throbber
Services for Tomorrow's PCS
`
`Susan M. Ahimovic and Joan M. Michaels'
`(908) 758-5367 /758-2020
`
`Bell Communications Research
`100 Schultz Road
`Red Bank, NJ. 07701
`
`1. I ~ ~ r o ~ ~ c t i o n
`Personal Communications Services (PCS) provides
`- the
`terminal, personal, and service mobility
`ability of an end user
`to access hidher
`telecommunications services in any location and the
`ability of the network to locate this end user as
`he/she moves. Today's telephone customers have
`come to expect a menu of "bell and whistle''
`services that provide offerings like custom calling
`features, voice mail, and operator services; that may
`be generally referred to as supplementary services.
`In order for PCS to become widely accepted by the
`public more than basic wireline or wireless services
`may be required.
`In addition to the bells and
`whistles of today, supplementary services that
`provide manageability and security of a PCS
`offering should be made available to the end user.
`This paper provides a view of an end-to-end PCS
`network as a reference for the reader. The paper
`then shifts the focus to
`the two areas of
`supplementary services that may be implemented in
`a PCS offering and provide additional revenue
`and/or preserve current revenue: personalized call
`management and fraud detection. Personalized call
`management includes services such as message
`delivery and call screening; features that may
`provide opportunities for additional revenue. Fraud
`detection addresses the need to preserve revenue via
`improved billing and fraud detection capabilities.
`2. PCS - The End-to-End Network
`A vision of personal communications, in a global
`sense, embraces
`the
`integration of several
`communications concepts, approaches or systems
`into one interconnected and interworking network.
`This vision of personal communications includes
`personal, terminal, and service mobility. Personal
`mobility includes the ability of an end user to access
`his/her telecommunications services on any terminal
`at any location and the ability of the network to
`locate that end user as he/she moves. Terminal
`mobility is the ability of an end user's terminal to
`
`The views expressed in this paper are those of the authors and do
`not reflect a Bellcore position.
`
`access telecommunications services from any
`location while in motion, and the ability of the
`network to locate and identify that end user via the
`terminal as it moves. Service mobility is embodied
`in personal and terminal mobility; it refers to the
`ability to associate services with an end user rather
`than with a particular piece of equipment or
`geographic location. Service mobility allows an
`end user's services to follow them as they move
`through the network. This kind of mobility is
`accomplished not only through wireless telephones
`but,
`through
`the
`interconnection of several
`communications networks that will provide these
`capabilities to the end user. The interconnected
`architectures include the radio (wireless) network,
`the existing wireline network (landline/locai loop),
`and the CCS/SS7 network to access centralized data
`bases. These centralized data bases are the vehicle
`that provide the personal, terminal, and service
`mobility by tracking and recording end user location
`and identification information and allowing access
`from anywhere to anywhere.
`PCS Architecture Overview
`2.1
`This section will provide a brief description of the
`PCS interconnecting architectures and elements as
`well as a discussion of the PCS capabilities. The
`network elements and interfaces in a view of an
`end-to-end architecture are depicted in Figure 1.
`
`2.1.1 Wireless Network
`The basic wireless network components are of a
`radio port control unit, fixed radio ports, and
`tetherless handsets.
`
`* The Radio Port Control Unit's2 (RPCU)
`primary function is to manage radio resources
`and to control the transport of information
`between the network and its associated radio
`ports. The RPCU communicates with the radio
`port via a line interface.
`The Radio Port (RP) provides an interface
`between the radio link and the fixed network
`* The access manager functionality may be combined with an RPCU.
`
`,
`
`0-7803- 1396-8/93/$3.oOO 1993IEEE
`
`222
`
`Conference
`
`Exhibit 1037
`IPR2015-01219
`
`

`
`facility. The basic functions in the RP include:
`transmission/reception, channel coding or
`decoding, synchronization with the network,
`performance measurements, termination of air
`interface, remote tests and maintenance checks,
`and power input.
`The tetherless handset is a low-powered device,
`convenient to carry, that allows an end user to
`access a network similar to today's "Plain Old
`Telephone Service (POTS). Communication
`with the network from the tetherless handset is
`via a radio link.
`There a several ways
`these
`implement
`to
`components to deploy a wireless network. For
`example, the RPCU may be combined with some
`data base intelligence to manage the information
`relating to incoming and outgoing calls for end
`users in its serving area. This implementation is
`generally known as an Access Manager (AM).
`Another implementation, known as an Intelligent
`Base Station (IBS), might be to combine the
`RPCU and an Rp to manage the serving area.
`2.1.2 Wireline Network
`The network node in the local exchange voice
`network concerning PCS is the Service Switching
`Point (SSP). The SSPs are the interface point
`between the voice network and the Common
`Channel Signaling (CCS) network(s). An SSP may
`be either an end office (EO) or an access tandem
`(AT) that has the capability to send and receive the
`Common Channel Signaling/Signaling System 7
`(CCS/SS7) messages necessary to query centralized
`PCS data bases. EOs are the point of interface with
`the telephone end user, commonly referred to as the
`local loop. An AT centralizes selected functions
`like alternately billed calls and CCS/SS7 query
`capabilities.
`2.1.3 CCS/SS7 Network
`The major components of the CCS/SS7 network
`that may be used in the PCS architecture are
`Signaling Transfer Points (STPs) and Service
`Control Point (SCP) data base application. These
`CCS/SS7 network nodes are interconnected by
`signaling links. An STP is the network node that
`performs message routing in the CCS network. The
`STP is an SS7-based packet switch that uses routing
`tables stored in memory to screen and route
`messages in the CCS/SS7 network. An SS7
`message may traverse several STPs in the route to
`its destination. A message's destination may be
`either an SSP or an SCP. The SCP serves as the
`the PCS data base
`platform
`that supports
`application. The SCP/PCS data base contains end-
`user service profile records that manage PCS calls
`and features. The SCP records and updates personal
`
`location information for PCS end users. The
`location information consists of a mapping between
`an end user's PCS number and the routing
`information used to deliver calls to the location
`where the end user is currently registered. The PCS
`data base can also enable end-user features at an
`SSP such as call management capabilities and fraud
`control, as discussed in Section 3 and Section 4 of
`this paper.
`2.2
`PCS Capabilities
`As a PCS end user moves from place to place at
`pedestrian speed, powers on, or powers off their
`tetherless handset, the I?CS network provides the
`following capabilities to provide end users with
`personal, terminal, and service mobility.
`
`2.2.1 Registration
`Registration is the process where an end user
`notifies the network of their location so they can
`receive incoming calls. If an end user is registered
`on a wireless terminal, new locations will be
`automatically registered in the network as they
`move to different areas. This process makes an end
`user known to the network and provides a method
`for incoming calls to be delivered based on the
`current registration inforimation. A PCS data base(s)
`manages
`the updating of personal/terminal
`registration information either as an automated
`process (wireless) or a manual process (wireline).
`In the automated case, the radio system detects the
`handset powering on and sends a registration
`request containing the end user's PCS number to the
`In the manual case, a routing
`PCS data base.
`address is assigned on registration from a wireline
`phone. An end user will regisier the routing
`address (i.e. a geographic telephone number) that
`will be associated with their PCS number. This
`registration may be accomplished by having the end
`user call the registration system and provide the
`registration information using DTMF signaling.
`De-registration will occur when an end user
`registers in a new area, powers-off (wireless), or the
`current registration excee.ds a time-out parameter.
`2.2.2 Authentication
`Authentication is the process whereby the identity
`of the end user requesting service is confirmed. To
`support authentication, the PCS data base must
`manage the verification of an end user's identity.
`Each end user will be assigned Personal
`Identification Number (PIN), as well as a PCS
`number and in the case of a wireless terminal, a
`unique identification number (i.e., Electronic Serial
`Number, ESN). The combination of PCS number,
`PIN, and the manufacturer-assigned ESN can be
`used to authenticate an erid user.
`
`Record
`
`223
`
`ICUPC '93
`
`

`
`2.2.3 Service Validation
`Service validation is the process whereby the PCS
`network verifies the status of
`the end user
`requesting service and either permits or denies
`service depending on end-user status as recorded in
`the PCS data base. Service validation involves
`verifying the end user's account status and
`subscribed features and/or services. As part of the
`registration process, the network sends the PCS data
`base a validation request to make sure the end user
`is permitted to receive service. A response message
`is sent to the user's serving network to permit or
`deny service.
`2.2.4 Call delivery
`Call delivery refers to the delivery of an incoming
`call to the end user. In a wireless network the end
`user's location would be related to the RP or RPCU3
`and in a wireline network the end user would be
`registered to a geographic telephone number. Upon
`recognizing a PCS number from a call directed to an
`end user, the routing address (e.g. RP/RPCU or IBS
`location identifier, geographic telephone number)
`for this call is obtained from the PCS data base.
`Mapping the dialed PCS number to a routing
`address involves querying the end-user's service
`profile in the PCS data base.
`2.2.5 Call origination
`Call origination is the capability provided to an end
`user to originate calls from the portable unit.
`Ideally, a service validation may be done to verify
`that the end user is permitted to use the services
`In the case of a wireline-registered end
`requested.
`user, calls will be placed in the normal manner.
`2.3
`PCS from the end-user perspective
`Since each PCS network element has been
`discussed, the focus will be directed to the basic
`capabilities initially described: registration,
`authentication, service validation, call delivery, and
`call origination. The functions will be discussed
`regarding end-to-end signaling andor call flow, as
`appropriate.
`
`When an end user power's-up their portable unit it
`will send a "power-up" signal to the radio port. The
`radio port will relay the information to the RPCU.
`The RPCU will relay the information to a switch
`with common channel signaling (CCS) capabilities.
`The switch will generate an SS7 message that will
`be routed to the appropriate PCS data base.
`Included in the CCS/SS7 message is the PCS
`number and the location identifier of the radio port
`reporting that the unit has been powered-up. The
`
`In the case of an IBS, the end-user location would be related
`to the IBS.
`
`SCP will have the intelligence to look-up the PCS
`number and record the radio port location identitier
`(authentication,
`service validation and
`automatic registration). The SCP will generate a
`response message that will be returned to the
`originating switch. The response message should
`contain acknowledgment information such as "the
`user is a valid end user".
`
`When the called number is a PCS number (call
`delivery) a query is launched to the PCS data base
`to look-up and return the location identifier
`currently recorded. Once the response is received
`with the current location identifier, the call can be
`routed and completed. When this portable unit is
`not powered on the system may allow the end user
`to provide the network with a default routing
`address. This type of feature falls into the category
`of personalized call management and is discussed
`further in Section 3.
`
`A registered end user should be able to make a
`phone call (call origination) from their portable
`unit the same as they can from a tethered telephone.
`Ideally, the unit should request the end user to enter
`their PIN following the dialed number. The switch
`should then launch a query to the SCP for validation
`of the call originator (authentication and service
`validation) similar to the power-up registration
`function. The authentication of an end user
`provides the end user with a level of security from
`the fraudulent use of their portable unit. This issue
`falls into the category of fraud detection and is
`discussed further in Section 4.
`3. Personalized Cali Management
`The PCS end user will have the capability to
`determine when, if, and how
`they want calls to
`their PCS number(s) completed. As described, end
`users will have a service profile. Therefore, they
`will be able
`to select, from a menu of
`supplementary service offerings, the capabilities
`they want to customize their PCS service to meet
`their needs. This section discusses call origination,
`call completion, and call screening services thai
`might be offered to PCS end users so that they can
`personalize their service to meet the needs of their
`daily activities.
`3.1 Call Origination
`A PCS end user may want to maintain some of the
`same call-origination based custom calling features
`offered today. This section discusses some of the
`features activated by the call originator that may
`offered to PCS end users.
`
`ICUPC '93
`
`224
`
`Conference
`
`

`
`Speed dialing: This feature would provide the
`capability to include a speed dialing list in
`the service profile. The speed dialing
`service would be dependent on the local
`switch capabilities because the list would
`have to be down-loaded to the originating
`switch and then interact with the PCS end
`user.
`This feature may be
`Three-way calling:
`provided on a usage sensitive rather than
`subscription basis. Similar to speed dialing,
`the service offering would be network and
`switch dependent. If the network is capable
`of supporting the service, the PCS end user
`might be given the capability to activate the
`service by signaling the network in the same
`way
`the service works for wireline
`customers today (e.g. pressing the ' * I key on
`the touch tone pad during a call in progress).
`Calling Card Service: This service is
`provided in today's network as part of
`Alternate Billing Services (ABS). The
`calling party activates the service by dialing
`'0' plus the called number to alert the
`operator services system. Although it might
`seem unlikely that someone who has a
`portable telephone would need a calling
`card, there are instances where it would
`useful and therefore, should continue to be
`offered as a service option. Today some
`ABS offerings provide twenty Personal
`Identification Numbers (PINS) to be
`activated per line number. The flexibility of
`subscribing to calling card service as a PCS
`end user might be useful for the end user
`whose main household number happens to
`be a PCS number and would like to provide
`calling cards to other members of their
`family.
`3.2 Call Completion
`A PCS end user may want to design their service so
`that they never miss a call. In today's network calls
`may not be completed because there is no answer or
`the line is busy. Since a PCS call may not be
`completed if the PCS customer is not registered, as
`well as busy or no answer, service offerings that
`assure a PCS customer that they would not miss any
`calls are described in this section.
`
`Voice mail: Centralized switch based voice
`mail would be a natural service to offer a
`PCS customer. The PCS data base may
`contain information to determine when a
`subscriber might want calls routed to their
`subscribed voice mail system. The customer
`
`would be able to choose different suppliers
`for their voice mail and their locator service.
`Default number forwarding: This service
`offering would provide the capability to
`include a default (wireline) telephone
`number in their service profile. When they
`are not registered, all calls to their PCS
`number would be routed to this default
`number.
`Time-of-day / dray-of-week routing: This
`service offering would provide the capability
`to include a list of default numbers. The
`number selected for call completion would
`be based on the current time-of-day and day-
`of- week.
`Location number sequencing: This service
`offering would provide the capability to
`include a list of default routing numbers in
`their service profile. If the end user was not
`registered, the system would route to the
`first default number, if no answer or busy, it
`would then route to then next number on the
`list, until the call was completed. The
`service is a hybrid of the previously
`discussed service offerings: default number
`forwarding and \lime-of-day I day-of-week
`routing services.
`3.3 Call Screening
`Other situations may occ:ur where the end user may
`want to screen calls before they are completed. In
`today's network, custom calling services (e.g. call
`blocking, calling number delivery) are offered to
`wireline customers. Since these services have been
`it is
`deployed and accepted by the public,
`reasonable to assume that a PCS end user would
`also be interested in these services. Service
`offerings that would provide the capability for the
`PCS customer to personalize a call screening
`service that meets their needs are discussed in this
`section.
`
`Do-Not-Disturb service: This service might
`provide the PCS end user with the capability
`to route particulair screened calls to a default
`number or to a voice mail service when the
`end user is registered. An enhanced do-not-
`disturb service offering may also be
`provided on a time-of-day I day-of-week
`basis.
`Call blocking: This service would provide the
`capability of the PCS end user to list
`numbers that they wish not to be completed.
`The end user might want to provide a default
`routing option for these numbers like a voice
`mail service, ai default number, or a
`personalized call blocking announcement.
`
`Record
`
`225
`
`ICUPC '93
`
`

`
`e Calling number delivery: This service would
`provide the calling number to the end user as
`the call is set up. This service would be
`dependent on the capabilities of
`the
`terminating equipment (i.e.
`the users
`handset,
`the
`terminating
`network
`capabilities).
`Calling name delivery: This service would
`provide the customer name of the calling
`party to the PCS end user as the call is set
`up. As with calling number delivery above,
`the service would be dependent on the
`capabilities of the terminating equipment.
`* Billed-number screening: This service is
`provided in some networks as part of ABS.
`The calling party activates the service by
`dialing '0' plus the called number to alert the
`operator services system. Billed-number
`screening includes collect and third-number-
`billed calls. Today some ABS offerings
`allow an end user to block or verify all
`collect calls, third-number-billed calls, or
`both. It therefore seems reasonablt: that this
`call screening alternative should be provided
`to PCS end users as well.
`
`4. Fraud Detection
`Fraud accounted for over 1 billion dollars4 in lost
`revenue in 1991 in the public switched telephone
`network. Cellular service providers also reported a
`1 billion dollar5 loss of
`revenue in 199 1 due to
`fraud. Revenue loss due to fraudulent usage of
`telephone services has been reported to be on the
`rise by both voice and cellular service providers. A
`variety of fraud schemes have been identified in
`both networks. For example, in the voice network
`"PIN hacking" is a common method to identify a
`valid calling card number/PIN combination and, in
`the cellular networks "tumbling" is a method used
`determine a valid
`telephone number/ESN
`combination.. It is reasonable to expect that loss of
`revenue due to fraud will be experienced in the PCS
`networks, as well. Fraud detection should therefore
`be an included capability in the new PCS networks
`as they are deployed. This section will address
`methods of embedding fraud detection into the PCS
`networks to reduce the risk of both the service
`providers and the end users have for fraudulent
`usage of their PCS services. Protection can be
`provided based on tetherless handsets' ESN, PCS
`numbers, and PINS. Fraud detection can be
`approached from three aspects: usage thresholds,
`usage restrictions, and data analysis.
`
`Industry source
`Indursty source
`
`4.1 Usage Thresholds
`A threshold is a usage-based counter that ilags or
`takes action when particular conditions are met. By
`alerting appropriate personnel or by sending a
`message to another network node, the counter value
`may be compared to a threshold limit and action
`may be taken based on the counter value / threshold
`limit comparison. In addition, thresholds allow for
`ranking of counter values by making the distinction
`between different usage levels within a particular
`threshold. This distinction allows data associated
`with normal levels of usage to receive a lower
`priority for examination than data which represents
`usage in excess of limit levels.
`
`Event counters may be implemented in several
`network nodes, however, the greatest benefit may
`be realized when the threshold capabilities are
`located in a centralized node. Otherwise, an event
`may be counted in several nodes resulting in an
`event exceeding the intended threshold across a
`network without alerting the fraud investigation
`team.
`
`The type of events that may be measured are:
`
`Successful Attempts - monitoring and
`measuring the number of times an event
`occurs to tlag unusually high usage;
`Failed Attempts - monitoring and measuring
`the number of
`times an even1
`is
`unsuccessfully attempted to deter the type of
`fraud the may be perpetrated by computer
`hackers; and
`Duration of a threshold event - t h e
`association of
`timing intervals with a
`threshold limit to reduce large loss due to
`one (or a few) event(s).
`Combination of thresholds - threshold
`capabilities used in conjunction with each
`other to further protect the end user.
`The following capabilities may implemented with
`regard to usage thresholds:
`High Usage Threshold (HUT) - sets a limit
`to the number of times an event may occur
`before it is determined to be suspicious;
`Time Interval (TI) - a time limit set to count
`events of concern; and
`Deactivation - a manual or automatic action
`that may be taken to prevent additional
`usage that has been determined suspicious.
`4.2 Usage Restriction
`A usage restriction is a limitation put on an end
`user's ability to perform certain functions. The
`primary purpose for usage restrictions is to limit
`
`ICUPC '93
`
`226
`
`Conference
`
`

`
`exposure to fraud. An example of a usage
`restriction would be to geographically limit the area
`that a PCS end user could place a call to (i.e.
`restricting calls to North America). This approach
`to fraud detection might also be used by businesses
`that would provide their employees with a PCS
`number, but wanted to limit excessive calls by
`employees.
`4.3 Data Analysis
`Call associated data may be analyzed to determine
`high usage, failed attempts, long duration, unlikely
`patterns of call origination, and calls made to
`unusual destinations. This analysis may take place
`in near real time or at some later datehime
`depending on the urgency of
`the results of the
`analysis. If enhanced fraud detection is desired, it
`may be desirable
`to record and retain all
`information needed to process call origination
`requests. Although several nodes in the PCS
`network may be candidates
`to collect call
`origination data, the greatest benefit would be
`realized if data analysis took place in or near a
`centralized node because all data would be in a
`central location and data administration might be
`simplied. Candidate nodes for data analysis might
`be the PCS data base or an operations system.
`
`5. Summary
`This paper provided a review of an end-to-end PCS
`network that supported the major focus of two areas
`of supplementary services that may be implemented
`in a PCS offering and may provide additional
`revenue and/or preserve current
`revenue:
`personalized call management and fraud detection.
`Personalized call management includes services
`such as message delivery and call screening;
`features that would provide opportunities for
`additional revenue. Fraud detection addresses the
`need to preserve revenue via improved billing and
`fraud detection capabilities.
`
`The architecture discussed network elements and
`capabilities required in the wireless, wireline, and
`the CCS networks to support PCS. The basic
`wireless network elements needed for PCS are an a
`radio port control unit, radio ports, and tetherless
`handsets. The components of the CCS network that
`are used in the PCS architecture are SSPs, STPs and
`SCPs. These CCS network nodes are interconnected
`by signaling links.
`
`PCS end users will move from place to place at
`pedestrian speed, power on, or power off their
`tetherless handset. The PCS network will provide
`the following capabilities to provide end users with
`personal,
`terminal, and
`service mobility:
`
`registration, authentication,
`delivery, and call origination.
`
`validation, call
`
`The two areas of supplementary services that were
`investigated in this paper identified the potential for
`a PCS end user to personalize their PCS service to
`meet the needs of their daily activities and for the
`PCS service providers to provide a private and
`secure service. The call management features
`described in this paper included features such as call
`screening and message delivery services; services
`that may provide additional revenue opportunities
`to the service provider. The fraud detection features
`described address the service provider's need to
`preserve revenue via improved billing and fraud
`detection capabilities.
`
`It may very well be that the "bells and whistles" of
`today' s telephone service are the k e y to PCS
`becoming widely acce:pted by the public as the
`telecommunications services of the future.
`
`References:
`1) no author listed, "Personal Communication Services: RBOCs Test
`PCS Maze of Opportunities and Perils." Applied Networks. Volume
`4/Issue 7, July 199 I .
`2) Daehnke. Cindy, "Wirelens Communications and the Voice
`Variable" Voice Processing Maguine. August 1991.
`3 ) no author listed. "Bellcore Sees PCS as Alternative to Wire in
`Local Loop," Advanced Wireless Communicaions. May 15,199 I.
`4) Bellcore. "Generic Framework Criteria for Universal Digital PCS"
`TA-NWT-001713. Issue 2. December 1990.
`-5) Lucas. Jerry "The Cordless Gods must be Crazy," 7elesiruiegirs.
`April 1991.
`6 ) no author listed. "The Digital Cellular Shakeout" Yankeevision.
`May 1991
`7 ) Worthman. Emest "The Spreading of Spectrum," Cornmunicurions.
`January 1991
`8) Bellcore, "Network Architecture and Services,"
`BOC Notes on the LEC Networks, SR-TSV-002275, March 1991.
`Issue 1:Section 14.
`9) no author listed. "Personal Communications are Now Highly
`Personal." U.S. Telecoriimunications. July I , 199 I .
`
`I
`
`I
`
`
`
`m-
`A
`
`0
`
`PCS
`
`Dna Base
`
`Figure 1
`
`Record
`
`227
`
`ICUPC '93

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket