile identification number and the electronic serial
number (MIN/ESN), were found invalid while a call was in progress and a teardown was
directed.
Denied, Negative Current in INF
Fraud identification status in which the general location register (GLR) status is negative.
Denied, Negative in Switch, No Industry Negative File (INF) Entry
Fraud identification status in which the serving switch blocked the call but no entry was made in
the industry negative file.
Denied, Negative Response from EDS
Fraud identification code that indicates the total number of registrations allowed by EDS.
Denied, No Status Available
Fraud identification status in which there is no general location register (GLR) entry for the
roamer and no response from the home switch, or the roamer was not validated positive in a
predetermined amount of time; for example, the last 30 days. In an Allow Unknown market, this
field shows the number of calls allowed for this reason. In a Deny Unknown market, this field
shows the number of calls denied for this reason. (See also default processing.)
Denied, Tumbling Detected
Fraud indication that there was no general location register (GLR) status on the roamer and no
response from the home market, or the roamer was not validated positive in a predetermined
amount of time; for example, the last 30 days. In addition to this, tumbling was detected, but the
serving switch did not request an update of the industry negative file (INF) or switch negative file
and the call was denied. This field indicates the number of registrations denied for this reason.
deny unknown
Option chosen by a serving carrier/operator to deny a roamer system access when a validation
response is not received within a specified time. More commonly known as assume negative.
dependent
In account structure modeling, indicates whether there are any levels below the current one.
DES
In FraudX, the dialed digits and geographic area to which a wireless call is made.
destination point code (DPC)
24-bit field in the Signaling System 7 (SS7) signaling messages service information octet (SIO)
field that contains the point code (address) of the signaling point that is receiving the message.
DPC is part of a call routing label.
42
digital modulation
detail report
Lists each call or each market. This contrasts with a summary report that shows the total, or
average, of all calls or all markets.
Deutsche Telekom MobilNet (T-Mobil)
Europes largest provider of Global System for Mobile Communication (GSM) cellular service.
diagonal links (D links)
Connect secondary signal transfer point (STP) pairs to primary STP pairs in a quad-link
configuration. For example, STPs in a local or regional network would connect to STPs on the
inter-network gateway. Secondary STPs in the same network are connected through a quad of D
links. Because the distinction between bridge links (B links) and D links is somewhat arbitrary,
these links are sometimes referred to as B/D links.
dialed number information service (DNIS)
Included in the Caller Validate message to determine the original dialed digits of the caller and to
identify the 800 number used to route the call to FraudManager.
dialog box
Global system for the mobile communications-based Personal Communications Services (PCS)
network outside of the United States.
digital certificate
1) In cryptography, a password-protected, encrypted data file that includes the name and other
data that identifies an associated entity. A certificate includes a public key that verifies the
digital signature of the user, which is signed with a matching private key unique to the user.
Through the use of keys and certificates entities exchanging data can authenticate each other.
2) Digital token assigned to address security issues when executing business transactions through
the Internet. Certificates are designed so that none of the details can be changed during a
transaction or interchange without invalidating the digital signature.
digital data interceptor (DDI) box
Scanner used to collect wireless mobile identification numbers (MINs), electronic serial numbers
(ESNs), and anything entered through a telephone keypad such as personal identification numbers
(PINs), voice mail, access, and credit cards.
digital envelope
Generic technique for encrypting data and sending the encryption key along with the data.
digital European cordless telephone (DECT)
Device that can be used as a cordless telephone and wireless office phone in Europe.
digital key
String of unique bits that enables a message to be scrambled and unscrambled. The string size
determines the key size. The smallest key contains 512 bits, the largest, 2048 bits - the larger the
number, the higher the level of security. (See also key and session key.)
digital modulation
43
Cryptographically-based assurance that a message or file was sent or created by a given person. A
digital signature binds the persons identity to the message or file content to provide for nonrepudiation (the inability to deny the authenticity of a message or file).
Digital Signature Standard (DSS)
U.S. governments Federal Information Processing Standard 186 (FIPS 186) that describes a
cryptographic algorithm for producing a digital signature.
Direct Access Service Hub (DASH)
Sales agent support system that provide a single point of contact (SPOC) for an agentcarrier/operator relationship. The system simplifies credit checks, phone activations, and
commission accounting and reconciliation.
direct routing
Feature that avoids international call routing tolls by allowing calls to be routed domestically to a
Global System for Mobile Communication (GSM) GlobalRoam Services subscriber traveling in
North America or Latin America.
DirectTalk
IBM-supplied interactive voice response (IVR) product consisting of hardware and software.
disaggregation
Information supplied with a certificate request to uniquely identify a certificate issuer or subject
user. If this component is absent, the distribution point defaults to the certificate revocation list
(CRL) issuer name; that is, the authority that issues and signs the CRL.
DLL
Portion of a computer network in which data processing resources are under common control. In
Internet terminology, a location on the World Wide Web (Web) you can visit or direct e-mail to.
domain name
44
dual-NAM
A network computer that holds the programs and files of a domains names database. (See also
domain name.)
domain name service (DNS)
Computer translation of numeric Internet Protocol (IP) addresses, such as 104.186.83.1, into
Internet domain names, such as zuxa.iecc.com. Because numbers are much more difficult to
remember than words, a DNS is used to associate IP addresses to domain names. (See also
InterNIC and IP address.)
domain name system
An agreed upon convention for naming computers in a network domain. (See also domain name.)
downlink
List of choices for a field, which can be accessed by clicking an adjacent down arrow.
dropout
Momentary loss of a cellular signal that is caused by interference or a weak signal, possibly while
passing through a dead spot. (See also dead spot.)
dropped call
Mobile call in progress that is terminated because of insufficient radio reception or a failed
handoff between cells.
DRP
Wireless communication between two telephones that operate on different bandwidths. For
example, one phone operating on 1850 1990 MHz and another operating on 800 900 MHz.
dual band handset
Telephone that can operate on two different bandwidths for wireless communication.
dual mode
Wireless phone capable of switching from analog to digital and back, depending on which signal
is provided in a service area.
dual-NAM
Ability to select one of two different mobile identification number (MIN) combinations from the
same device. A dual-NAM (numeric assignment module) phone has two MIN combinations that
enable a user to select either of two carriers/operators for wireless service, depending on which
has better rates, coverage, etc. (See also network assignment module.)
45
dual service
Use of two services (simultaneously or sequentially) during the same call. For example, A calls B
using basic telephony (speech), then switches to a fax transmission, and then switches back to
telephony and disconnects.
dual systems
Method of signaling that consists of a push-button dial that emits two discrete tones that are
received and interpreted by telephone switches. This is the way an interactive voice response
(IVR) computer receives service requests from callers over a voice path.
duplex
Type of Cellular Intercarrier Billing Exchange Record (CIBER) error resulting from primary edits.
Indicates the same call records were previously processed within the last 30 days.
duplicate records
More than one call detail record (CDR) associated with the same chargeable service.
dynamic link library (DLL)
Executable code module for Windows and OS/2 that can be loaded on demand and linked at run
time, then unloaded when the code is no longer required.
E
E-mail hit
Involves wide distribution of e-mails that contain information on computer threats and warnings
that turn out to be a hoax. Also known as e-mail hoax or mail spoofing.
E-block license
Type of license granted to a Personal Communications Services (PCS) carrier/operator in the U.S,
which allows the license holder to provide PCS service in a basic trading area (BTA). An E-block
license holder can use 10 MHz of the spectrum. Other U.S. PCS licenses include A-block, Bblock, C-block, D-block, and F-block.
E-link
Time zone of the Syniverse Data Center, which is reflected on all ACCESS reports.
EDI
Operation performed on the individual call records contained in a file to check their validity,
internal consistency, and conformance to specified standards.
editing
46
encryption
EDT
Duration from the time a connection is made to the release of all radio resources. Chargeable time
and elapsed time are usually the same but may differ if a carrier/operator does not charge for part
of the call such as during call hold. In a North American Interest Group Transferred Account
Procedure II (NAIG TAP II) mobile-originated or mobile-terminated call record, this is the Usage
Detail field.
Electronic Data Interchange (EDI)
Standard format for exchanging business data. An EDI message contains data elements that are
separated by delimiters, which collectively build a string called a data segment. One or more data
segments enveloped by a header and trailer form a transaction set, which is the EDI equivalent of
a message.
electronic data transfer (EDT)
Network transportation medium used to transfer roamer call data among carriers/operators, billing
vendors, and settlement and exchange service providers.
electronic serial number (ESN)
Unique number, embedded in a wireless phone by the manufacturer, that is used to identify the
unit for billing and fraud control purposes. ESNs consist of two parts, a manufacturers code that
is assigned by CIBERNET to each wireless phone manufacturer and an individual serial number
for that phone. ESNs are expressed as decimal numbers (1290000000 to 2509999999) or
hexadecimal numbers (81000000 to FA989677F).
EMS
Syniverses complete authentication solution, including key repository, key management, and
authentication services.
Encrypt-A-Key Management Center
Syniverses facility that provides A-Key management service to the Encrypt-A-Key Network
Authentication Center (NAC) and autonomous service provider authentication centers (ACs).
Encrypt-A-Key Network Authentication Center
Syniverses facility that provides authentication services for subscribers who roam in an
authentication-capable market and have authentication-capable phones. (See also authentication
center.)
Encrypt-A-Key Repository
Syniverse service facility that provides storage and retrieval of authentication keys (A-Keys).
encryption
47
Certificate holder that uses its public key for purposes other than signing certificates; that is, it is
not a certification authority (CA).
end-to-end validation
Validation from the home switch being requested by the serving switch. This is possible when
switches are directly connected to each other, such as an Interim Standard 41 (IS-41) serving
switch requests validation from FraudManager for a roamer and the validation request is sent to
an IS-41 home switch), or when both switches are on an Signaling System 7 (SS7) network.
endpoint
Physical address on a network identified by a unique Signaling System 7 (SS7) point code
address; for INLink Online purposes, a home location register (HLR) or a visitor location register
(VLR).
endpoint monitoring
Online process that enables Visibility Services and INLink Online subscribers to view recent
endpoint activity.
enhanced calling card
Bills phone calls directly to a cardholders home telephone account. The cardholder dials a toll
free number to access an interactive voice response (IVR) session or obtain assistance from a
customer service representative (CSR). After the IVR validates the cardholder account
information, it prompts the cardholder to enter a destination number and then connects the call.
enhanced specialized mobile radio (ESMR)
Digital specialized mobile radio (SMR) networks that provide dispatch, voice, messaging, and
data services. Often refers to Nextel Communications, Inc. or Geotek Communications, Inc.
enrollment
Process in which a person provides a model of speech to a voice identification system for storage
and subsequent voice verification.
Enscribe
Tandems file management system for entry sequenced, key sequenced, or relative flat files.
EPI
Principle of roaming that states that roamers cannot be charged for services by a carrier/operator
in a different manner than that carrier/operators home subscribers are charged.
Equipment Identity Register (EIR)
Register of International Mobile Equipment Identity (IMEI) numbers specifying individual pieces
of mobile equipment that are barred from operating in the Global System for Mobile
Communication (GSM) system. Allows stolen or defective equipment to be deactivated by the
mobile switch center (MSC)/equipment identity register (EIR).
ERMES
Process of ensuring that each message on a network reaches its destination intact. If not, a request
is made to resend the message.
48
event threshold
error-handling script
Routine that clears all application resources when a severe application error occurs. In Syniverses
Prepaid Wireless system, this script is created each time an application is generated in the
application builder.
error log
Visibility Services function that allows users to convert an electronic serial number (ESN) from
hexadecimal to decimal or from decimal to hexadecimal.
Ethernet local area network (Ethernet LAN)
Type of LAN that uses twisted-pair wire and coaxial cable to transmit data at speeds up to 10
Mbps. It is used to connect computers and printers within the same building or campus.
ETSI
European counterpart to the American National Standards Institute (ANSI) that encourages the
integration of telecommunications standards throughout Europe.
event
Any network occurrence, which merits the attention of some network device such as a task
commencement or task completion).
Event Manager
Part of Syniverses Mobile Data Solutions, Event Manager is a clearing solution that manages IP
events for content providers and wireless operators, including messaging, m-commerce, mobile
financial, Internet content, intranet access, and entertainment information. (See also Message
Manager.)
Event Management Service (EMS)
Tandem utility that contains processes, tools, and interfaces to report and retrieve events.
event message
User-defined number that represents the acceptable ceiling for a given event, such as tumbling or
teardown attempts, to occur per roamer. It is used to filter out insignificant or normal activity.
49
eXceed
Dialed digits that have been investigated and determined not to be fraudulent. These digits are
entered into a FraudX Exception Dialed Digits table so that upon detection they are automatically
disregarded and no alarm is generated.
exceptional age
Amount of time by which call records are to be transmitted from the visited public land mobile
network (VPLMN ) to the home public land mobile network (HPLMN), as measured from the
time the call was completed. The HPLMN is not obligated to pay for call records older than the
exceptional age. The Transferred Account Data Inter-exchange Group (TADIG) standard is 60
days, but roaming partners can bilaterally agree to a different value.
exchange rate
Rate of currency exchange between two countries with different monetary systems. In the Global
System for Mobile Communication (GSM) system , the rate between the countrys local currency
and special drawing rights (SDRs) is used to simplify currency conversions. This exchange rate is
defined as the number of units of local currency to one SDR. (See also special drawing rights and
pegged exchange rate.)
exm
Links service switching points (SSPs) to alternate signal transfer points (STPs). E links provide an
alternate signaling path if an SSPs home STP cannot be reached through access links (A links). E
links are not usually provisioned unless the benefit of a marginally higher degree of reliability
justifies the added expense.
extended process pair directory command (PPDX)
Lists all the named processes that match a wildcard description. For example, a PPDX of
PPDX$JR* will list all processes with names beginning with JR.
extended system identification (ESID)
Lucent Technologies term for mobile switching center identification (MSCID). It is comprised of
three codes. The first 3-digit code identifies the digital cellular switch; the second 3-digit code
identifies the central processing unit of a Lucent system and is the same as the Switch Number
(SWNO) in an MSCID, also known as the executive cellular processor (ECP); and the remaining
5-digit code identifies the system identifier (SID), which is the same as the SID in an MSCID.
If you reverse the order of the codes in an ESID to SID-ECP-Switch and then delete the ECP, you
get the regular American National Standards Institute 41 (ANSI-41) MSCID, consisting of the
SID and the SWNO.
extension
1) Optional, second part of a computer file name. Extensions begin with a period and contain one
to three characters such as .exe or .com).
2) Means of placing additional information about a certificate in the certificate, such as user
name, issuer name, or issue date. The X.509 standard defines a set of extensions that can be
used in V3 certificates; organizations may also define private extensions to include in a V3
certificate.
50
In Ericsson terminology, a code that identifies a distant switch. It is similar to a common language
location identifier (CLLI) code but is only seven characters. The first three characters of the exm
represent the city, the next two characters represent the switch type and number, and the last two
characters represent a vendor or function. In the example SEAT1PC, SEA = Seattle, T1 = traffic
switch 1, and PC = protocol converter.
external provisioning interface (EPI)
External provisioning interface to the Tandem subsystem. EPI clients interact with the Mate
Control Layer (MCL) to determine the active mate.
F
F link
Type of license granted to a Personal Communications Services (PCS) carrier/operator in the U.S.
An F-block license allows the license holder to provide PCS service in a basic trading area (BTA).
An F-block license holder can use 10 MHz of the spectrum. F-block licenses are reserved for
small companies and entrepreneurs. Other PCS licenses in the United States include A-block, Bblock, C-block, D-block, and E-block.
facilities
Equipment, such as telephone lines or cell towers, or services, such as software utilities, that
makes up a telecommunication system.
far end network element (FENE)
Failure during call record processing that makes it impossible to continue or casts doubt that the
information contained in the call records is correct.
FCC
Specialized process that searches for matches to numbers on a carrier/operator-defined Hot List
and generates an alarm for each match.
feature package
Group of calling enhancement services associated with a wireless subscribers monthly service
such as voice mail or three-way calling.
Federal Communications Commission (FCC)
U.S. government agency responsible for regulating the telephone and radio industries. The FCC
allocates radio spectrum frequencies for certain uses, licenses those frequencies to companies, and
approves equipment types to prevent interference between devices.
Federal Information Processing Standard (FIPS)
U.S. government standards that apply to computer-based systems - in this case, the standards
apply to data communications.
51
FENE
Technology that transmits electronic signals in the form of light through hair-like glass fibers or
pipes. Fiber optic technology allows for much greater capacity and higher quality in transmission
than copper wires and is used increasingly in telephone and other communications systems.
field
1) Part of a record that contains a specific piece of information, such as the date a call was placed
or a visited Public Land Mobile Network Number (VPLMN) code.
2) Space for entering information in a dialog box.
field definition
Description of the type of data that is expected or allowed in a field, sometimes including a range
of permissible values.
file
Related records that are stored together in one logical unit. Files may be applications (programs),
databases, or documents, etc.
file creation date
Process during which ACCESS S&E Services verifies that all files that have been received in
tape or electronic data format meet Transferred Account Procedure (TAP) standards or other
standards agreed to bilaterally by the roaming partners.
file sequence number
Transferred Account Data Inter-exchange Group (TADIG) subgroup, responsible for definition
and maintenance of the Transferred Account Procedure (TAP) and the Rejects and Returns
process.
file server
Computer dedicated for storing files that are shared over a network.
File Transfer, Access, and Management (FTAM)
Network protocol most commonly used in transferring files through electronic data interchange
(EDI). Level 7 in the Open Systems Interconnection (OSI) model.
File Transfer Protocol (FTP)
Application protocol that supports file transfer between local and remote computers, including
those linked through the Internet. FTP supports the bi-directional transfer of binary and American
Standard Code for Information Interchange (ASCII) files, and generally requires a user identifier
and a password for access to files on a remote host.
file transmission date
FraudX function that enables users to select record criteria for display. A filter works much like a
sort, to narrow display characteristics.
52
frame relay
filtering
Ability to control the types of information displayed in a FraudX window. For example, from the
main Cases window users can specify a filter to view only cases with an On Watch status.
financial settlement
Financial reconciliation among wireless carriers/operators for providing roaming services to each
other's customers.
FIPS
Field that always has the same number of bits in each message where it appears.
fixed wireless access (FWA)
Industry negative file (INF) reason (code F) that indicates a wireless telephone with a mobile
identification number and an electronic serial number (MIN/ESN) that has been disconnected.
Fleet-On-TrackSM Service
Syniverse service that provides vehicle location and call validation services to businesses that
market wireless communications for fleet or field service management.
flexible SID blocking
Type of service blocking that denies service by updating a roaming customers profile. This type
of blocking enables FraudForce to track roamers in the blocked location. A carrier/operator can
specify start and stop times for flexible blocking.
flow control
Process of stopping and starting the flow of data as necessary when the receiving device cannot
receive the data as quickly as it arrives.
force positive
Option available to carriers/operators to ensure a definite positive validation status for a valid
roaming customer who is erroneously denied service on a first call in any market.
Forecasting
ACCESSibility analytical tool (available by special purchase) that enables analysis of the
performance of system identification (SID) to SID combinations for selected time frames such as
past and projected future.
frame relay
Network access standard defined by the International Telecommunications Union Telecommunications Services Section (ITU-T) in the I.122 recommendation, Framework for
Providing additional Packet Mode Bearer Services. Frame relay services, delivered by wireless
carriers/operators, use a form of packet switching that is analogous to a streamlined version of
X.25 networks. A frame relay network can accommodate data packets of various sizes associated
with virtually any native data protocol.
53
fraud
Any deliberate attempt to obtain wireless phone service without paying for it. Categories of fraud
include subscription fraud, stolen phone fraud, and access fraud.
fraud analysts
FraudX function that allows individual calls to be marked as fraud. Upon approval by a user with
the proper permissions, a fraudulent call can be sent to the subscribers billing system so the
subscriber is not billed for the call.
Fraud Identification (Fraud ID)
Option that helps carriers/operators identify probable cloning activity. Clone activity is often
indicated by excessive or unusual patterns of use.
Fraud Serial Number (FSN)
Function that automatically denies and restores negative entries in a carrier/operators switch
negative file.
fraud type
Categorized alarm data that governs parameters to classify and develop cases against suspected
wireless fraud. Possible fraud types include collision, velocity, and suspicious dialed digits.
FraudChallenger
Service within FraudForce that provides challenge-and-response controls for verifying hotlined
users. It serves as an automated challenge-response system to callers who are suspected of fraud.
FraudForce
Syniverse product that minimizes fraud by using roamer verification, market controls, and
roaming subscriber controls. When activated for a switch, FraudForce challenges roamers to
identify themselves.
FraudInterceptor
Service within FraudForce that generates and updates Interim Standard (IS-41) verification and
registration messages. A FraudInterceptor service control point (SCP) imposes various profile
restrictions based on information about the current roaming location of a mobile.
FraudManager
Syniverses pre-call roamer validation service that provides carriers/operators with real-time
reporting of valid and fraudulent roaming activity by market in an Interim Standard 41 (IS-41)
environment.
fraudulent roamer
Roamer who is denied calls in any wireless market because a home switch or fraud control system
identified the roamers mobile identification number and electronic serial number (MIN/ESN) as
fraudulent.
FraudX
Syniverse product that uses knowledge-based software to detect and combat wireless fraud.
FraudX uses customized rules, conditions, and system components to ensure it meets specific
company needs.
free call
Calls to certain destinations that do not generate a charge, such as 611, 911, and local business
office calls.
frequency
Rate at which an electromagnetic wave (radio signal) alternates, usually expressed in hertz.
54
frequency ability
Method of radio transmission that allows multiple users to access a group of radio frequency
bands without interference.
frequency reuse
System of allocating frequencies among cells so that nearby, non-adjacent cells can use the same
frequencies. This works because wireless transmitters have a limited range. Frequency reuse
allows a wireless system to handle large numbers of calls with a limited number of channels. The
idea is akin to FM radio stations in different cities using the same frequency without interference.
FSN
Directly connects two signaling end points in networks without signal transfer points (STPs).
FWA
G
gateway
Entrance and exit into a communications network. Technically an electrical repeater that receives
and routes signals from one network to another, Gateways typically include signal conditioners to
filter unwanted noise and control characters. In data networks, gateways usually connect two or
more otherwise incompatible networks.
gateway mobile services switching center (GMSC)
Interface of the wireless network to the public switched telephone network (PSTN).
gateway screening
Process that occurs on any signal transfer point (STP) that connects two networks. The process
verifies that incoming messages are from legitimate network users and discards any that are not.
general location register (GLR)
Syniverses call processor database that contains information used to validate known TIA/EIA-41
roamers. The GLR also contains routing files the call processor uses to locate the home wireless
carrier/operator for the validation of unknown roamers.
General Packet Radio Service (GPRS)
55
File and record management services that provide live extensibility to a call processing
environment; a data file handling mechanism used in all generic execution environment (GXE)
based call processing application environments that provides a highly modular design capability
with extensibility to permit structural changes without removing the call processing application
from service.
generic execution environment (GXE)
Call processing application that enables specific state machines to register for control of individual
invoke operations. It is the base program in which Interim Standard 41.C (IS-41.C) is
implemented.
geopolitical CA
Additional certification authority (CA) in a secure hierarchy that is configured to meet countryspecific restrictions. All CAs below this geopolitical CA also meet the country-specific
restrictions.
GENDIO
Type of alarm that occurs when a switch receives a call record with the same mobile identification
number and electronic serial number (MIN/ESN) as a call record currently in process.
Global Access
Feature that allows a Global System for Mobile Communication (GSM) GlobalRoam Services
subscriber in North America and Latin America to dial international calls.
global challenge
Authentication challenge over a radio control channel that is initiated by a mobile station (MS) for
initial registration, call origination, or call termination purposes.
global messaging layer (GML)
Communication layer used to interface with all ODC server processes and external processes. The
GML messaging architecture follows the Open Systems Interconnection (OSI) model.
global positioning satellite (GPS)
Series of geosynchronous satellites that continuously transmit their positions to support worldwide
navigation, personal tracking, and automatic vehicle location (AVL) technologies.
Global System for Mobile Communication (GSM)
Originally known as Groupe Speciale Mobile, GSM is a time-division based standard for digital
wireless transmissions. It is most prevalently used in Europe but is also used by some North
American Personal Communications Services (PCS) carriers/operators. GSM is designed to
provide one common global wireless standard. (See digital modulation and Time Division
Multiple Access.)
Global System for Mobile Communication Association (GSMA)
A global trade group that represents GSM mobile phone operators, to ensure mobile phones and
wireless services work globally and are easily accessible and to create business opportunities for
operators and their suppliers. Its membership includes manufacturers and suppliers who support
Association initiatives as associate members.
56
GSMA
Enhanced version of the GSM technologies, developed to meet the capabilities of the thirdgeneration global standard for mobile telecommunications (IMT-2000).
global title (GT)
Process of translating a global title (GT) from dialed digits to a node address (point code) and a
subsystem number, which identifies a specific application). Translation takes place on a signal
transfer point (STP) in a Signaling System 7 (SS7) network.
global values
Values are defined in the unnamed area of a configuration file and can be overridden by values
specified in named areas within the configuration file or by values in an alternate configuration
file.
GLR
User-friendly interface to a computer application that uses graphics rather than textual descriptions
to present application features and capabilities. Microsoft Windows and Apple Macintosh are
two well-known GUIs.
graphics interface format (GIF)
Standard compression format scheme for images. It is limited to 256 colors but widely used on the
Internet for line art and images with large blocks of solid colors.
Greenwich Mean Time (GMT)
Original name of the Global System for Mobile Communication (GSM) protocol. (See Global
System for Mobile Communication.)
grouping
ACCESSibility feature that allows member carriers/operators to select, prioritize, and cluster
meaningful data parameters to make reports meaningful for their organization or application. For
example, reports might be grouped according to market geography.
GSM
57
GSM-Plus
Syniverse application that assists carriers/operators with updating their roaming guides more
efficiently.
GXE
H
handheld device markup language (HDML)
Specialized language capable of supporting Internet access from wireless devices such as
handheld personal computers and smart phones. Based on hypertext markup language (HTML),
several commercial versions currently exist.
handoff
Process by which a mobile telephone switching office (MTSO) passes a wireless phone
conversation from one radio frequency in one cell to another radio frequency in another cell.
Handoff occurs when a mobile station (MS) crosses from one cells range into another cells
range. The decision to hand off a call to another cell and the determination of which cell the call
should be transferred to is made by the base station, based on the signal strengths between the MS
and the base stations within its range. Handoff is performed quickly enough that callers dont
notice.
handoff/handback
Transfer of responsibility for a wireless call from one cell to the next by switching frequencies.
handover
Technique used by Global System for Mobile Communication (GSM) technologies to continue a
call when a mobile station (MS) crosses from one cells range into another cells range. The
decision to hand over a call to another cell and the determination of which cell the call should be
transferred to, is made by the MS based on its measurement of the signal strengths between itself
and known base stations in the current area.
hard dollar loss
Revenue a home carrier/operator loses when it must pay a serving carrier/operator for fraudulent
roaming services.
hash function, value, or algorithm
Function or value used to produce a message digest (MD) that cannot be reversed to obtain the
original. Hashing makes it highly unlikely that different messages will yield the same MD. Also
referred to as one-way hashing. (See also cryptographic algorithm, message digest, and
nonrepudiation.)
HDML
58
home endpoint
hertz (Hz)
Measurement of frequency expressed in cycles per second. (See also kilohertz, megahertz, and
gigahertz.)
hexadecimal
Numbering system used extensively with computers that is based on the digits 09 and the letters
AF. Electronic serial numbers (ESNs) expressed in hexadecimal are 8 digits long. (See also
decimal.)
hierarchy of trust
International Standards Organization (ISO) standard for Layer 2 (Data Link Layer) of the ISO 7layered architecture. The high level data link (HLDL) standard ensures that data passed up to the
next layer is received exactly as transmitted - error-free, no data loss, and in the correct order.
hijacker
Fraudulent user who takes control of a traffic channel assigned to a legitimate mobile phone by
increasing the power level of a fraudulent mobile unit above that of a legitimate phone. (See also
call hijacker.)
hit
Event that occurs when a fraud control system identifies a call made by a fraudulent roamer.
hit rate
Percentage of call records that match a predefined pattern. If the percentage is met or exceeded,
the fraud control system creates a violation error.
HLDL
Carrier/operator, market, or switch associated with a mobile customer or phone. It is based on the
phones mobile identification number (MIN) and the area code and exchange (NPA/NXX)
assignments for the carrier/operator, market, or switch.
HomeInfo
American National Standards Institute 41 (ANSI 41) call processor static database used to store
home-related data.
home call
Company a subscriber pays for basic wireless service. In roamer administration processes, the
home carrier/operator is identified by cross-referencing the callers mobile identification number
(MIN) with a routing file.
home endpoint
Home market for any roamer. (See also home location register.)
59
1) Location register to which a user identity is assigned for record purposes. The HLR may
be located in a mobile switching center (MSC) and may be indistinguishable from a MSC. An
HLR may also serve more than one MSC and may be distributed over more than one physical
entity.
2) Signaling System 7 (SS7) switch database located on the service control point (SCP),
which contains information about the current location and validation status of one
carrier/operators subscribers who roam in the market of another (serving) carrier/operator.
home carrier/operator
Subscribers carrier/operator. The subscriber pays the HPLMN, or a service provider that has
contracted with the HPLMN, for basic wireless service.
home roamer
Subscriber from a carrier/operators service area traveling outside the home service area and using
wireless service in another market. (See also roaming subscriber.)
home service area
Customers who have legitimate accounts with a company for wireless service in a designated
service area.
home system identification (home SID)
System identification (SID) in which a roamer subscribes to wireless service. (See also home
endpoint, home location register.)
homer
Cellular users from other service areas using wireless services in a carrier/operators service area.
(See also roaming visitor.)
Hot List
List containing numbers that indicate a high probability of caller fraud. Any match to the Hot List
generates an alarm.
Hot List number
Service definition in FraudForce that screens fraudulent callers while allowing authentic
subscribers to roam with minimum disruption to service.
HPLMN
60
IFAST
HTML
Statistical model of a subscriber base that enables ChurnManagerSM to identify profile patterns and
usage behaviors for any one subscriber within the general population of subscribers.
hypertext
System that uses distinctly formatted text, such as a different color or underscored text, to link to
another location. When a user clicks on hypertext, the resultant jump may be to another location in
the same file or maybe to a different file.
Hypertext Markup Language (HTML)
Text language used to format content passed from Hypertext Transfer Protocol (HTTP) servers to
client browsers on the World Wide Web and for building and displaying Web pages with
hypertext links. HTML is an offshoot of Standard Generalized Markup Language (SGML). It uses
tags and end tags or standard code terminology encased in open brackets (< >), to indicate
formatting or structural information.
Hypertext Transfer Protocol (HTTP)
Used on the World Wide Web (Web) to pass information from HTTP Web servers to client
browsers. It is the protocol that transmits Web data, or what the user types when surfing the net
(along with the domain name). It means: go to and bring me back the index file with the
following name.
Hypertext Transfer Protocol Secure (HTTPS)
Similar to Hypertext Transfer Protocol (HTTP), but this server software provides for secure
transactions to take place on the World Wide Web (Web).
I
ICC
61
ILEC
International Telecommunication Union (ITU) term for the third-generation global standard for
mobile telecommunications.
in-band signaling
Signaling method in which voice channels carry call setup signal information as well as the voice
message, typically as MF signals). It contrasts with out-of-channel signaling.
IN
Set of subscribers that are filed and sorted by any combination of parameters such as vulnerability,
value, monthly revenue, and even native language in Syniverses ChurnManagerSM. The group is
assigned to customer service representatives (CSRs) for contact in proactive mode.
incollects
Long-standing local phone service provider in a market, often a former Bell company. Distinct
from competitive local exchange carriers (CLECs), which are new market entrants.
indirect certificate revocation list (ICRL)
Separate certificate revocation list (CRL) that contains only certificates revoked for the reason
codes Key Compromise or CA (certification authority) Compromise.
individual SPC
Trade group, headquartered in Washington, D.C., that serves private wireless licensees such as
airlines and oil companies.
industry negative file (INF)
Database of all the mobile identification numbers and electronic serial numbers (MIN/ESNs)
reported as negative by member and non-member carriers/operators. Negative reasons include:
Bandit, Flagged, Non-payment, Restoral, and Special.
62
Advanced, full-service, intelligent network (IN) that links wireless service areas to provide
Signaling System 7 (SS7) interconnection between Interim Standard 41 (IS-41) cellular switches
and interfaces with validation services.
inpackSM
Syniverses secure global packet data network providing connectivity between operators,
corporate Intranets, public Internet, and value-added IP services; inpack uses virtual private
network technology to establish a secure connection across a shared public network (i.e., IP
backbone, Internet), enabling operators to offer e-commerce, public Internet, and other packet data
services to roaming subscribers.
INPort
Signaling System 7 (SS7) intelligent network- based service that provides a service bureau for
local number queries and translation for numbers that have been ported. InPort enables efficient
call completion to the correct carrier, avoiding dropped or incorrect calls and unnecessary and
expensive default dips charged from a LEC. (See also Local Number Portability.)
INS
Single call flow in a process. In Syniverses Prepaid Wireless, for example, the service creation
environment (SCE) creates an instance for each incoming call to handle the caller throughout the
entire session, including outdials and conferences.
Inter-Carrier Communications (ICC)
Software service providers use to exchange information, to enable customer numbers to be ported.
You may see the ICC process referred to as ICP.
Integrated Services Digital Network (ISDN)
Communications standard that uses digital transmission technology to support voice, video, and
data communication applications. It is a circuit-based system of fixed bandwidths that uses preexisting copper wiring. Available in BRI, which is designed for the desktop and transmits at 144K
bps; and PRI, which is designed for telephone switches, computer telephony, and voice processing
systems and transmits at 1.5M bps.
Integrated Services User Part (ISUP)
Call control part of the Signaling System 7 (SS7) protocol that determines the procedures for
setting up, coordinating, and taking down calls on the SS7 network. ISUP also provides calling
party number (CPN) information and call status checking to keep trunks in consistent states at
both ends, and incorporates seven messages including the initial address message and continuity
checking message. ISUP is defined by the International Telecommunications Union Telecommunications Services Section (ITU-T) recommendations Q.761 and Q.764. (See also
SS7.)
63
integrity check
Cryptographic test to ensure a message or computer file has not been altered, either accidentally or
intentionally. With such assurance, it is difficult for an unauthorized party to alter data.
intelligent network (IN)
System that allows a wireless subscriber to make and receive phone calls while roaming outside
the subscribers home network. Intelligent networks, which rely sophisticated switching
techniques, also provide many Personal Communications Services (PCS) features such as one
person/one phone.
interactive voice response (IVR)
Computer-based system that plays prerecorded prompts to guide a caller through a series of
actions and accepts user input, usually through the telephone keypad. For example,
FraudChallenger uses an IVR to verify a callers identify. (See also dual tone multi-frequency
and voice response unit.)
intercarrier records exchange complex (IREC)
Data feed from a call collection system to a carrier/operator. It contains post-call event records
that reflect the subscribers roaming activity. The event records contain specific information such
as toll information, call duration, and dialed digits.
intercarrier roamer agreement
Legally binding document executed by two carriers/operators to provide wireless service to each
others roaming subscribers. It includes provisions for rates, privileges, and how to handle fraud.
InterClearinghouse Exchange (ICE)
Interim Standard 41 (IS-41) gateway that transports validation and industry negative file data
between Syniverse and EDS PCD.
InterClearinghouse Net Settlement
Point where two different networks interface to exchange signaling information; for example the
North American Cellular Network (NACN) and a local exchange carrier/operator (LEC).
interconnection
Carrier/operator that provides long distance service between Local Access Transport Areas
(LATAs). (See also Local Access Transport Area.)
interface
Connection between two or more computer-based systems such as switches and other hardware. It
may involve message translation hardware or software as well as the physical connection.
interprocess communication (IPC)
Process by which applications communicate with each other within an operating system.
Interim Standard 41 (IS-41)
64
Encryption algorithm considered much stronger than the data encryption standard (DES). It is not
subject to government-imposed cryptographic controls.
International Forum on AMPS Standard Technology (IFAST)
Group that assigns international roaming mobile identification numbers (IRMs) and coordinates
system identification (SID) assignments internationally.
International Mobile Equipment Identity (IMEI)
Unique identifier assigned to a piece of mobile equipment in the Global System for Mobile
Communication (GSM) system. The IMEI contains the equipments serial number as well as its
manufacturer, country of origin, and type approval. (See also International Mobile Subscriber
Identity.)
International Mobile Subscriber Identity (IMSI)
Numbering standard defined by the International Telecommunications Union Telecommunications Services Section (ITU-T) Recommendation E.212. In the Global System for
Mobile Communication (GSM), an IMSI is a unique account number that identifies a subscriber.
It is made up of the mobile country code (MCC) and mobile network code (MNC) -which identify
the wireless carrier/operator - and followed by additional digits that uniquely identify a subscriber.
IMSI is not tied to a specific piece of equipment; for example, a subscriber can use any GSM
handset by inserting a subscriber identity module (SIM) card, which contains the subscribers
IMSI and other information, into the handset. (See also International Mobile Equipment Identity.)
International Mobile Telecommunications Association (IMTA)
Trade group serving Specialized Mobile Radio (SMR) and Public Access Mobile Radio (PAMR)
carriers/operators around the world.
International Monetary Fund (IMF)
Organization that maintains the special drawing rights (SDRs) used by carriers/operators and other
telecommunications companies for international inter-company accounting.
International Roaming Experts Group (IREG)
Interim solution (IS) assigned by the International Forum on AMPS (Advanced Mobile Phone
System) Standard Technology (IFAST) to identify subscribers internationally until all
carriers/operators adopt International Mobile Subscriber Identity (IMSI). The IRM is used to
resolve numbering conflicts between the North American Numbering Plan (NANP) and other
international numbering plans.
International Signaling Gateway (ISG)
Hardware and software that provides protocol conversion, message routing, and Signaling System
7 (SS7) signaling transfer point (STP) functionality.
International Standards Organization (ISO)
International standards-setting organization, most notable for developing the seven-tier Open
Systems Interconnection (OSI) model.
International Telecommunications Union (ITU)
International organization within which governments and the private sector coordinate global
telecommunication standards for networks and services. In 1992, it absorbed the functions
previously performed by the Consultative Committee on International Telegraphy & Telephony
(CCITT).
65
Internet
Worlds largest computer network, composed of millions of interconnected networks that function
as a huge virtual network. Originally developed for military and educational purposes, the Internet
is now private, administered through the Internet Network Information Center (InterNIC). (See
also Internet Protocol.)
internetworking
Communication between two networks or two types of networks or end equipment. It enables
users to access other files, databases, or applications.
Internet Network Information Center (InterNIC)
Independent agency that registers Internet domain names and addresses for a fee and generally
advances the cause of the Internet community. (See also Internet Protocol and Internet Protocol
address.)
Internet Protocol (IP)
Four groups of numbers, for example 128.51.112.96, that define a network class and address and a
specific machine address on that network. (See also Internet Protocol and Transmission Control
Protocol/Internet Protocol.)
Internet Protocol detail record (IPDR)
Equivalent to a call detail record (CDR) in the voice environment; there is not yet an industry
standard.
Internet Service Provider (ISP)
1) Ability of a network to operate with other networks, such as two systems based on different
protocols or technologies.
2) Ability to exchange cryptographic keys, manually or automatically, with any other party
implementing the X.509 standard, providing that both implementations use compatible options of
the standard and compatible communication facilities.
interprocessor message (IPM)
Message protocol used to communicate between two processors, possibly on two different
platforms.
interstate long distance
Long distance call placed by a wireless user from one state to another state.
Inter-Switch Voice Mail (ISVM)
Voice mail that is routed from one messaging switch to another, using global title translation.
Inter-System Gateway (ISG)
Gateway between the FraudManager call processor to exchange call validation information.
intersystem handoff
Process that occurs when a roaming subscriber moves into another market while making a call.
The serving switch must hand off the call to the new serving switch.
66
IS-41.0
INTNAT
Twelve-digit system for long distance calls dialed outside of the North American Numbering Plan
(NANP).
intranet
Private network that uses Internet software and standards to support services such as e-mail,
information distribution, and interconnection (with appropriate security) to the Internet. For
example, agents and sub-agents with access to Syniverses intranet can use the Syniverse World
Wide Web (Web) page to facilitate voucher replenishment.
intrastate long distance
Long distance call placed by a wireless user within the same state.
invalid messages
Call records processed by ACCESS, or another settlement and exchange service provider, that do
not meet Cellular Intercarrier Billing Exchange Record (CIBER) standards.
invalidity date
Date on which a certificates private key was compromised or on which a certificate otherwise
became invalid. This date may be earlier than the revocation date in the certificate revocation list
(CRL) entry, but must be later than the issue date of the previously issued CRL.
invoice
Summary of the amount a specific corporate account owes a consolidator for wireless usage.
invoke
Latest generation of the digital standard time division multiple access technology.
IS-41
First Interim Standard 41 (IS-41). It included pre-call roamer validation to block known fraudulent
and tumbling users prior to call connection.
67
IS-41.A
Revision of the first Interim Standard 41 (IS-41), which included enhanced capabilities for
wireless services, such as call delivery, subscriber profile transfer, and remote feature control.
IS-41.B
Second revision of Interim Standard 41 (IS-41), which improved switch trunking inefficiencies
and provided dual-mode analog and digital networking capabilities.
IS-41.C
Third revision of Interim Standard 41 (IS-41), which included enhanced capabilities for wireless
services such as seamless authentication, voice privacy, intelligent network (IN) surveillance for
analog-only fraud detection, and intersystem call data transfer for seamless billing capabilities.
IS-54
First Interim Standard (IS) for digital wireless telephones providing a means for validating
customers using encrypted information in addition to the combination of mobile identification
numbers and electronic serial numbers (MIN/ESNs).
IS-95
Interim Standard (IS) for code division multiple access (CDMA). (See also code division multiple
access.)
IS-124A
North American standard for the 1.9 GHz wireless spread spectrum radio-frequency access
technology developed by Omnipoint Corp. Interim Standard 661 (IS-661) is based on code
division multiple access (CDMA) and time division multiple access (TDMA) technologies and is
reputed to reduce infrastructure costs and support higher data speeds than mainstream Global
System for Mobile Communication (GSM) or TDMA platforms.
ISDN
A suite of products and services that deliver and manage wireless IP-based messaging, data
services, and features; includes inpack, Event Manager, Message Manager, and a commercial
location services product. (See inpack, Event Manager, and Message Manager.)
ISP
(See LATALinkSM.)
68
key management
ITA
J
JAVA
Programming language from Sun Microsystems; primarily intended for developing World Wide
Web (Web) applications accessible through Internet browsers such as Microsoft Internet Explorer
and Netscape.
JPEG
Compression technique used primarily for editing still images, graphic arts, and desktop
publishing. Jointly developed by the International Standards Organization (ISO) and International
Telecommunications Union - Telecommunications Services Section (ITU-T), it is often used in
Internet-based applications.
K
Ka-band
Radio spectrum in the 18 GHz to 31 GHz range used by satellite communications systems.
kernel
Part of the UNIX operating system that performs basic services such as reading and writing
information, turning devices on and off, and printing or reading characters on a terminal.
key
Parameter used in conjunction with a cryptographic algorithm that determines the transformation
of plain text data into cipher text, the transformation of cipher text data into plain text data, a
digital signature, or a message authentication code. (See also cryptographic algorithm and digital
key.)
key agreement
Method for negotiating a key value online without transferring the key, even in an encrypted form.
key escrow
Encryption system that enables unauthorized access, for example by government agencies, to
encrypted data through special data recovery keys held by a trusted third party. A copy of a
private digital key is secured at a remote location so it can be recovered if needed. Much
controversy exists over key escrow because of the big brother aspects of the concept.
key management
69
Facility for storing and managing authentication keys (A-Keys). A key management center may be
operated by a service provider that chooses not to use the Syniverse Encrypt-A-Key Management
Center.
key pair
Pair of digital keys one public and one private used to encrypt and decrypt digital information.
The private key is used to encode and the public key is required to decode. (See also public-key
cryptography, public key, and private key.)
kilohertz (KHz)
Combination of an electronic serial number and a mobile identification number (ESN/MIN) that
exists on the industry negative file (INF).
known negative
Roamer whose mobile identification number and electronic serial number (MIN/ESN) are listed as
negative in the industry negative file (INF) and for whom calling services should be denied.
known positive
Roamer whose mobile identification number and electronic serial number (MIN/ESN) are listed
as positive in the general location register (GLR) and for whom the authorization period has not
yet expired.
Ku-band
Radio spectrum in the 10.9 GHz to 17 GHz range used by satellite communications systems.
L
landline
Trade group of frequency coordinators and associations serving private users and commercial
carriers/operators.
LAPB
70
link
LataLinkSM
Syniverses centralized Signaling System 7 (SS7) network connection that provides telephone
companies, competitive local exchange carriers (CLECs), and inter-exchange carriers (IXCs) with
Integrated Services User Part (ISUP) signaling to other IXCs and local exchange carriers (LECs).
LAWBUSTSM
Syniverse service for U.S. law enforcement agencies that provides law enforcement officials with
immediate 24-hour, seven-days-a-week information about wireless carrier/operator contacts. The
service connects to over 70 carriers/operators who can give law enforcement officials critical
information, such as billing or service records, call tracking, and whether a phone has been lost,
stolen, or cloned.
LDAP
Unlike conventional cell phones, a lifetime phone must be cabled to a laptop to alter its numbers.
A lifetime phone chip stores as many as 99 numbers, along with its reprogramming code.
lightweight directory access protocol (LDAP)
Software protocol that enables anyone to locate organizations, individuals, and other resources,
such as files and devices, in a network. LDAP is a lightweight (less code) version of Directory
Access Protocol (DAP).line information database (LIDB)
Contains valid telephone and calling card numbers in a region. It is used for billing validation.
line information database (LIDB)
Local telephone company database, which contains subscriber information used to perform billing
validation. This is a validation database that can be used by an Interexchange Carrier or another
Local Exchange Carrier to perform line record verification.
line information database access (LIDB Access)
Syniverse service that provides line information database and calling name services.
line range
71
Bit-oriented synchronous protocol that provides complete data transparency in a full duplex pointto-point (PPP) operation in which neither end of the link is a permanent master station.
little endian
Describes the sequence in which multibytes are stored in a computers memory. The least
significant byte is stored in the lower memory address, which is the address of the data.
LMCC
Distributing messages on a network to each branch of redundant links so that each link receives
approximately 50 percent of the load.
local area network (LAN)
Short-distance data communications network used to link computers and peripheral devices under
some form of standard control. It is typically limited to a building or campus.
Local Access Transport Area (LATA)
Call placed by a mobile customer to an area code and exchange (NPA/NXX) within a local call
area. Local calls typically incur no long distance toll charges.
local exchange carrier (LEC)
Federal mandate to allow subscribers to change service providers but retain their existing phone
numbers. (See also INPort.)
local record cache (LRC)
Interface that obtains ported subscriber information from the Number Portability Administration
Center (NPAC) and downloads the information to a real-time, network-based number portability
database (NPDB). May also be known as Local Service Order Activation (LSOA).
Local Service Order Activation (LSOA)
System that interfaces with the Number Portability Administration Center (NPAC) to submit and
receive ported number information. NPAC manages its own SOA and a carrier communicates
with the NPAC SOA through its LSOA. May also be known as Local Service Management
System (LSMS).
Local Service Provider (LSP)
Company that provides local, long distance, or wireless telephone service and billing. In Local
Number Portability, associated acronyms include OSP (Old Service Provider) and NSP (New
Service Provider).
72
log off
In local number portability, a mechanized interface that enables a service provider to communicate
with the Number Portability Administration Center (NPAC).
location area
Area in which a mobile station (MS) may move freely without updating the location register. A
location area may consist of one or several base station areas (cells).
location area code
Identifier composed of the mobile country code (MCC), mobile network code (MNC), and
location area code.
location portability
Future capability that will allow both landline and wireless subscribers to relocate to different
geographic locations and retain their existing phone numbers.
Location Routing Numbe (LRN)r
In direct termination routing, the technology that supports local number portability and the ability
of a local telephone number to travel with a customer from local service provider to local service
provider and place to place. In the same way that an e-mail alias is used to route messages via an
alias instead of an IP address that the sender might not know, an LRN is an internal number used
to route calls to an external alias telephone number that someone dials. In number portability,
LRN is used to identify a new service providers switch.
Location Notification (LocNot)
Message sent by an Interim Standard 41 (IS-41) switch each time a mobile unit registers for call
delivery in order to identify the units current location.
lock file
File indicating that operation on one or more other files is restricted or prohibited. The presence of
the lock file can be used as the indication, or the lock file can contain information describing the
nature of the restrictions.
LocNot
Process that copies the audit files from the service control point (SCP) system to Visibility
Services.
logical switch
Collection of wireless switches or other equipment that functions as a single switch within a
network, validation, or call forwarding system. Because the collective has a single network
address, the network treats it as a single switch. (See also virtual switch, physical switch, switch,
and mobile switching center.)
login name
Account name assigned to a user for logging on to an online system; same as user name. (See user
ID.) Unique combination of alphanumeric characters that identifies a user to a computer system. A
user ID is verified by a security subsystem before access is allowed.
log off
73
log on
Action of connecting with and starting up an online activity. It requires entering a user ID and
password on a network.
long distance
Services that allows wireless calls to be placed to an area code and exchange (NPA/NXX) outside
of the callers local calling area.
long distance charges
Service furnished by means of wire, radio, satellite, fiber optics, or any suitable technology or
combination of technologies.
lot
Group of wireless prepaid accounts defined by related characteristics. Each lot assigned to an
agent is unique.
LRC
(See Low-Tech-Interface.)
M
MABEL
Also known as stealth phone; a cigarette-pack-sized reprogramming aid available from mail order
electronics distributors in the United States and Britain. It has no scanning or memory functions,
but enables a mobile crook to connect to a cell phone and change phone numbers every few
minutes.
major account
Large business customer that requires consolidated billing records for centralized invoicing and
management reporting.
Major Accounts Billing Exchange Logistical (MABEL) record
74
mated pair
Large geographic areas in the United States for which various Personal Communications Services
(PCS) carriers/operators are granted licenses to serve. The 51 MTAs in the United States are made
up of 493 smaller geographic areas called basic trading areas (BTAs).
makefile
Specially formatted, user-supplied control file that defines the relationships among the constituent
and target files of a project (specifies the names of target programs and describes rules for their
creation). It lists the required files for each target file and states the shell commands that must
operate on the required files to create or update the target(s).
management information base (MIB)
User interface of a computer system or application. On a wireless phone, the handset and keypad
are part of its MMI.
manual actions
Recommended steps that a fraud analyst takes in response to fraud types and alarms in FraudX.
Manufacturers Radio Frequency Advisory Committee (MRFAC)
1) Geographic area assigned by the Federal Communications Commission (FCC) for the
licensing of wireless phone services. There are two types of markets, metropolitan statistical
areas (MSAs ) and rural statistical areas (RSAs ).
2) Geographic category defined by carriers/operators for their subscribers in order to provide
case management distribution in FraudX. Typically, a market is a city or a group of towns.
mass case removal
FraudX function that allows the removal of mass cases from the system by setting specific
criteria and time frames.
master
Service creation environment (SCE) server process that starts and stops all subsystems in
Syniverses Prepaid Wireless system. It also monitors and maintains all running server processes.
Master PLMN table
Table used by ACCESS S&E Services to store information about the public land mobile
networks (PLMNs) known to the system.
mated pair
Two separate signaling transfer points (STPs), usually geographically disparate, that are
configured precisely the same to duplicate network connectivity, thereby ensuring network
redundancy.
75
Monitoring and control software used to manage mated Signaling System 7 (SS7) applications in
the mated pair environment.
Mate Control Layer Agents (MCL Agents)
Mate Control Layer (MCL) Agents manage CPU-specific information repositories for use by the
technical data sheet (TDS), applications, and the Polymorphic Feature Manipulation (PFM)
library. The MCL Agents maintain data file information on behalf of the TDS, for use by the PFM
library and other TDS processes.
Mate Control Layer Master Process (MCL Master Process)
Responsible for collecting information from an operating environment and from Mate Control
Layer (MCL) Master Processes on other nodes. It detects the state of common channel signaling
applications (CCSAs) or a non-CCSA services on its node. . The MCL Master Process must also
detect whether or not a CCSA is available on the Signaling System 7 (SS7) network, prohibited on
the SS7 network, or unavailable to the SS7 network.
MBI
Frequency measurement equal to one million hertz. (See also hertz, kilohertz, and gigahertz.)
memory segment transfer (MST)
Sequence of requests and replies to distribute information from the Mate Control Layer (MCL)
Master Processes to subordinate MCL Agent Processes.
Memorandum of Understanding (MoU)
European organization that establishes standards and practices for the Global System of Mobile
Communication (GSM) environment. Originally, it referred to the group of carriers/operators and
national regulators who signed the Memorandum of Understanding in 1987 that established GSM.
menu
List of options that appears on a terminal screen and allows a selection to be made.
MEP/TCP
76
MEP/VSP
1) Record of an answered (completed) call. (See also call record.) 2) Information transmitted on a
packet-switched network, such as Signaling System 7 (SS7), travels in parcels called messages.
On the SS7 network, messages are also signal units.
message digest (MD)
Condensed version of a message produced by processing the message with a hash algorithm.
Typically, the digest has a fixed length and is independent of the length of the original message. It
is used to create a digital signature unique to a particular document. An MD can be made public
without revealing the contents of the document from which it is derived. (See also cryptographic
algorithm and hash function.)
message digest version 5 (MD5)
Hashing algorithm. The most common key algorithm used to generate digital certificates.
Message Manager
In local number portability, software that supports robust and accurate flow of porting messages as
well as error checking, to automate switching a customer from one service provider to another.
message service unit (MSU)
Unit of measure on a Signaling System 7 (SS7) network. A single SS7 message typically contains
one Interim Standard 41 (IS-41), one Transaction Capabilities Application Part (TCAP), or one
Integrated Services user Part (ISUP) message. In call processing, this is a message that contains
Message Transfer Part (MTP), SCCP, and TCAP components, sent from or delivered to a call
processing application.
Message Transfer Part (MTP)
Bottom three levels of Signaling System 7 (SS7) signaling node (physical, data link, and network)
used to place formatted signaling messages into packets, strip formatted signaling messages from
packets, and send or receive packets.
Message Transfer Part Level 1 (MTP 1)
Bottom level of the Signaling System 7 (SS7) protocol MTP. Defines the physical, electrical, and
functional characteristics of the data link and the means to access it. This level defines the medium
over which the signaling link is established.
Message Transfer Part Level 2 (MTP 2)
Middle level of the Signaling System 7 (SS7) protocol MTP. At the receiving end, MTP 2
receives a bit stream, assembles bits into fields, assembles fields into messages, provides error
checking and correction, and provides flow control. At the sending end, MTP 2 does the reverse.
Message Transfer Part Level 3 (MTP 3)
Top level of the Signaling System 7 (SS7) protocol MTP. Performs two functions: Signaling
Message Handling, which routes signaling messages between signaling points and Signaling
Network Management, which handles control information concerning outages and congestion.
77
messaging standard
Signaling is the process of exchanging format and protocol information that is used to control
wireless communication. Messaging standard information contains parameters that support
mobility management through a network, including call validation, call delivery and features
information.
metropolitan statistical area (MSA)
U.S. Census Bureau term for a widely populated area such as a large city. In telecommunications,
the term refers to the coverage area of a telephone network. (See also market.)
MHz (megahertz)
(See megahertz.)
MID
Software components between an application and an operating system that are neither applications
nor operating systems; for example, a database management system (DBMS).
MIME
Term used interchangeably with NPA NXX and came as a result of Number Pooling and Number
Porting. A Service Provider always maintains MINs but can gain or lose MDNs.
MIN/ESN
Unique combination of a mobile identification number (MIN) and an electronic serial number
(ESN). Normally, this corresponds to an individual wireless telephone (unit), although a
fraudulent user may create many MIN/ESN combinations with a single device.
minutes of use (MOU)
In Interim Standards 41 (IS-41) and Global System for Mobile Communication (GSM) networks,
MAP messages sent between mobile switches and databases are used to support user
authentication, equipment identification, and roaming. When a mobile subscriber roams into a
new mobile switching center (MSC) area, the visitor location register requests service profile
information from the subscriber's home location register (HLR) using MAP information.
mobile country code (MCC)
Three-digit code, which is part of the International Mobile Subscriber Identity (IMSI), that
identifies the country in which a wireless carrier/operator offers service. MCCs are assigned by
the International telecommunications Union (ITU).
78
Combined with a subscriber identification module (SIM), ME becomes a mobile station (MS).
(See also subscriber identity module and mobile station.)
mobile identification digits (MID)
Telephone number; area code-exchange-line number (NPA- NXX-line). (See also mobile
identification number.)
mobile identification number (MIN)
One- to three-digit part of an International Mobile Subscriber Identity (IMSI) that uniquely
identifies a carrier/operator within a country.
mobile originated call (MOC)
Call detail record (CDR) for a mobile originated call (MOC) in a Transferred Account Procedure
(TAP) user file (record type 20).
mobile station (MS)
Wireless phone in an Interim Standard 41.C (IS-41.C) network r. Mobile stations may be fixed,
such as those permanently installed in vehicles, or portable, such as hand-held wireless phones.
Mobile station information (MSINFO)
American National Standards Institute 41 (ANSI-41) call processor volatile database used to store
mobile station (MS) related data.
mobile station Integrated Service Digital Network number (MSISDN)
1) Wireless telephone; value indicating the power capability of the mobile equipment making or
receiving a call.
2) Unit of measure on a Signaling System 7 (SS7) network. A single SS7 message typically
contains one Interim Standard 41 (IS-41), one Transaction capabilities Application Part
(TCAP), or one Integrated Services User Part (ISUP) message.
mobile switching center (MSC)
Computer-controlled wireless switch that establishes and controls connections between calling
parties; assigns frequencies for wireless calls; manages cell-to-cell handoff of calls in progress;
and provides network management, billing, monitoring, and control functions. (See also mobile
telephone switching office and switch.)
79
Unique number made up of a five-digit system identification (SID) number and a three-digit
switch number (SWNO) that identifies each wireless switch. (See also switch identification.)
mobile telephone switching office (MTSO)
Located between a cell site and a conventional telephone switching office, the MTSO is the link
between a wireless phone and the rest of the public telephone network (PTN). The MTSO also
routes traffic within a system, records call details on tape, and forwards the tape to the
carrier/operators rating/billing vendor.
mobile terminated call (MTC)
Call detail record (CDR) for a mobile terminated call (MTC) in a Transferred Account Procedure
(TAP) user file (record type 30).
MOC
Device that enables a computer to communicate using a telephone line. A modem converts a
computers digital data to tones that can go through the phone line (modulation). Data received
from another computer is converted from tones to digital data (demodulation).
modem pools
Keys on a computer keyboard produce no character or action by themselves but, when held down,
can modify the action of other keys. These keys are the Shift, Control (CTL or CRTL), and
Alternate (ALT) keys.
monthly recurring charges, monthly charges
Charges incurred every month by a wireless user for services provided by the carrier/operator (See
also access charges.)
MoU
80
MSCID
Supplementary service allowing simultaneous communication with more than one party. It
requires call holding to be active.
Multimedia Messaging Service (MMS)
I/O control program (Signaling System 7 (SS7) protocol stack converter device) used to handle
connections with the MSVP through Transmission Control Protocol/Internet Protocol (TCP/IP).
Multi-endpoint Transmission Control Protocol (MEP/TCP)
81
N
NaBanco
Credit reporting agency used for Prepaid Wireless transactions. The system sends requests for
information or approval for transactions. NaBanco sends responses back to Prepaid Wireless.
NACN
Transferred Account Procedure (TAP) file format used by North American Interest Group (NAIG)
carriers/operators, as specified by Transferred Account Data Inter-exchange Group (TADIG)
document TD.27. NAIG TAP II extends TAP 2 functionality to handle North American-specific
billing issues, such as toll charges, multiple taxes, and multiple markets within a public land
mobile network (PLMN).
NAM
Areas in a compiled application configuration file that contain instance-specific values. Named
areas are labeled - the label is enclosed in square brackets - and can contain an unnamed area that
specifies global value overrides.
NAMPS
One billionth of a second. Often used to measure response time of such things as computer
memory.
NANP
Narrowband version of the analog cellular telecommunications system used in North America. It
is characterized by dividing the 30 KHz analog radio channels used for Advanced Mobile Phone
System (AMPS) into three 10 KHz channels, thereby increasing capacity.
narrowband Personal Communications Services
82
network element
NDA
Roamer validation status that indicates a caller is invalid or fraudulent and should be denied
service or if a call is in progress, that call teardown should be initiated.
negative entries
Entries on the industry negative file (INF). ACCESS edits for and rejects those calls made by
roamers with mobile identification numbers and electronic serial numbers (MIN/ESNs) that were
on the INF after the effective liability time.
negative file
File containing blacklisted mobile identification numbers (MINs) and electronic serial numbers
(ESNs) that should be denied service. Syniverse maintains an industry negative file (INF) and
each carrier/operator maintains a local negative file in its switch.
negative file bypass
System identification (SID) to SID summary of the activity between a carrier/operator and its
roaming partners.
net settlement
Monthly accumulation of financial data among roaming partners, identifying the total payables
and receivables of each carrier/operator. For Cellular Intercarrier Billing Exchange Record
(CIBER) data, the settlement period runs from the 16th of one month to the 15th of the following
month. For Global System for Mobile Communications (GSM) technologies, the normal
settlement period is a calendar month. (See also industry net settlement.)
network
System that links two or more places and pieces of equipment. Network components may be
widely dispersed, such as the Internet, or in relatively close proximity, like a LAN. Networks
typically include some type of hardware connection, such as copper wire, fiber optics, or
microwaves, and software to administer and monitor transmissions. They may also include routing
and switching facilities.
network assignment module (NAM)
Integrated circuit in a wireless phone that is programmed with information specific to that phone,
including its electronic serial number (ESN) and mobile identification number (MIN).
network element
Network device. On the Signaling System 7 (SS7) network, elements are synonymous with
signaling points or nodes, such as signal transfer points (STPs), service control points (SCPs), and
the switch (mobile switching center (MSC) on a wireless network).
83
Input driver used to collect information, such as alarm, traffic, call detail record (CDR), or
automated message accounting (AMA) data, from telecommunication switches or to manage
devices that use Simple Network Management Protocol (SNMP), CMIP/CMIS in real-time.
Connections to a Network Interface Management Language (NIML) can be through different
mediums such as dedicated lines, dialup lines X.25 lines, LAPB/HDLC, and Transmission Control
Protocol/Internet Protocol (TCP/IP) ports. Collected information is then stored in log files which
may be compressed to save space. Some early versions of TransAction Manager refer to
collector applications as NIMLs.
Network Service Provider (NSP)
Company that provides the facility or infrastructure used to route network messaging.
New Network Service Provider (NNSP)
In number portability, the NNSP is the recipient provider that will provide the facility or
infrastructure used to route network messaging.
New Service Provider (NSP)
In number portability, the NSP is a recipient provider that aquires a new customer from a donor or
old service provider (OSP).
night rate
Per-minute airtime rates for overnight hours. Usage rates for these hours are generally the lowest
of any time of day.
NIML
Message displayed by a modem when the phone line connection is lost. (See also modem.)
node
CIBERNET designation for a wireless unit whose mobile identification number and electronic
serial number (MIN/ESN) belongs to a customer who has an unpaid wireless telephone bill and
has been suspended or disconnected in the home system. The industry negative file (INF) reason
code is N.
non-returned
Carrier/operator-owned wireless telephone that was not returned by a user. Reason code S
(Special) in the industry negative file (INF).
Non-Signaling Data Protocol for Fraud (NSDPF)
Facility that delivers near real-time data to fraud management systems. Based on the
Telecommunications Industry Associate (TIA) Interim Standard 124 (IS-124).
84
NPA-NXX
non-wireline
Wireless carrier/operator not affiliated with a landline telephone service. One of two types of
carrier/operator designated by the Federal Communications Commission (FCC) to provide
wireless telephone service. A-side licenses were originally awarded to companies other than local
telephone companies. (See also A-side carrier/operator.)
nonrepudiation
Inability to deny the authenticity of a message or file through undeniable evidence that an initiator
of the message sent the message or a receiver received it. (See also digital signature and message
digest.)
normalized record
Intermediate record format produced by applying translation rules to call detail records (CDRs).
Normalized records are input to business rules processing.
normalizing
Phase of translation during which an input conversion object reads an input record object from an
input conversion work queue, applies translation runtime rules, creates a normalized record, and
places the normalized record in an output conversion work queue in preparation for business rule
processing.
North American Cellular Network (NACN)
Group of North American Personal Communication Services (PCS) carriers/operators that use
Global System for Mobile Communications (GSM) technology to provide wireless services.
North American Numbering Plan (NANP)
System that specifies the format for telephone numbers in the United States, Canada, Bermuda,
and many Caribbean countries. It uses a system of 10-digit numbers to uniquely identify every
telecommunications device in North America.
Notice of Inquiry (NOI)
In local number portability, the FCC opens a Notice of Inquiry window for 30 90 days to ask the
industry to provide input regarding a suggestion so the FCC can understand all sides of an issue.
notification file
Empty user file (one with no (CDRs) call detail records) transferred between a given source and
destination, and produced for electronic transfers to indicate that no other data is available to be
transferred.
NPA
First six digits of a 10-digit telephone number the area code (NPA) and exchange (NXX); for
example, 813-5555. Because these numbers are uniquely assigned to a service provider and a
geographic region, the numbers can be used to determine the home market of a roamer for
settlement, validation, or call delivery.
85
NPA-NXX-line
Cellular Intercarrier Exchange Billing Record (CIBER) standard that requires call records
(messages) to be grouped in batches by serving system identification (SID) and/or home SID
combination. During editing, if ACCESS determines that an area code and exchange
(NPA/NXX) does not match the SIDs for the batch, the record is rejected.
NPDB
First three digits (area code) of a 10-digit telephone number. NPAs are assigned by Bellcore.
Approximately 300 NPAs are assigned in North America.
Number portability
Entity (Lockheed Martin) that maintains a database of all subscribers who port their numbers.
When a number is ported from one service provider to another, the donor and recipient service
providers update the NPAC database. This information is used to route calls correctly to the ported
subscriber. (See also local number portability, and Service Order Activation.)
Number Portability Administration Center Service Management System (NPAC SMS)
NPAC software system that facilitates data communication between the NPAC and its users.
Number Portability Database (NPDB)
Real-time Signaling System 7 (SS7) network-based database that contains information on ported
numbers. This database, which contains a subset of the information provided by the NPAC, can be
hosted at either a service control point (SCP) or a signal transfer point (STP).
number range
Sequence of dialed numbers in a geographic area's numbering scheme that identifies line range
(phone numbers). Usually the first and last numbers in the range are given.
numbering format
In call detail records, a sub-field that indicates the type of numbering scheme used to assign a
called or calling number (ISDN/telephony, data, national, private, or undefined).
86
OMAP
Integrated circuit in a wireless phone that is programmed with information specific to that phone,
including its electronic serial number (ESN) and mobile identification number (MIN).
NXX
Central office code or exchange. The second three digits of a 10-digit number or the first three
digits of a 7-digit local telephone number, under the North American Numbering Plan (NANP).
O
OBEY
Set of flexible, special objects that allow developers to build user interfaces to Transaction
Manager products and be able to reuse them frequently to simplify development.
Object Monitoring Facility (OMF)
Tandem utility that supervises objects such as CPUs, disks, process, and communication lines.
OCC
Hours during which a system is little-used. In wireless systems, off-peak time is usually defined to
be between 7:00 p.m. and 7:00 a.m., local time, as well as weekends and holidays. Per-minute
airtime rates are usually lower during this period.
offline certification authority (offline CA)
Standalone workstation used to create root certificates and subordinate certification authority (CA)
certificates.
OID
In number portability, the ONSP is the donor provider that formerly provided the facility or
infrastructure used to route network messaging.
Old Service Provider (OSP)
In number portability, the OSP is the donor provider that transfers a customer to a recipient or new
service provider (NSP).
OMAP
87
OMECS
Cellular Intercarrier Billing Exchange Record (CIBER) standard that specifies the liability for
unauthorized roamer activity. Liability transfers to the serving carrier/operator one hour after the
home carrier/operators clearinghouse notifies the validation services of a fraud incident (invalid
mobile identification number and electronic serial number (MIN/ESN).
Online Message Error Correction System (OMECS)
Function of the Cell-U-Rator system that allows users to go online to correct field errors in
Cellular Intercarrier Billing Exchange Record (CIBER) records.
ONSP
A GSMA-approved project that seeks to simplify the roaming and inter-working agreement
process while leaving operators in control of commercial agreements. At a high level, OC will
improving the efficiency of the current bi-lateral agreements system that exists among multiple
service providers, by moving toward a hub-based interconnection architecture.
open roaming file
File containing the area codes and exchanges (NPA-NXXs) of wireless telephones for which
roaming services are allowed.
Open Systems Interconnection (OSI) reference model
Network architectural model developed jointly by the International Standards Organization (ISO)
and the Consultative Committee on International Telegraphy & Telephony (CCITT). The model
consists of seven layers, each of which specifies particular network functions such as addressing,
flow control, error control, encapsulation, reliable message transfer, and others. Layer 7 (the
application layer) is closest to the user. Layer 1 is closest to the transmission medium.
Operations, Maintenance and Administration Part (OMAP)
Part of the Signaling System 7 (SS7) protocol that controls network management capabilities
including creation, modification, deletion, interrogation, activation, and deactivation of routing
data; intra- and inter-network Message Transfer Part (MTP) route verification; inter-network
Signaling Connection Control Part (SCCP) route verification; and link failure notification. OMAP
uses Transaction Capabilities Application Part (TCAP) for message transmission.
Operating Support System (OSS)
Network feature enabling a service provider to regulate access to certain categories of outgoing or
incoming calls, or of roaming.
88
Opt In
When an operator signs an OC contract, agreements are automatically established; the operator
must disable the agreement Opt Out.
origination point code (OPC)
24-bit subfield to the service information octet (SIO) field in Signaling System 7 (SS7) signaling
messages that contains the point code (address) of the signaling point that sent the message. OPC
is part of the routing label.
Origination Class of Service
Set of permissions and privileges in a voice network or data signaling rates, terminal operating
mode, or code structure in a data network assigned to a call at its origination. Known as
Origination Indication in Interim Standard 41 (IS-41). The call normally retains this class of
service throughout, although some features or capabilities may be lost due to incompatibility with
another carrier/operators facilities.
OSP
One-time charges and credits that may be applied to a customers account. For example, call
credits, late payment fees, or promotional credits.)
other clearinghouse returns (OCH)
Call records (messages) that fail the primary edit process of a settlement and exchange service
provider other than ACCESS. These call records are subsequently returned to the serving
carrier/operators billing vendor.
out-of-band signaling
Type of signaling used by telecommunications service providers for call setup and features. The
signals are carried on separate facilities rather than on the voice path. For example, Signaling
System 7 (SS7) uses out-of-band-signaling.
outcollects
Records for calls made by subscribers to their carrier/operators roaming partners markets. (See
also receivables.)
overridable error
Ability of a carrier/operator to add new features or services to a customers handset using the
wireless network instead of asking the customer to bring the unit into a retail establishment for
reprogramming.
89
P
pack
Group of Cellular Intercarrier Billing Exchange Record (CIBER) formatted call records that are
forwarded from one serving system identification (SID) to a particular home SID. (See also
batch.)
packet InterNet groper (PING)
Program used to test availability of destinations by sending ICMP echo requests to a known
working host and waiting for a reply in order to see if the Transmission Control Protocol/Internet
Protocol (TCP/IP) connection is good (working).
packet switched network (PSN)
Carries information in discrete messages that can take independent routes to their destinations as
opposed to a circuit dedicated to an information stream.
packing
Process of putting Cellular Intercarrier Billing Exchange Record (CIBER) data on a tape to send
to a settlement and exchange service provider to ACCESS for example.
PageNameSM
Syniverse service that uses automatic number identification (ANI) and calling name databases
(CNAM), to deliver a callers name and number to alphanumeric paging subscribers.
PAMR
Call detail record (CDR) generated for an ongoing call. (See also chaining.)
partitioning
Service definition that instructs FraudForce to pass a roamers home profile to a serving mobile
switching center (MSC) without restrictions. This control does not place checks or controls on
roaming, and allows full use of all roaming features available from the home carrier/operator.
passwd
1) Secret code used to access a computer system. For security, the passwords characters appear
on the screen as asterisks (*) as a user types them in. Passwords should be changed
periodically to prevent unauthorized access. I
2) In areas using voice verification, a spoken phrase of one or more words, which is recorded and
stored in a system database, for later use in verifying the identity of the caller.
90
peak
PATHCOM
Type of alarm that occurs when predefined conditions, which indicate suspicious calling activity,
are met in a call record.
patterns
Predefined conditions that identify call record characteristics that are associated with potential
wireless fraud such as cloning.
pay phone fraud
1) Records for calls made by subscribers who roam in their carrier/operators roaming partners
markets. 2) Amount one carrier/operator owes to another. (See also incollects.)
PCA
Hours of heaviest wireless system use. Peak time is usually defined as being between 7:00 a.m.
and 7:00 p.m., Monday through Friday. Per-minute airtime rates are highest during peak time.
91
Rate to be applied to call records on a given date as determined by the International Monetary
Fund (IMF). The pegged rate is stored in ACCESS S&E Services internal tables and is checked
to verify the validity of the exchange rates stored in call detail records (CDRs). The pegged rate
normally is the exchange rate in effect on the 23rd of the preceding month, although the rate can
be changed if there is a significant (+5%) fluctuation between the pegged rate and the exchange
rate on a given day during the month.
pended certificate
World Wide Web (Web) browser technique that allows information to be passed from one
browser page to another.
Personal Communications Industry Association (PCIA)
Digital wireless telephone system that uses lightweight, inexpensive, hand-held phones, which
communicate with low-power antennas. Cells are much smaller than those in conventional
wireless systems and they use a different frequency band (18501990 MHz). PCS operates at
1900 MHz in North America and at 1800 MHz outside of North America; traditional wireless
operates at 800 MHz.
Personal Communications Services (PCS)
Broad range of digital telecommunications services widely available throughout the United States
and Europe that enable individuals or devices to communicate regardless of location. PCS phone
numbers are assigned to individuals rather than telephones and call management services give the
recipient control over incoming calls.
personal digital assistant (PDA)
Any mobile hand-held device that provides computing and information storage, and retrieval
capabilities. Often used for keeping schedule calendars and address book information.
Personal Digital Cellular (PDC)
Security feature of subscriber identification modules (SIMs). (See also personal identification
number.)
persons of population (POPs)
1) Term used to indicate the number of potential subscribers in a market. One POP equals one
person. A carrier/operator whose market serves one million people is said to offer service to
one million POPs. Wireless industry systems are valued based on the population of the market
served.
2) Point of presence. A service provider's location for connecting to users.
PFM
92
PLMN code
PGS
Advanced version of Syniverse PMASM service that extends advanced call delivery services, to
non-wireline carriers/operators.
phone number
Ten-digit number assigned to a specific wireless telephone to identify that telephone exclusively
to the mobile telephone switching office (MTSO). Includes a 3-digit numbering plan area (NPA),
3-digit carrier code or exchange (NXX), and 4-digit line number.
phone phreaks
Thieves who deal in a wide variety of toll phone frauds. Also known as phreakers.
physical service name (PSN)
During global message layer (GML) communication, processes that need services write service
requests to an associated PSN. Processes capable of answering these service requests respond to
the PSN.
physical switch
Actual electronic device that switches wireless phone calls, in contrast to a virtual switch or
logical switch. (See also MSC and switch.)
PIC
Programming construct that couples the output of one program directory to the input of another.
Pipes are created by using a vertical bar ( | ) between commands. For example, % nroff inputfile ms | 1pr processes the input file (with the nroff command) and sends the processed file directly to
the printer.
plain old telephone service (POTS)
Typical landline telephone system, contrasting with wideband, high-speed, and other specialized
telecommunication services.
Plenary
Five-character code that identifies each Global Service for Mobile Communication (GSM)
carrier/operator. The first three characters identify the carrier/operators country and the last two
identify the carrier/operator. Public land mobile network (PLMN) codes are identified in
Memorandum of Understanding (MoU) PRD TD.13, TAP PLMN Naming Conventions.
93
point code
Unique Signaling System 7 (SS7) network address that identifies a network node so the SS7
network can route calls to the node. For example, 235:14.1.
point of contact
Service providers location for connecting to users. Most providers have several POPs to allow
low-cost access over telephone lines.
point-to-point (PPP)
Asynchronous protocol used to pass Transmission Control Protocol/Internet Protocol (TCP/ IP)
software packets over serial connections (dial-up modems). This service enables individual
computers to have their own Internet addresses (IP addresses) or direct access to the Internet.
policy
Written statement that defines under what terms and conditions a certificate shall be used.
Provides guidelines that govern the generation, management, and use of a digital certificate.
policy certification authority (PCA)
Root certification authority (CA). Sometimes called a PCA because the root sets the policies for
its domain.
policy mapping
Recognizing that when a certification authority (CA) in one domain certifies a CA in another
domain, a particular certificate policy in the second domain may be considered by the authority of
the first domain to be equivalent (but not necessarily identical) to a particular certificate policy in
the first domain.
Polymorphic Feature Manipulation (PFM)
Set of routines designed to intercept standard nonstop kernel (NSK) system calls, to implement the
Syniverse Database Synchronization (TDS) collection mechanisms without direct modifications to
applications involved in data I/O.
Pooling Administration System (PAS)
PAS automates the national pooling administration function, by managing thousand-block pools
of available telephone numbers (NXX-Xs). A pool is created using blocks donated to the pool by
service providers. The process of assigning pooled resources is governed by a set of industrydefined forms which PAS creates, stores, executes, and administers.
POP
To move something from one system to another; in number portability this means to move a
telephone number from one service provider to another. Messages associated with porting are
characterized as being port-in, port-out, requests, or responses. So you might see references to PQI
(Port-In Request), PQO (Port-Out Request), PR1 (Port-In Response), or PR2 (Port-Out Response).
portable document format (PDF)
Page description language that electronically captures the layout of an original document. Adobe
Acrobat software permits any document created by a DOS, Macintosh, Windows, or UNIX
application to be converted to a PDF.
94
positive
Roamer validation status indicating that the caller is valid and allowed to make calls.
positive file
File containing the mobile identification numbers (MINs) and electronic serial numbers (ESNs) of
valid wireless subscribers.
post-call validation
(See point-to-point.)
PQI or PQO
(See port.)
PR1 or PR2
(See port.)
pre-call validation
Call validation that occurs before a call is connected, detecting and blocking a fraudulent call on
the invalid user's first attempt. Requires Interim Standard 41.0 (IS-41.0) or later revision.
preferred inter-exchange carrier (PIC)
Code contained in a wireless subscribers Interim Standard 41.A (IS-41.A) service profile that
indicates the preferred carrier/operator for long distance service. The profile is transferred only
between two FraudManager IS-41.A, Signaling System 7 (SS7), or direct-connected markets.
Pre-LIDB Call Management System (PCMS)
Syniverses collect-call fraud management system, which scans called telephone numbers,
compares them to a carrier/operators line information database (LIDB), and blocks outbound
collect calls.
prepaid calling card
Enables cardholders to charge phone calls to a prepaid account. Customers purchase a card that
contains a designated amount of calling time measured in either units or dollars. Each time the
cardholder uses the card; the cost of the call is deducted from the card balance until the entire
available amount is used. Cards may be designated as rechargeable (the cardholder can purchase
additional time or add cash value to the card).
Prepaid Wireless Services
Syniverse solution that uses prepaid debit cards to represent the phone time a consumer or retailer
pays for in advance. Some cards store the time used directly on the card, while others use a remote
computer to track the used time. If a card is lost or stolen, liability is limited to the prepaid
amount.
pretty good privacy (PGP)
Implementation of public-key cryptography used with computer data, e-mail, and voice
conversations. PGP is based on public-domain software that is freely available from the Internet,
although numerous security and software companies offer customized versions for a fee.
95
primary edits
Edits performed by a carrier/operators authorized receipt point (ARP), such as ACCESS S&E
Services. The ARP checks all files for industry standards and flags or rejects those that fail to
meet the standards.
primary link
One half of a key pair, kept private by the owner, used with a matched public key to decrypt
messages or files.
privilege set
Grouping of multiple privileges into a single entity. Privilege sets are locally defined to simplify
privilege assignment.
privileges
Mode in which a customer service representative (CSR) studies a subscriber profile and reviews
available actions and offers before contacting the subscriber.
problem analysis request (PAR)
Form used to document and track application anomalies and the issues or concerns of users, both
internal and external.
process description (PDESC)
Specific description associated with every process configured for the call processor.
process pair directory command (PPDX)
Lists all named processes that match a wildcard description. For example, PPDX$JR* will list all
processes names beginning with JR. (See also extended process pair directory command.)
Profile Evaluation module
FraudX component that evaluates a call record against a subscriber profile, including analysis of
call clusters, call count and duration, call source and destination, and fraudulent areas roamed.
Profile Generation System (PGS)
CloneDetector component that creates and maintains subscriber profiles for a carrier/operator's
home subscribers. Profiles, which represent typical calling behavior, may be for groups or
individuals.
profile variation alarm
Alarm generated in FraudX when the thresholds in a subscriber profile are exceeded. Examples
include a significant increase in the subscribers minutes of user (MOU) or several calls made to
areas in which the subscriber never roams.
profiling system
Fraud detection system that compares current calling activity to a variety of dynamic factors, to
identify abnormal activity, which may indicate fraud.
Project 25
Joint government and industry effort to define technical standards for the next generation of twoway communications equipment.
96
QualDir
prompt
1) Recorded message that callers hear when they connect to interactive voice response (IVRs)
units. 2) Cursor or dialog box that prompts a user to verify a command.
protocol
Formal description of message formats and rules that two computers must follow to exchange
messages. Protocols can describe low-level details of machine-to-machine interfaces (for example,
the order in which bits and bytes are sent across a wire), or high level exchanges between
programs (for example, the way in which two programs transfer a file across the Internet.)
Protocol Data Unit (PDU)
Open Systems Interconnection (OSI) term for a generic packet. A PDU is a protocol message,
typically contained in a header, to communicate payload and protocol-specific control
information.
provisioning
European designation for services similar to specialized mobile radio in the United States
public key
One half of a key pair, used to verify signatures created with a matched private key. Also used to
encrypt messages or files, which can be decrypted only by using the matched private key.
public key cryptography, public key encryption
Encryption method that uses public and private key pairs. Information encrypted with one key can
be decrypted only by using the other key of the pair. Allows data to be sent over unsecured public
networks with a high degree of integrity and confidentiality.
Public Land Mobile Network (PLMN)
1) Vast landline network consisting of local exchange carriers (LECs) and inter-exchange
carriers (IXCs).
2) Circuit-switched network that is the North American telephone system.
PUK
Q
QualDir
97
Interim Standard 41 (IS-41) message sent to the visited location register (VLR) in a visited
(serving) switch if the home switch or validation service detects a change in a roamer's validation
status from that which was previously sent. Call teardown is a QualDir Command Set.
Qualification Request (QualReq)
Interim Standard 41 (IS-41) message sent from a visited (serving) IS-41.A switch, such as , the
visited location register (VLR), requesting verification of the status of a roamer. A QualReq is
issued in response to a call attempt or an autonomous registration.
QualReq
Request (usually to a database) for information; in data communications, the process by which a
master station asks a slave station to identify itself and report its status.
query-and-response
Communications signaling that uses a database to provide features instead of simply supporting
call setup. One network element makes a query to another element, typically the service control
point (SCP), and the second element performs a database lookup and sends a response to the
original element.
Query ResponseSM Service (QRS)
Syniverse service that provides access to line information databases (LIDBs) in the United States
and Canada for billing validation of collect, third number, or third-party billed calls.
queue
Any system backlog or waiting list, usually processed on a first-in, first-out (FIFO) basis. For
example, if a computer receives more requests than it can process, it may put them in a queue and
then process them in the order in which they arrived.
Quick Answers
R
RA
Sound wave frequency from nine kilohertz (9 KHz), the lowest allocated wireless communications
frequency (it's within the range of human hearing), to thousands of gigahertz (GHz).
radio frequency (RF) fingerprinting
Technology that records radio signals emitted by wireless phones and uses those fingerprints to
distinguish individual phones and deny access to a cloner on a pre-call basis. RF fingerprinting is
used to prevent cloning fraud because a cloned phone does not have the same fingerprint as the
legal phone with the same electronic serial number (ESN).
Radio Frequency (RF) Signature
Third-party software application that intercepts the communication link between a cell site and
mobile phone.
98
receiving carrier/operator
Alarm that occurs when RF Signature events are received from a data collection system. (See also
RF Signature.)
RAID
Geographic area used by local exchange carriers (LECs) to set rate boundaries for billing and for
issuing telephone numbers.
rate plan
Established set of calling rates consisting of the amount charged for domestic and international
calls, peak hours, and off-peak hours, etc.
rating
Process of determining the appropriate rate for calls. Rate factors include the time of day when the
calls were made, applicable discounts, promotions, and holidays, etc.
rating/billing vendor
File stored in a Revision Control System (RCS) library containing text of the original file and a
list of changes that have been applied.
RCV
Records for calls made by subscribers who roam in their carrier/operators roaming
partnersmarkets. (See also outcollects.)
receiving carrier/operator
Carrier/operator designated to receive valid call records for a system identification (SID) or SID
combination (batch or pack); commonly referred to as the home carrier/operator.
99
receiving operator
Carrier/operator designated to receive Transferred Account Procedure (TAP) user files; commonly
referred to as the home public land mobile network (HPLMN).
recent change verification (RCV)
1) Individual line of a file. A record is comprised of related fields. (See also field, file, and
record type.) 2) All the information in a database regarding an individual person, thing, place, or
event. (See also database, and field.)
record-level edits
Editing process during which the system verifies that all records in a file meet standards. This
editing occurs at the detail level on every record in the file.
record type
Each record in a Transferred Account Procedure (TAP) file is of a specific type, indicated by both
a name and a number. Record types vary according to the version of TAP in use.
Redirection Request (RedReq)
Interim Standard 41 (IS-41) message sent from a serving mobile switching center (MSC) to a
home (originating) MSC, requesting an incoming call for a roamer be redirected to another
number due to a busy condition.
RedReq
Two elements configured precisely the same to perform an identical role, either on a continuous or
as-needed basis. Redundancy is expensive, but helps ensure reliability.
redundant array of inexpensive drives/disks (RAID)
Collection of numerous drives or disks arranged into an array that makes them appear like one
very large drive or disk; a set of physical disk drives viewed by the user as a single, logical entity.
RegCan
One of the telephone companies formerly owned by the Bell System. Although there were
originally seven RBOCs, that number is continually shrinking through mergers.
100
registration
Process by which a user first becomes known to a certification authority (CA) before the CA
issues a certificate for the user.
registration authority (RA)
For customer-branded certification authority (CA) service, a trusted agent who verifies each
individual certificate request and then sends approved requests for signature. An optional system
to which a CA delegates certain management functions.
Registration Cancellation (RegCan)
Interim Standard 41 (IS-41) message sent to a visited location register (VLR) or visited switch to
indicate a roamer is no longer in that service area.
registration cancellation invoke (REGCANC)
Interim Standard 41 (IS-41) message invoking the cancellation of the roamer which is sent from a
home location register (HLR) to the previous serving visited location register (VLR) and from
there to the mobile switching center (MSC). (All capitals indicates an invoke instead of a return
result.)
registration cancellation return result (regcanc)
Interim Standard 41 (IS-41) message that acknowledges the receipt of a REGCNAC which is sent
from the previous serving visited location register (VLR) to a home location register (HLR), and
from the previous serving mobile switching center (MSC) to the VLR. (All lower case indicates a
return result instead of an invoke.)
Registration Notification (RegNot)
Interim Standard 41 (IS-41) message sent from a visited switch or visited location register (VLR)
to indicate the roamer is registered (or re-registered).
registration notification invoke (REGNOT)
Interim Standard 41 (IS-41) message sent from a serving mobile switching center (MSC)
requesting information about a new roamer from the roamers home location register (HLR) The
message is sent from the MSC to the visited location register (VLR) and then to the HLR. (All
capital letters indicate an invoke instead of a return result.)
registration notification return result (regnot)
Interim Standard 41 (IS-41) message in which the home location register (HLR) supplies new
roamer information to the the serving mobile switching center (MSC) . The message is sent from
the HLR to the serving visited location register (VLR) and then to the MSC. (All lower case
letters indicate a return result instead of an invoke.)
RegNot
To physically remove a record, file, or composite file (available only in North American Interest
Groups Transferred Account Procedure (NAIG TAP) II) from processing. Rejected data is not
forwarded to a home public land mobile network (HPLMN) for payment.
rejects
Call records that fail a primary or secondary editing process and are returned to the serving
carrier/operators billing vendor. Same as returns.
remote access port hits
101
Interim Standard 41.A (IS-41.A) function that enables subscribers to change phone features from a
remote location. For example, a roamer may direct wireless calls to a voice mail system.
Remote Server Call (RSC)
Tandem software utility that submits requests to the challenge response intelligent peripheral
(CRIP) interface server operating on the service control point (SCP).
repository
Collection of distributed systems that stores certificates and certificate revocation lists (CRLs),
and serves as a means for distributing these certificates and CRLs to end entities.
request
Command given to a system to take an action, such as to add, change, or delete a record, or print
reports).
reset tokens
CloneDetector utility that resets system permissions to allow a different user ID to access
patterns, alarms, or group components when the current session is completed.
resource group
Logical collection of switch ports assigned to a given function. For example, a resource group
may be designated for inbound ports. Ports can be assigned to more than one resource group.
restoral
Data recovery task in which files are copied from backup storage. (See also backup.)
retail rates
Amount per day home subscribers are charged for roaming in other markets.
retrieve
Data recovery task in which data that exists solely on archival tape is retrieved to a server disk
drive.
return
Call records that fail a primary or secondary editing process and are returned to a serving
carrier/operators billing vendor. (See also rejects.)
Revision Control System (RCS)
Set of programs for managing files so that any version of a given file can be retrieved. Revisions
to a file are stored as a series of incremental changes (deltas) applied to the original version,
instead of as complete copies of all the versions. The system provides locking mechanisms so that
only a single user can apply changes to a given file at any one time.
revocation
Process by which a certification authority (CA) revokes an otherwise valid certificate. Revoked
certificates are posted to a publicly accessible certificate revocation list (CRL).
RF
102
roaming air
ringback
Feature that directs a phone to automatically dial back a caller who was blocked by a busy line
when the line is free. A technical flaw in the service enables the use of ringback to avoid paying
for unlimited calls from privately owned pay phones. This is quite common in the U.K.
roam
To use a wireless phone in a market other than the subscribers home market.
ROAM indicator
Indicator on a wireless phone that denotes the phone is outside of its home market and roaming
charges may be applied to calls.
roamer
1) Wireless customer placing one or more calls outside of a home service area, whether or not the
visited area is serviced by the customers home carrier/operator. 2) Call made by a customer of
another mobile system.
roamer access number (RAN)
Number that must be dialed before dialing the phone number of a roamer. Each city (or market)
has a unique RAN identifier.
roamer agreement
Data feed that contains a subscribers roaming event records. The records contain pre- or post-call
mobile identification number (MIN), electronic serial number (ESN), location, and time data but
do not show toll calls, call duration, or dialed digits.
roamer registration
Process that occurs when a subscriber, roaming in a market other than the home market, turns on
the phone. The serving mobile switching center (MSC) queries the subscribers home location
register (HLR) to identify the subscribers information.
roamer surcharge
Per-day charge a carrier/operator applies to a roamer for using a wireless phone in an area outside
of the roamers home market.
RoamerXchange Service
Systems/Link Corporations national wireless real-time roamer record exchange network that
includes roamer fraud control, network analysis, and customer service. RoamEx is a single data
collection network for both cellular and Personal Communication Services (PCS) usage.
roaming
Using a wireless phone to make and receive calls in places outside ones home service area.
roaming agreement
Legally binding document executed by two wireless carriers/operators to provide service to each
others roaming subscribers with provisions for rates, privileges, and cases of fraud. (See also
bilateral roaming agreement.)
roaming air
Amount of time a roamers wireless telephone is connected, for which charges can be levied.
103
roaming charges
Charges incurred by wireless subscribers while using wireless systems other than their own; for
example, roaming air charges or roamer long distance charges.
roaming leg
Leg of an incoming call from the home to the visited network, such as the gateway mobile
services switching center (GMSC) of the home network to the visited mobile switching center
(MSC) of the visited public land mobile network (VPLMN) - the roamer is charged for this
portion of the call.
roaming long distance
Call placed by a wireless subscriber to an area code and exchange (NPA-NXX) outside the local
calling area while using a wireless system that is not services by the subscribers home
carrier/operator.
roaming partner
Any wireless carrier/operator that has a roaming agreement with another carrier/operator.
roaming subscribers
Wireless subscriber placing one or more calls outside the home service area, whether or not the
visited area is serviced by the subscribers home carrier/operator.
Roaming surcharge
Wireless subscriber roaming in a market server that is not owned by the subscribers home market
service provider.
rollover
Certificate at the top of a certificate hierarchy. The root certificate, which is self-signing, is used to
sign all subordinate certification authority (CA) certificates. (See also policy certification
authority.)
router
Interface between two or more networks, including dissimilar networks, which is like a bridge, but
generally provides much more functionality. For example, a router might direct incoming and
outgoing Internet traffic between T1 lines and a firewall.
routing error
Error that results from primary edits. Indicates call record(s) with area codes and exchanges
(NPA-NXXs) that do not match the home system identification (SID) for the batch.
routing file
Database file that contains all valid area code and exchange (NPA-NXX) combinations for
wireless carriers/operators. It is used to forward verification and update transactions, registration
notifications, qualification requests, and feature requests to appropriate carriers/operators and
switches.
routing label
Three sub fields of the Signaling System 7 (SS7) signaling messages service information octet
(SIO) field that direct a message from its origin to its destination. The three sub fields are the
Signaling Link Selection (SLS), Origination Point Code (OPC), and Destination Point Code
(DPC).
104
secondary link
RSA
Popular method of representing knowledge in expert systems that analyze and present conclusions
based on multiple factors.
runtime rules
Rules logic that analyzes and modifies field data, marks call detail records (CDRs) to be dropped,
and derives new fields from other field values.
Rural Cellular Association Volume of Business (RCA VOB)
Syniverse discount applying to any service purchased by a member of the Rural Cellular
Association (RCA), who has committed to a 3-year contract. The discount varies with the usage
level and the type of service.
rural service area
Non-metropolitan area mapped by the Census Bureau and used by the Federal Communications
Commission (FCC) to award wireless licenses within rural areas; also known as rural service area.
S
SA
Edits performed by a home carrier/operators billing vendor after primary edits. The billing vendor
checks all call records for edits that were not performed by the authorized receipt point. For
example, the lack of a roaming agreement between the home and serve carrier/operator.
secondary link
Backup link for wireless communications that takes over handling data traffic in case the primary
link fails.
105
Secretariat
Formally known as the Memorandum of Understanding (MoU) Permanent Secretariat. The Global
System of Mobile Communications association that is responsible for maintaining and
administering standards, guidelines, etc.
Secure Sockets Layer (SSL)
Industry standard transport-level technology, SSL uses public key technology to ensure messaging
integrity, privacy, and authenticity. SSL is widely deployed on intranets and the Internet in the
form of SSL-capable servers and clients from leading vendors, such as Netscape and Microsoft.
The one-time session keys are generated with a protocol that uses certified initial keys. X.509
certificates with extensions identify participating World Wide Web browsers or servers and certify
their keys.
security manager (SM)
Administrator with Security access to the ACCESSibility application. SMs can modify user
access records and privilege sets.
SEND button
Button on a wireless phone that turns on the phones transmitter to send a dialed number to the
wireless system.
sending carrier/operator
Carrier/operator sending valid call records (messages) for a system identification (SID) or SID
combination (batch or pack); commonly referred to as the serve carrier/operator.
sending operator
Carrier/operator sending the call records; commonly referred to as the visited public land mobile
network (VPLMN).
sequence number
1) Unique number identifying a user file sent between a particular source and destination;
usually, the visited carrier/operator sending to the home carrier/operator.
2) Tracking number associated with a group of Cellular Intercarrier Billing Exchange Record
(CIBER) formatted call records forwarded from one serve system identification (SID) to a
particular home SID.
SERG
Transmission line protocol that encapsulates and transfers Internet Protocol (IP) data over
asynchronous serial lines.
serve
American National Standards Institute (ANSI) 41 call processor static database used to store
serve-related data.
serve carrier/operator
106
service application
Unique, legal contract that binds a subscriber to the standards, prices, and policies set by a
carrier/operator.
service area
Service definition that denies wireless service to roamers. (See also block denial and flexible SID
blocking.)
service bureau
System for which Syniverse retains ownership, operates the server computing environment, and
administers operational, administrative, and maintenance routines. If applicable, the wireless
carriers/operators own the workstations and printers.
service control point (SCP)
Computer system that connects to the Signaling System 7 (SS7) network; an SCP contains SS7
node software, application software used to effect a service, a database for record storage, and
system management software. SCPs are usually deployed as mated pairs.
service creation environment (SCE)
Architecture used by Syniverses Prepaid Wireless service. The SCE consists of a comprehensive
reusable set of processes, tools, and commonly used libraries for building telephony applications.
In the SCE, users graphically create the complete logic of a call flow to integrate with the switch,
the voice response unit (VRU), and an Oracle database. The SCE consists of the application
builder, core server processes, and commercial hardware and software.
Service Experts Rapporteurs Group (SERG)
Combination of the service code and the parameters that describe both the service type of and the
actions requested or taken during a call, such as invoking call forwarding or radio channel requests
for speech calls.
service independent building block (SIBB)
Service creation environment (SCE) component used by Syniverses Prepaid Wireless system.
Each SIBB has a particular function or group of functions to be executed on the server. The six
SIBB categories are: application, voice response unit (VRU), logic, switch, event, and
communication. SIBBs are programmed in the application builder.
service information octet (SIO)
Eight-bit field in Signaling System 7 (SS7) signaling messages that indicates the application using
SS7, the network in use (national or international), and various routing schemes.
service location register (SLR)
Intelligent network (IN) application that implements the logic to provide a call feature. For
example, the FraudChallenger SLP is the master controlling process for the system.
Service Management Gateway (SMG)
A software product that facilitates the process of number portability and number pooling.
107
Computer system that permits access to records contained a database; for example, a number
portability database. (See also Local Service Management System.)
Service Order Administration (SOA)
System that interfaces with the Number Portability Administration Center (NPAC) to submit and
retrieve ported number information. The NPAC manages its own SOA and a carrier communicates
with the NPAC SOA through its SOA, which is called a Local Service Order Activation (LSOA)
system.
Service Order Process (SOP)
Activity related to gathering the information required to validate applicants for service, verify
accuracy, establish their services and rates in order to bill them in a timely and accurate way
Service Provider (SP)
Signaling point in the Signaling System 7 (SS7) network that performs call processing. In wireless
networks, mobile switching centers (MSCs) are SSPs.
service type
A Transferred Account Data Inter-exchange Group (TADIG) code for a service class (teleservice,
supplementary service, or bearer service), which is billed in a call detail record (CDR).
serving carrier/operator
Carrier/operator that provides wireless service to a roamer. A roamer is served by the cell with the
strongest signal strength.
serving endpoint
Market a roamer is visiting and to which a validation status is reported. (See also visitor location
register.)
session
Time a user spends connected to a remote host system and the activity performed during that time.
A session runs from the time of logon to the time of logoff.
session key
Random number generated to serve as a key for a specific transaction or set of transactions.
settlement
Financial reconciliation among carriers/operators for services to one anothers roamers. (See also
industry net settlement.)
Settlement and Exchange Service
Results of the settlement and exchange process; the end product of Cellular Intercarrier Billing
Exchange Record (CIBER) data processed by ACCESS and other settlement and exchange
service providers. The results provide a comparison of the subscribers transactions that occurred
between roaming partners.
108
signal units
settlement period
Monthly accounting period for settlement and exchange service providers; currently running from
the 16th of one month through the 15th of the next. For ACCESS S&E Services, this period is
the first day of the month through the last day of the month.
settlement reports
Reports produced by ACCESS S&E Services describing various aspects of the settlement data.
severe errors
Call record errors that affect the ability to charge a subscriber. Roaming partners can agree
bilaterally to either reject these records, or retain them and report them as containing severe errors
on the appropriate ACCESS S&E Services reports.
severity
Variable digital number used to identify a specific mobile station (MS) during authentication;
composed of the mobile identification number and electronic serial number (MIN/ESN), A-key,
and random number generated by the authentication center (AC). During authentication, an MS
SSD must match that of the AC.
shell
Utility program that serves as a command line interpreter that enables a user to interact with a
UNIX operating system. User commands are passed by the shell to the kernel of the operating
system, which carries out the instructions. The results are then passed back by the shell and are
displayed on the users monitor.
Short Message Service (SMS)
Supplemental service allowing short (one-way) messages to be recorded and delivered over the
Global System for Mobile Communication (GSM) network.
Short Message Peer-to-Peer (SMPP)
A protocol for exchanging SMS messages between SMS peer entities such as short message
service providers.
shoulder surfing
Method thieves use to steal calling card numbers and personal identification numbers (PINs) from
legitimate users, by observing the dialing process; the visual equivalent of eavesdropping.
SIBB
Parcels used to transmit information over the Signaling System 7 (SS7) network; more commonly
referred to as messages.
109
signaling
Process of sending signals or signaling information; the transfer of information to control wireless
communication. Usually refers to signals that support subscriber calls (for example, call setup.)
Signaling Connection Control Part (SCCP)
Part of the Signaling System 7 (SS7) network that provides routing and management functions for
the transfer of messages other than call setup between signaling points. For example, specifying
whether a message is to travel a connectionless or connection-oriented path. Operates with the
Message Transfer Part (MTP) primary routing functions.
signaling information
Pertains to the operation and status of a telecommunication systems components. For example,
the dial tone on a phone is the signal indicating the status of the phone; the ring is a signal alerting
the user to an incoming call.
signaling information field (SIF)
Variable length field (2 to 272 octets) in Signaling System 7 (SS7) messages. Contains the
signaling information the message is carrying, as well as routing information in the routing label.
signaling link management
One of three functions performed by the Message Transfer Part (MTP) 3 level of the Signaling
System 7 (SS7) protocol. Manages the state of individual signaling link sets through link
activation and deactivation.
signaling link selection (SLS)
Four-bit sub-field of the service information octet (SIO) field in Signaling System 7 (SS7)
signaling messages. Determines which link to use in a link set to achieve load balancing. SLS is
part of the routing label.
signaling point
Device on a network. On the Signaling System 7 (SS7) network, a synonym for network element
or node. The three devices on an SS7 network are the signal transfer point (STP), the service
control point (SCP), and the switch (mobile switching center (MSC) on a wireless network.)
signaling point code (SPC)
Address of a Signaling System 7 (SS7) network element. Each element has a unique SPC.
signaling route management
One of three functions performed by the Message Transfer Part (MTP) 3 level of the Signaling
System 7 (SS7) protocol. Diverts traffic from one link to an alternate based on link failure or
signaling point congestion.
Signaling System 7 (SS7)
Signaling System 7 (SS7) distribution point that provides network administration and control, and
process routing instructions for SS7 messages. STPs are always deployed as mated pairs. (See also
mated pair.)
signing engine
Server application that runs on the online certification authority (CA) and signs certificate requests
with the appropriate certificate.
SIM
110
SMG
simple clone
Fraudulent mobile unit that uses the numeric identifiers (mobile identification digits and electronic
serial number (MID/ESN)) of another mobile unit.
Simple Network Management Protocol (SNMP)
Protocol that governs network management and monitors network devices. SNMP is not limited to
Transmission Control Protocol/Internet Protocol (TCP/IP) networks.
Single Number Service (SNS)
Syniverse service that transports SNS queries to designated third-party line information databases
to provide a nine-digit zip code in response to a directory number query.
single point of contact (SPOC)
Key benefit a consolidator provides to a corporate account in terms of time and money savings.
Rather than dealing with each service provider individually, the corporation contacts the
consolidator who handles the corporations wireless business.
SIO
Typically, an individual responsible to monitor application servers and set up and maintain local
user accesses.
site collector
Credit card device that can generate and store key pairs and certificates. Uses an embedded
integrated circuit to provide logic and intelligence processing and to store information. Holds
about 8 KB of information, enough to store 1600 words of text or a digital snapshot of a
fingerprint. A multipurpose smart card can serve as personal identification, a credit card, ATM
card, telephone credit card, medical information record, and cash for small transactions.
smart phone
Class of wireless phones; typically used to describe handsets with many features, and often a
keyboard. These phones are considered smart because they handle data as well as voice calls.
SmartAlert Real-Time Analysis System
Text and graphics alarm management service that provides real-time remote monitoring of
wireless switches and cell site equipment to alert carriers/operators of network problems.
SMG
111
SMR
Protocol used to send messages between a peer agent process and its subagents in Syniverses
Prepaid Wireless System.
snap back
When a ported number is disconnected (the customer no longer pays for the line), the number is
released (snapped back) to the original service provider. After appropriate aging, the original
service provider can reassign the number to a new customer.
SNMP
Method used by thieves to obtain information for fraudulent purposes; often involves posing as a
legitimate user or official of another organization to gain access to sensitive information.
socket
Logical port a program connects to, in order to automatically access communications protocols or
facilities. Sometimes used as a synonym for a port, a socket typically serves as an endpoint when
computers communicate with one another. For example, a File Transfer Protocol (FTP) program
may use sockets for its session, while a message handler uses another socket to obtain e-mail.
socket listener
Control program that opens Transmission Control Protocol (TCP) sockets and then waits for
incoming commands, reads the commands, and sends the commands to the corresponding
command processor.
soft dollar loss
Revenue a carrier/operator loses to fraudulent wireless charges incurred in its home market. This
type of fraud does not require a home entity to pay a serving entity; associated costs are absorbed
by the home carrier/operator.
software publisher certificate (SPC)
Certificate issued to a developer of executable code intended for Internet distribution. An SPC
allows code to be digitally signed before distribution and prevents undetected modification after it
is released. An SPC can be issued to individuals who want to sign code but are not affiliated with
a commercial software publisher or to a commercial publisher who is distributing code under the
companys name.
SOP
Ability to control the order in which information is viewed in each FraudX window; for example,
a user may choose to sort cases according to their fraud confidence level.
112
SSD
source
Sending a single message to a large number of recipients; spamming can seriously degrade
network and host performance.
span
Part of a high-speed digital system that connects central offices or terminal offices to one another.
SP
CIBERNET designation for the mobile identification number and electronic serial number
(MIN/ESN) assigned to a phone that has been stolen or equipment that has not been returned to a
carrier/operator by a user. A MIN may be entered as all zeros, because the ESN remains invalid
until the phone is retrieved. The industry negative file (INF) reason code is S.
special drawing rights (SDR)
Currency used to transfer charges in the exchange of Transferred Account Procedure (TAP) files
between public land mobile networks (PLMNs). It consists of several currencies combined into a
stable financial unit and is maintained by the International Monetary Fund (IMF). SDRs are also
used by other telecommunications companies for international inter-company accounting.
specialized mobile radio (SMR)
Dispatch radio and interconnect service for businesses. Covers frequencies in the 200 MHz, 800
MHz, and 900 MHz bands.
SPOC
Sprints e-mail service; used by Syniverse to distribute batch reports for ACCESS,
FraudManager, Customer Positive File, Visibility, and INLink. Before the service was
acquired by Sprint, it was known as Telemail.
SQL
Set of rules governing the structure and content of messages sent over a Signaling System 7 (SS7)
network.
SSD
113
SSL
Tandem Signaling System 7 (SS7) external signaling terminal for NSCP-2000. The hardware
component that provides the physical interface to the SS7 network.
STIN
ST-2000 signaling terminal input process that delivers message service units (MSUs) from the
Signaling System 7 (SS7) network to call processing applications (Message Transfer Service
(MTS) address is12.10).
standard age
Amount of time by which call records are to be transmitted from a visited public land mobile
network (VPLMN) to the home public land mobile network (HPLMN) after a call is completed.
The Transferred Account Data Inter-exchange Group (TADIG) standard is 36 hours, but roaming
partners can agree to a different value.
Standard Generalized Markup Language (SGML)
International standard (IS) for coding Internet text. Hypertext Markup Language (HTML) has
grown out of SGML.
standby time
Amount of time a subscriber can leave a fully-charged handset turned on before the batteries
discharge.
S.T.A.R.S. STREAMLINER
Succession of state changes that a switch port or voice response unit (VRU) channel goes through
until it reaches a terminated state.
status
Validity (positive or negative) of a given mobile identification number and electronic serial
number (MIN/ESN) at a specific point in time.
stolen phone fraud
Unauthorized use of a wireless phone that is taken from a legitimate customer before the customer
can report the theft.
STOUT
Service Control Point (SCP) signaling terminal output process that delivers message service units
(MSUs) from call processing applications to the Signaling System 7 (SS7) network (Message
Transfer Service (MTS) address = 2.11).
STP
114
suspend
STREAMLINER
Syniverse service that assists wireless carriers/operators in offering their corporate accounts a
single point of contact (SPOC) for national service needs. It consolidates information from
multiple carrier/operators billing systems into one integrated package of reports, invoices, and
data files for those customers with national accounts.
Structured Query Language (SQL)
Ddatabase language invented by IBM for creating, searching, and maintaining computer
databases. Sometimes pronounced sequel.
SUBa
Certification authority (CA) generated from a self-signing root certificate or another subordinate
CA. The subordinate CA can then be used to sign other CA and end-entity certificates.
subscriber
Problems and conditions that influence a subscribers likelihood to churn and place the mobile
unit at risk. The subscriber factor score indicates the level of churn danger.
Subscriber Identification Module (SIM)
Global System for Mobile Communication (GSM) card that contains information about a
subscriber, including the subscriber's International Mobile Subscriber Identity (IMSI) and other
billing information. The subscriber can insert the SIM card into any GSM mobile equipment and
use that equipment.
subscriber profile transfer
Interim Standard 41 (IS-41) Rev. A capability that enables wireless phone users to continue using
all home service features while roaming.
subscription fraud
Activation of a wireless telephone using an invalid or stolen name or address, with no intention of
paying for the service. The intent to defraud differentiates this activity from bad debt, in which a
subscriber fails to pay charges for services rendered. (See also non-payment.)
supplementary service (SS)
Service that modifies or supplements a basic telecommunication service and, therefore, cannot be
offered to a customer as a stand-alone service. Examples of supplementary services provided by
Global System for Mobile Communication (GSM) technologies include call forwarding, call
barring, caller identification, call waiting, and advice of charge.
supplementary service event
Supplementary service (SS) action not related to a call. (See also action type code.)
support network
High-speed data network that moves large amounts of information necessary to monitor and
control the North American Cellular Network (NACN).
suspend
Interim Standard 41.A (IS-41.A) switch option that enables carriers/operators to impose calling
restrictions (deny service for a non-paying customer) within the subscriber's calling profile.
115
suspicion factor
Value used by FraudX to relate a value of fraud suspicion to cities, markets, and regions in order
to determine fraudulent activity.
suspicious dialed digits
Fraudulent dialed digits that are entered into a FraudX Suspicious Dialed Digits table to generate
an alarm when the dialed digits appear in the system.
SWID
Electronic device that enables communication between a wireless phone and landline switches; the
equipment that represents either the origination or the destination for a wireless message
transferred over a network. (See also mobile switching center.)
switch deny file
Switch database file that contains the mobile identification digits and electronic serial numbers
(MID/ESNs) of all valid home subscribers.
switch identification (SWID)
Eight-digit code that identifies a physical switch in a market. The first five digits identify the
system identification (SID) and the last three digits identify the switch number (SWNO) for that
SID. (See also mobile switching center identification.)
switch number (SWNO)
Three-digit number that identifies the switch associated with a particular system identification
(SID). (See also mobile switching center identification.)
SWNO
Pronounced smile; lets World Wide Web site creators send multiple movies, images, and sounds
separately but coordinate their timing. Each media object is accessed with a unique Uniform
Resource Locator (URL), which enables presentations to be made of objects arriving from more
than one place and objects to be reused in multiple presentations. SMIL statements can be entered
with a text editor similar to those used to create Hypertext Markup Language (HTML) pages.
Syniverse Database Synchronization (TDS)
Syniverses record-based, real-time transaction posting service with store and forward capability
during a mated-pair outage.
Syniverse DatanetSM
Service that manages roaming data collection and routing among wireless operators; it enables
operators to send roaming partners' call detail records (CDRs) to their respective home markets
and to receive their subscribers' roaming in other markets in near real time. This provides
immediate access to information needed to combat roaming fraud. Syniverse DataNet provides the
necessary translation tables to accomplish this routing of CDRs.
Syniverse Technologies, Inc.
116
TCAP
Five-digit code assigned to a market for each license issued to a wireless carrier/operator. SID
codes are a global resource, allocated in blocks to countries for use and assignment as needed. In
the United States, SID codes are assigned by the FCC. The ranges assigned to each country are
listed in TIA TSB-29 and at www.ifast.org. Markets or service areas may be further segmented
into a Billing Identifier (BID).
T
T1 line
Digital transmission line with a capacity of 1.544Mbps used to accommodate high volume traffic,
such as that seen on the Internet.
tables
Databases that contain all necessary information required to set up accounts for reports and
invoices.
TACL
Dedicated circuit from a customers premises to the nearest point of presence for the Syniverse
frame relay network. This provides a private, dedicated link from the customer to Syniverse
through Syniverses private network.
Tandem Advanced Command Language (TACL)
Hardware platform selected by Syniverse for advanced, real-time processing because of its fault
tolerance and multiple transaction capabilities.
TAP
User file, as specified by the Transferred Account Data Inter-exchange Group (TADIG),
containing call information to be exchanged between two carriers/operators.
TAP Version 1
First version of the Transferred Account Procedure (TAP) file format, as specified by the
Transferred Account Data Inter-exchange Group document TD.01.
TAP Version 2
Second version of the Transferred Account Procedure (TAP) file format, as specified by the
Transferred Account Data Inter-exchange Group (TADIG) document TD.17. Version 2
substantially extends Version 1s functionality and complexity. North American carriers/operators
use a variation of TAP Version 2. (See also NAIG TAP II.)
tax liability
117
TCL
The Transferred Account Data Inter-exchange Group (TADIG) standard defining Transferred
Account Procedure (TAP) Version 1. The documents title is Data Record Format. (See
Transferred Account Data Inter-exchange Group.)
TD.17
The Transferred Account Data Inter-exchange Group (TADIG) standard defining Transferred
Account Procedure (TAP) Version 2. The documents title is Data Record Format: Version 2.
(See Transferred Account Data Inter-exchange Group.)
TD.22
The Transferred Account Data Inter-exchange Group (TADIG) standard defining how conversions
between Transferred Account Procedure (TAP) 1 and TAP 2 are to be handled. The documents
title is TAP File Conversions Between Data Record Format Versions 1 and 2. (See Transferred
Account Data Inter-exchange Group.)
TD.24
The Transferred Account Data Inter-exchange Group (TADIG) standard defining how file-level
verification and record-level editing of Transferred Account Procedure (TAP) 1 and TAP 2 files
are to be handled. The documents title is Error Descriptions and Error Handling for TAP Files,
Data Record Format Version 1 and Version 2. (File-level verification and record-level editing of
NAIG TAP II files are defined in TD.27.) (See Transferred Account Data Inter-exchange Group.)
TD.27
The Transferred Account Data Inter-exchange Group (TADIG) standard defining the North
American Interest Groups Transferred Account Procedure (NAIG TAP) II billing record format,
as well as the file-level verification and record-level editing that are to be performed on NAIG
TAP II data. The documents title is NAIG TAP II Call Detail Record Specification Version 1.
(See Transferred Account Data Inter-exchange Group.)
TD.31
The Transferred Account Data Inter-exchange Group (TADIG) standard defining the cancelled
North American Global System for Mobile Communication (GSM) Rejects and Returns Process
for NA Transferred Account Procedure (TAP) 2. (See Transferred Account Data Inter-exchange
Group.)
TD.32
The Transferred Account Data Inter-exchange Group (TADIG) standard defining the Rejects and
Returns Process for Transferred Account Procedure (TAP) 3, onward. (See Transferred Account
Data Inter-exchange Group.)
TD.37
The Transferred Account Data Inter-exchange Group (TADIG) standard defining validation rules
(edits) for Transferred Account Procedure (TAP) 1, TAP2 and TAP2+. (See Transferred Account
Data Inter-exchange Group.)
118
TD.40
The Transferred Account Data Inter-exchange Group (TADIG) standard defining call scenarios
for Transferred Account Procedure (TAP) 2+. (See Transferred Account Data Inter-exchange
Group.)
TD.57
The Transferred Account Data Inter-exchange Group (TADIG) standard defining the Transferred
Account Procedure (TAP) 3. (See Transferred Account Data Inter-exchange Group.)
TD.60
The Transferred Account Data Inter-exchange Group (TADIG) standard defining call scenarios
for TAP3. (See Transferred Account Data Inter-exchange Group.)
TDMA
The Syniverse Database Synchronization (TDS) Collector repackages individual records received
from a Receive Queue into destination specific buffers. If a buffer is full, the data record is written
to a local safe store file. The TDS Collector can use multiple disk drives for safe store files.
TDS Monitor
A node specific monitor process that oversees both functional sides of a service on a node (service
control point (SCP) 1 or SCP2). A given node can be both a source and a destination for data
synchronization. The Syniverse Database Synchronization (TDS) Monitor operates as a nonstop
pair of processes and is responsible for coordination of synchronization data transfer and posting
activities.
TDS Poster
Each Syniverse Database Synchronization (TDS) Poster opens the TDS Monitor to request an
instruction. It is responsible for processing a successfully transferred safe store file by decoding
the contents and applying the data records to the appropriate files. It is capable of performing add,
update, and delete operations on any defined Enscribe file.
TDS Receiver
Syniverse Database Synchronization (TDS) Receiver uses the File Transfer Protocol (FTP)
application programmatic interface (API) to transfer safe store files from the source node to the
destination node. The TDS Receiver processes operate under the direct control of the TDS
Monitor process.
TDS Transfer Control File
Used only to pull safe store files and post their contents to destination data files. A Syniverse
Database Synchronization (TDS) File Transfer Protocol (FTP) Receiver adds records into the TDS
Transfer Control file when it processes a file list instruction from the TDS Monitor.
119
Typically an informal group of product or service users that band together, often for support
and/or suggest enhancements.
Telecommunications Act of 1996
(See SprintMail.)
Telephone Number (TN)
A file, generated by a carrier/operator, that contains the mobile identification digits (MIDs) and
electronic serial numbers (ESNs) of all its home wireless phone users.
telephone specific charges
Charges associated with a particular telephone number. An account number may have multiple
telephone specific charges.
Telephone User Part (TUP)
Precursor to Integrated Services User Part (ISUP) used to control telephone calls for national and
international connections. ISUP provides all the functions of TUP plus support for data, advanced
Integrated Services Digital Network (ISDN), and Intelligent Network (IN) services.
teleservice
Global System for Mobile Communication (GSM) service category that includes telephony,
emergency calls, telefax, and short message services (SMS).
teleservice code
Two-character code that uniquely defines a group of related teleservices (all speech services, all
fax services, etc.).
Telnet
Terminal-remote host protocol that supports connection over the Internet, enabling users to sign
on to a computer in another city, state, or country and use it as if it were a terminal attached to
another computer through a hard-wire connection.
Telocator Alphanumeric Paging (TAP)
Seven-bit messaging protocol that allows someone at a computer to send a message to a pager.
Also provides an error-detection link from the sender to the paging service provider to report
invalid data and bad personal identification numbers (PINs). (See also Telocator Data Protocol.)
120
threshold alarm
Eight-bit protocol for sending messages and binary files ( images, spreadsheets, etc.) to pagers.
Gradually replacing the older, more limited, messaging protocol: Telocator Alphanumeric Paging
(TAP). (See also Telocator Alphanumeric Paging.)
temporary directory number (TDN)
Ten-digit numeric field for a temporary phone number - area code-exchange-line number (NPANXX-line) - assigned to a roamer by the serving carrier/operator.
temporary local directory number (TLDN)
Ten-digit numeric field for a temporary phone number - area code-exchange-line number (NPANXX-line) - assigned to a roamer customer by the serving carrier/operator.
temporary mobile station identifier (TMSI)
Mobile station identifier (MSID) sent over the air interface that is assigned dynamically by a
network to a mobile station (MS). The TMSI is most commonly used by Global System for
Mobile Communication (GSM) wireless systems for fraud protection, but is also available in DAMPS and code division multiple acces (CDMA) systems. (See also IMSI.)
terminal
Keyboard-driven device connected to a system that is used to enter, update, retrieve, and display
information. Generally, a terminal has limited or no processing capacity; sometimes called a
dumb terminal. (See also workstation.)
Terminating Point Master (TPM)
Computer file generated by AT&T or Bellcore that contains all terminating phone numbers for the
United States and worldwide. This file is typically distributed on magnetic tape.
Terminating Point Master file
File that contains the geographic vertical and horizontal coordinates of the location identified by
the numbering plan area (NPA) and carrier code or exchange (NXX); also contains the name,
route, and local access transport area (LATA).
Termination Class of Service (TCOS)
Known in Interim Standard 41 (IS-41) as the Termination Restriction code. Indicates if calls to the
subscribers number are to be restricted.
TFA
1) Numeric value or percentage which, when exceeded, causes an alarm. 2) Established limit for
wireless use based on group and subscriber profiles. The profiles define valid subscriber usage
levels for the number of attempted calls, both home and roaming, and the number of acceptable
minutes of air time, roamer air time, toll calls, international calls, zero plus dialing, and time-ofday usage.
threshold alarm
Alarm generated when a call record for a mobile identification number and electronic serial
number (MIN/ESN) indicates that the parameters for acceptable wireless usage were exceeded.
121
throughput
In call processing, the actual amount of useful and non-redundant information that is transmitted
or processed. Throughput is the end result of a data call.
thumbprint
Hash function calculated for an item to generate or verify the signature for certification. (See also
hash function.)
TIA
In voice verification, the number of seconds between intervals when alarm conditions can be
checked. Each monitor can be configured to regulate its checking by ignoring a number of
intervals or ticks.
Time Division Multiple Access (TDMA)
Method of digital wireless communications transmission that allows large numbers of users to
access (in sequence) a single radio frequency channel without interference by allocating unique
time slots to each user in each channel. (See also digital modulation.)
time offset
Difference in time between a given time zone and the Universal Coordinated Time (UTC).
time zone
Geographic area; a range of longitudinal lines in which the same time is used. A time zone appears
on many Syniverse reports as a reference so users can coordinate events that occurred in different
time zones. Times and time zones on Syniverse reports refer to local time at the serving switch,
unless otherwise noted.
timeout
1) A record of the time of a transaction; when a validation request was received or when a
validation response was given.
2) Date and time code and, in Transferred Account Procedure (TAP) 2 and North American
Interest Groups (NAIG) TAP II, a Universal Coordinated Time (UCT) time offset on a file or
record.
TLDN
122
transceiver
toll charge
Charge for long distance service that appears in a roamer call record and on the subscribers bill.
toll rate period
Toll rates are generally determined by time of day and day of week. Typical toll rate periods are
day, evening, and night.
Tool Command Language (TCL)
Specifications agreed upon by two or more companies doing business together, which define the
forms of the data that will be exchanged using Electronic Data Interchange (EDI).
Transaction Capabilities Application Part (TCAP)
Upper layer protocol used to transfer messages over a Signaling System 7 (SS7) network between
two applications. TCAP typically contains Interim Standard 41 (IS-41 or ANSI 41) messaging,
and uses underlying SS7 protocols such as Message Transfer Part (MTP) routing or Global Title
Translation (GTT) to transfer the SS7 messages between two SS7 network nodes.
transaction data repository (TDR)
Centralized data storage facility that supervises the sharing of multiple transactions; requests
submitted by users are processed by the repository in real time (or near real time). Encrypt-AKey authentication services use a dedicated TDR to store all data related to call processing
activity, including transaction logs, table maintenance activity logs, activity monitoring logs, and
network element statistics tables.
TransAction Manager System (TMan)
Syniverse system that provides automatic, real-time collection; reformatting; and routing of call
detail records (CDRs) directly from carrier/operator switches to fraud detection systems,
clearinghouses, and other advanced data exchange applications.
transaction router process (TRP)
Set of transaction types used in Electronic Data Interchange (EDI) among trading partners. Each
transaction set contains only one type of information in a standard format agreed upon by the
trading partners. For A-Key exchange, the specified transaction sets are 856, 869, and 870.
transceiver
Transmitter and receiver. A radio device, such as a wireless phone, which transmits and receives
data or voice.
123
Timestamp used to select calls for transfer in a file. Call records previous to a cut-off timestamp
are included in the transfer.
Transferred Account Data Inter-exchange Group (TADIG)
Global System for Mobile Communication (GSM) industry standard format for the exchange of
billing information among public land mobile networks (PLMNs).
translated record
TransAction Manager application that processes call detail records (CDRs) by translating them
from one format to another, with optional filtering of certain records by predefined rules.
Transmission Control Protocol/Internet Protocol (TCP/IP)
Protocol that enables Internet communication among computers with diverse architectures and
operating systems; generally recognized as the industry standard for PC and Internet connections.
The TCP layer of the program assembles messages or files into smaller packets that are
transmitted and then received by a TCP layer that resolves the packets into the original messages
or files. The IP layer handles the address part of each packet so it gets to the right destination.
Each gateway computer on the network checks the IP address to see where to forward a message.
transparency indicator
Indicator that reveals whether a service was used in transparent or non-transparent mode.
trending
Telephone that operates on three frequencies, typically the 1900 MHz, 800 MHz digital, and 800
MHz analog cellular bands. (See also triple band.)
TRP
124
TWG
trunk-based routing
Routing calls to an outbound trunk group based on the inbound trunk group. This feature increases
call routing flexibility, particularly in wireless applications. For instance, Syniverses Prepaid
Wireless system users can configure trunk routing so that an outgoing cellular call from a wireless
subscriber is routed back through the same mobile switching center (MSC) the subscribers call
came in on. Or, if a wireless subscriber makes a call to public telephone (landline), the outgoing
call is routed through the public switch telephone network (PSTN).
trust chain
Validation architecture of a digital certificate. Each certificate is linked to the signature certificate
of the certificate-issuing entity. Certificates are validated by following the trust hierarchy to the
root certification authority (CA). The path through which the certificates are validated is called the
certificate chain.
trusted environment
Messaging environment in which access, security policies, and policy enforcement are controlled
by a trusted entity.
trustee
Person responsible for making and communicating judgments and decisions on behalf of an
organization with regard to use, identification, classification, and protection of a specific
information asset.
TSI
Systematic altering of a mobile unit's electronic serial number (ESN), mobile identification
number (MIN), or both, to obtain fraudulent wireless service, usually indicated by a series of call
attempts using sequential numbers within a short timeframe.
tumbling clone
Mobile unit for which the mobile identification number (MIN) and the electronic serial number
(ESN) are repeatedly altered to duplicate (clone) a valid mobile units numbers for the purpose of
gaining fraudulent wireless network access.
TUP
Processes that specialize in the detection of certain kinds of fraud. The types of turbo processes,
so-called because they run continuously and simultaneously, are: CORE (collision and velocity
alarms); Threshold and Credit (threshold and credit alarms); New Subscriber (unknown subscriber
alarms); and Switch (glare and radio frequency (RF) signal alarms generated by a switch).
turnkey system
System or product that is ready for use (after it is installed) requiring no additional hardware or
software to operate.
TWG
125
U
ULS
Reactivation of a previously negative file entry to the denial status which existed before a
reinstatement occurred.
unified messaging
Software technology that enables carriers/operators and Internet service providers (ISPs) to
manage customer e-mail, voice, and fax messages from any phone, PC, or information device.
Uniform Resource Locator (URL)
Address of a resource on the World Wide Web. All public Web sites have URLs; for example,
http://www.syniverse.com. The part before the colon specifies the access method. The part after
the colon is interpreted specific to the access method (two slashes indicate a machine name). The
part after the second period indicates the type of organization that owns the computer; for
example, com indicates a commercial entity, gov indicates a government entity, and edu
indicates an educational institution.
unique challenge
Authentication challenge over the voice channel initiated by a mobile switching center (MSC) or
authentication center (AC) for initial registration, call origination, or call termination purposes.
unique roamer
Term used in ACCESS S&E Services to describe a roamer who obtained service in another
operating territory during the settlement period. A unique roamer is counted only once, no matter
how often or how many days the service was used. (See also daily roamer.)
United States Telecom Association (USTA)
Organization that promotes general welfare of the telephone industry, collects and disseminates
industry information, and provides a forum for the discussion and resolution of issues of mutual
concern.
Universal Coordinated Time (UTC)
International standard (IS) starting point for time of day. All time zones are defined relative to the
zone that includes Greenwich, England. UTC was formerly, and is still widely, called Greenwich
Mean Time (GMT). UTC is the mean solar time along the Earth's prime meridian (0 longitude).
There are 179 meridians East and 179 meridians West of the prime. The 180th meridian is also
called the International Date Line. The prime meridian is arbitrarily based on the meridian that
runs through the Greenwich Observatory outside of London, where the present system originated.
Universal Licensing System (ULS)
126
user file
Worldwide industry group that supports Interim Standard 136 (IS-136) time division multiple
access (TDMA) and IS-41 wireless intelligent network (WIN) technology.
UNIX
Powerful multitasking operating system developed at Bell Laboratories often used to run complex
data processing and telephone systems. UNIX offers the ability to move programs from one kind
of computer to another with little or no modification.
unnamed areas
Area in a configuration file that contains global values. Every configuration file contains one
unnamed area. The contents of the unnamed area apply to every application instance, or script
type, and can be overridden by values defined in named areas. Compiled application configuration
files support one primary unnamed area and an unlimited number of secondary unnamed areas
within named areas. Secondary unnamed areas are used to override global values established in
the primary unnamed area.
unreinstatement
Process of reactivating an entry in the industry negative file (INF) from a status of Reinstate to its
former status of Denial.
unrestoral
Process of returning an entry in the industry negative file (INF) from a status of Reinstate to its
former status of Denial.
untrusted environment
Messaging environment in which access, security policies, and policy enforcement are not
controlled by a trusted entity.
unvalidated phone
Wireless telephone that does not have a valid service contract. Also referred to as an unregistered
phone.
uplink
Portion of a telecommunications path from the ground to the satellite. Also referred to as the
forward link. (See also, downlink.)
URL
Means by which a user is defined for a server or application. May include the users name,
description, password, access options, and associated privileges.
user file
Data file consisting of a number of call records exchanged between a given source and destination,
usually a visited and a home public land mobile network (HPLMN) carrier/operator. Commonly
called Transferred Account Procedure (TAP) file.
127
user ID
Unique combination of alphanumeric characters that identify a user to a computer system. The
user ID is verified by a security subsystem before access is allowed.
user profile
Function in an online service (for example, Visibility) that allows an administrator to activate
and de-activate users, set user privileges (determine what reports and functions they can use), lock
or unlock user accounts, and set or reset user passwords.
UTC
Word or words spoken by a wireless telephone user, in response to an interactive voice response
(IVR) prompt, asking the caller to speak a password. (See also voiceprint.)
UVS
Third-generation (3G) Time Division Multiple Access (TDMA) based wireless standard proposal
technology; developed by the Universal Wireless Communications Consortium(UWCC), it is one
of three standards proposals submitted to the International Telecommunication Union (ITU) by the
United States.
UWCC
V
V&H Master file
File that contains the geographic vertical and horizontal coordinates of the location identified by
the numbering planning area (NPA) and the central office code or exchange (NXX); also contains
the name, route, and local access transport area (LATA).
valid
Call records processed by ACCESS (or other settlement and exchange service providers) that
meet Cellular Intercarrier Billing Exchange Record (CIBER) standards.
valid values
Process of verifying roamer status (positive or negative) to determine whether service will be
allowed.
value added tax (VAT)
Tax that may be applied to charges in a Transferred Account Procedure (TAP) record. (In North
America, VAT is not used; instead, calls are subject to a variety of taxes that vary from location to
location, such as such as federal, state, and municipal taxes.)
variable-length field
128
VAS code
Code indicating a specific type of value added service (VAS); for example, voice mail services,
financial information, travel information, etc.
VAT
Occurs when the same mobile identification number (MIN) and electronic serial number (ESN)
are used in two locations that are too far apart for the same user to travel between, given the time
interval between uses. The apparent change in location occurs at faster (higher velocity) than is
reasonable to expect; this indicates potential cloning fraud.
verification
In Telecommunications Industry Association (TIA )and EIA-41, the process in which a wireless
switch determines if a mobile identification number (MIN) and electronic serial number (ESN) is
being used by the authorized user. This can be done by matching a caller's voice with a previously
recorded voiceprint, by the use of personal identification numbers (PINs), or by radio frequency
finger printing.
Verizon Wireless
One of North Americas largest providers of Advanced Mobile Phone System (AMPS) and code
division multiple access (CDMA) cellular service.
Versatile Signaling Point (VSP)
MicroLegend product name that has no industry-wide meaning. Whenever possible, use
Syniverse's term, International Signaling Gateway (ISG), which includes both the VSP and some
Tandem software. VSP functions include protocol conversion, message routing, and Signaling
System 7 (SS7) and signaling transfer point (STP) functionality.
VHS
Structure for presenting information. The chosen view determines how reports appear when they
are generated (the types of data included, how data is organized, and the sequencing of columns).
Virtual Home Term System (VHS)
Tandem utility that acts as a virtual home terminal to receive applications, log messages, and
enable an operator to act upon the messages.
virtual switch
Collection of wireless switches or other equipment that function as a single switch within a
network or system. Because the collective has a single network address, the network treats it as a
single switch. Also called a logical switch. (See also physical switch, switch, and MSC.)
VisCP
Visibility call processor. A call processing application written in TAL, constructed using the
Syniverse Application Programming Interface (TSIAPL).
Visibility event database
Database that stores call attempts or registrations for activated area code and exchange (NPANXX) line ranges in a FraudManager market (pre-call validation) and every positive or negative
validation in an EDS market (either pre-call or post-call).
129
Visibility Services
Syniverse product that offers a single online resource through which carriers/operators can have
real-time access to wireless roaming activity in their markets and in markets where their
subscribers roam.
visited public land mobile network (VPLMN)
Carrier/operator that provides wireless service to a roamer. (See also home PLMN.)
visitor location register (VLR)
Switch database that contains information about the location and validation status of another
carrier/operators subscribers who are roaming in the visited providers home market. VLRs are
used in markets that have Interim Standard 41.A (IS-41.A) technology. A VLR may or may not be
located in and indistinguishable from a mobile switching center (MSC), and may serve more than
one MSC.
VLR
Device used to convert speech into digital signals. (See also digital modulation.)
voice circuits
Voice lines dedicated to a customers conversation for the duration of the call.
Voice Information Data Base (VIDB)
Advanced Intelligent Network (AIN) entity that contains information about voiceprints, which can
be used to compare the voiceprint of a caller with a stored reference for verification purposes.
voice mail hit
Illegal access of confidential information through detailed messages left on a voice mail system.
When voice mail messages are retrieved with portable phones, an eavesdropper can hear password
tones along with the private messages; Thieves can use the tones to intercept voice mail messages.
voice quality data
Data, such as faxes, that can be transmitted over normal voice lines; voice lines do not have the
capacity to handle full-motion video data.
voice response unit (VRU)
Device that manages the voice prompts a caller hears when dialing into the system; Comparable to
an interactive voice response (IVR).
voice verification
Process of verifying the identity of a wireless telephone user, using a spoken password, for the
purpose of providing or denying access to wireless services.
voiceprint
Digitized recording of the acoustic makeup a speakers voice, used to determine if a subsequent
caller is authorized to use the wireless phone from which a call is placed.
volatile files
Files (or databases) that contain real-time subscriber information, such as General Location
Register (GLR) and Service Location Register (SLR) for FraudManager, and MSInfo and
NETEVENT for the American National Standards Institute (ANSI) 41 call processor.
VOLSER
130
WAP Forum
Tape and volume serial numbers on a magnetic tape or cartridge used in Transferred Account
Procedure (TAP). The volume serial number consists of a two-character country code, a single
character carrier/operator code and a three-digit serial number. Often referred to as the VOLSER.
volume threshold
Level established by a user to report the total number of events, rather than roamers; for filtering
purposes on Visibility reports.
vouchers
Prepaid units (or dollars) of wireless airtime sold for use with wireless phones. A voucher can
only be used to add value to a mobile identification number (MIN) account through balance
transfers.
VPLMN
Recorded messages that callers hear when calling into an interactive voice response (IVR), which
prompts the caller to verify a command.
VRU
Percentage of churn probability within a specific time period; calculated by the hypercube. The
hypercube base period (usually three months) sets this time duration.
W
W-CDMA
Industry group dedicated to enabling telephony and information services on wireless devices, such
as handsets, pagers, and personal digital assistants (PADs), on all wireless networks. (See also
wireless application protocol.)
131
war dialing
Type of fraud associated with PBX fraud; a computer is set up to continually try to dial into a
PBX system to gain access to a voice mail box and to make outside phone calls.
warning errors
Errors in call records that do not affect the ability to charge a subscriber, but may cause confusion.
Roaming partners can agree bilaterally to either reject these records or retain them and report them
as containing warning errors on the appropriate ACCESS S&E Services reports.
WCS
Program running on a computer connected to the Internet, which processes Hypertext Transfer
Protocol (HTTP) requests for documents from client World Wide Web browsers.
Web site
Internet server upon which World Wide Web pages are stored.
What If
Syniverse service that provides carriers/operators with the network facilities to connect switches
across Local Access Transport Areas (LATAs) or state boundaries.
wholesale rates
Amount per day a carrier/operator charges a roaming partner to provide service to its subscribers
in its markets.
wide area network (WAN)
Network of computers that is typically privately-owned and covers a wide geographical area.
wideband code division multiple access (W-CDMA)
Character that represents any other character when searching or retrieving information For
example, to search for any report starting with CHARD, type in CHARD?. The ? is the wildcard
character.
WIN
Wireless 911. A call processor application to provide 911 services in a wireless environment,
provided by SignalSoft.
Win32s
Operating system extension that allows Win32-based applications to run on top of Windows or
Windows for Workgroups version 3.1x.
Winsock
132
wireless
Radio-based systems that transmit telephone and data signals through the air without a physical
connection, such as a metal wire or fiber optic cable. These systems include wireless telephony,
personal communications services (PCS), cellular digital packet data (CDPD), specialized mobile
radios, and satellites.
wireless application protocol (WAP)
Set of communication protocols that standardize the way wireless devices can be used for Internet
access, including e-mail, World Wide Web pages, newsgroups, and chat groups. WAP works on
top of standard data link protocols, such as Global System for Mobile Communication (GSM),
code division multiple access (CDMA), and Time Division Multiple Access (TDMA), and
provides a complete set of network communication programs comparable to and supportive of the
Internet set of protocols. In the past, different manufacturers used different Internet access
technologies. WAP will enable devices and service systems that use it to interoperate.
WAP layers include: Wireless Application Environment (WAE), Wireless Session Layer (WSL),
Wireless Transport Layer Security (WTLS), and Wireless Transport Layer (WTP).
wireless communications services (WCS)
Frequencies in the 2.3 GHz band designated for general fixed wireless use.
wireless intelligent network (WIN)
Radio frequency-based service that provides access to Internet e-mail or the World Wide Web.
wireless local loop (WLL)
Alternative means of providing telephone connectivity (voice, data, or both) to a fixed location,
such as a home or office.
wireless markup language (WML)
Formerly handheld device markup language (HDML), a language that allows text portions of
World Wide Web pages to be viewed on wireless handsets and personal digital assistants (PDAs).
WML is part of the Wireless Application Protocol (WAP) being proposed by several vendors to
standards bodies. WML is an open language offered royalty-free.
wireless prepaid
Permits wireless subscribers to charge telephone calls against a prepaid account instead of
receiving a monthly bill for provided services. The subscriber account contains a designated
amount of calling time, measured in dollars or units. Each time the subscriber uses the account to
make a call, the account is charged in real time. In the openMEDIA Wireless Prepaid System,
subscribers can recharge the account through an interactive voice response (IVR) interface using
either a credit card or a voucher purchased from a retailer.
wireless number portability (WNP)
Subset of local number portability (LNP) that allows a subscriber to change his or her
carrier/operator while retaining an existing dialable phone number. This entails having a mobile
phone with two numbers: a dialable number retained by the subscriber, and a different number
used as a mobile identification number (MIN) or International Mobile Subscriber Identity (IMSI).
Wireless Port Request (WPR)
Message sent from a new service provider to an old service provider to begin the porting process.
133
Message sent by an old service provider to a new service provider to answer a wireless port
request.
Wireless Short Message Service (WSMS)
Supplemental service allowing short (one-way) messages to be recorded and delivered over the
Global System for Mobile Communication (GSM) network.
wireline
Telephone service that uses cables, not radio frequencies. A wireline company is said to be a Bband company. (See also B-band.)
wireline cellular
Cellular carrier/operator or market that typically belongs to a telephone company that provides
conventional telephone service through a landline system.
WLL
Personal computer that is connected to a larger, multi-user system. Generally, a workstation has
processing capacity and can perform tasks on its own, independent of its connection to a larger
system. (See also terminal.)
World Wide Web (WWW, Web)
Body of information available through the Internet. Although Web and Internet are often used
synonymously, Web actually refers to the software and related conventions that store the
information on the Internet.
World Wide Web Consortium (W3C)
World Wide Web Consortium, founded in 1994. A forum that seeks to promote standards for the
evolution of the Web and interoperability between Web products by producing specifications and
reference software.
WPR
134
XWindows
X
X.25
International Standards Organization (ISO) standard for digital certificates set by the Consultative
Committee on International Telegraphy & Telephony (CCITT) in Recommendation x.509: The
Directory - Authentication Framework, 1988.
X.509 certificate
Commonly used format for digital certificates, as defined by the international standard. Any
application complying with X.509 can read or write digital certificates. The X.509 certificate
determines the structure of trust in a distributed public-key cryptography system.
XML
A recommendation from the World Wide Web Consortium (W3C), similar to Hypertext Markup
Language (HTML), the language of Web pages. XML and HTML contain markup symbols that
describe the contents of a page or file. HTML describes the content of a Web page in terms of how
that content is displayed and interacted with.
XML describes content in terms of what data is being described. For example, <PHONENUM>
could indicate that following data is a phone number. An XML file can be processed as data,
stored with similar data on another computer, or displayed. For example, depending how the
application in a receiving computer wanted to handle the phone number, it could be stored,
displayed, or dialed. XML is "extensible" because, unlike HTML, the markup symbols are
unlimited and self-defining. A simpler and easier-to-use subset of the Standard Generalized
Markup Language (SGML), XML is used with HTML in many Web pages and applications.
XTerminal
Workstation (monitor, keyboard, and mouse) that interfaces with a UNIX server. Third party
software can be used on a PC workstation to emulate an XTerminal so that it may also interact
with a UNIX system.
XWindows
Y
Z
135
136