16-bit Unicode or Unicode Transformation Format (UTF-16) is a method of encoding character data, capable of encoding 1,112,064 possible characters in Unicode.
Two-Factor Authentication, also known as 2FA, is an extra layer of security that requires users to use both their online password and their mobile phone to verify their identity in order to access a service or a web app. In addition to using their service credentials to access sensitive data, the user also receives a one-time passcode or PIN number on his token or via SMS.
The advantage of using a mobile phone for 2FA is that users tend to carry their mobile devices with them at all times. That way, services can ensure that their users receive the verification PIN over something that only they have. The one-time PIN (OTP) number is generated and sent to the user’s mobile phone. The user receives the OTP and types it into the application to confirm their identity.
A system that incorporates both outbound (Mobile Terminated or MT) and inbound (Mobile Originated or MO) SMS into one fully-featured service. By using a dedicated number, a 2-Way SMS user can send and receive SMS through a web messaging platform by using complete solutions or APIs.
2-Way SMS messaging is done using short codes or virtual long numbers (also known as virtual mobile numbers). The main difference between the two is the length of the number; while virtual mobile numbers look like a standard phone number, short codes have between 3 and 6 digits, making them easier to remember.
Short codes can only be used on a national level and countries around the world have different regulations and requirements concerning them.
Infobip's 2-Way SMS messaging coverage currently spans over 50 countries.
2G is an acronym for second generation mobile telecommunications technology that was first launched in Finland in 1991. The main features of 2G mobile connection were digital encryption of conversations and messages, greater mobile phone penetration and the introduction of various data services for mobile phones, such as SMS messages.
3G is an acronym for third generation mobile telecommunications technology that was first introduced in 1998 and later commercially in 2002 that enabled wireless data transfer rate of at least 200 kbit/s enabling the easier usage of mobile internet access and video calls.
4G is an acronym for fourth generation mobile telecommunications technology. It was first introduced in Norway and Sweden in 2009 and enabled wireless data transfer rate of at least 100 Mbit/s.
The process of sending mobile messages from an application to a mobile user. A2P SMS messaging is also called enterprise or professional SMS. Businesses can use it in several technical modes to communicate with consumers, authenticate users of online services, or deliver time-sensitive alerts. In all the cases, communication is initiated from a business application, and not an individual’s mobile phone, as is the case with P2P SMS.
Typical examples of A2P SMS include banking notifications, critical alerts, SMS-based two factor authentication, automatic booking confirmations, loyalty programs and marketing notifications etc. Online reservation systems, different corporate platforms and support services have deployed A2P SMS to increase efficiency and improve communication. Financial institutions have been using A2P SMS for over 15 years, by delivering automated, event-based SMS notifications to their clients’ mobile phones. Examples include anti-fraud alerts, balance statements, payment reminders, withdrawal notifications.
The most popular modes of using A2P messaging are SMS API integration, access via a web interface (by obtaining a username and password), or the deployment of a professional enterprise solution.
The alphanumeric sender ID technology allows the sender to send messages using a custom, recognizable sender ID constructed from any combination of numeric and alpha characters (0-9, a-z, A-Z, _).
Therefore, an alphanumeric sender ID is much more recognizable by users so they can identify the sender more easily. This way, the sender ID can be used to present anything from a company name to a name of any government organization. However, the receiver of the message can`t reply to a message sent with an alphanumeric sender ID.
Apache or Apache HTTP Server is the most used web server software on the internet. It is a free and open source software that is estimated to serve 50% of all active websites.
An app notification is a message or alert sent by an application to the user. Notifications sent this way do not require the application to be open and messages are displayed on the screen of the mobile even when the device is locked.
Binary SMS messages allow sending of various types of rich-content, such as transferring ringtones, telephone system settings and WAP-Push via text messaging.
Any binary SMS message has 140 bytes of data which can be used. This data is split into two distinct parts - the user data header (UDH) and the message data. UDH notifies mobile phones about the type of data in the message, defining the type of content being sent.
A blacklist is a list of message recipients that decided to opt-out of receiving further SMS messages. Blacklists are mostly used for needs of promotional campaigns where companies give an option to the end customer so he or she does not receive messages irrelevant to them. In some countries having an opt-out inside every SMS message is obligatory by law.
Also, chat apps like Viber have the opt-out option by default for all messages coming to their users. Besides the blacklists, owned by every company for their messaging activities, there is also a DND or Do Not Disturb list.
Those lists are used by the Mobile Network Operators for the protection of their users. If one of their subscribers decides to be on the Do Not Disturb list, they will not receive promotional messages, no matter if they’re subscribed to a newsletter or not. This is a method used by MNOs to fight against churn rate and customer spamming.
Business-as-a-Service (BaaS) is a new concept in A2P messaging managed services, allowing mobile operators to run their entire A2P business - with complete customer acquisition flow and support - without any investment or risk of ownership.
Business-as-a-Service term is derived from the standard terminology used to describe different stages of development in cloud solutions.
Modular A2P messaging management and service delivery approach for mobile operators, delivered by the operator’s specialized technology partner. Includes a fully-managed instance of the core communications platform, maintained and upgraded according to the latest standards in security and continuous service delivery, operational services management, infrastructure development, resulting in an expanded operator service portfolio, faster time to market, cost reduction and reduced strain on operator business processes.
Through years of industry experience and investment in R&D, messaging technology specialists have blended in-house development and built on existing relationships with mobile operators around the world to satisfy the requirements of today’s businesses, providing high-quality messaging services with worldwide coverage. Business-as-a-Service (BaaS) expands on this model, as a more active role in managing operator’s A2P SMS through modular service and operations delivery, positively impacting time-to-market and helping to innovate operator portfolios.
With no guesswork involved for the operator – this approach gives operators access to a wealth of proprietary expertise, it also introduces the support infrastructure necessary to meet the A2P demands of enterprise customers. Along with this, the messaging partner powers sales and marketing efforts and provides expert-level business consultancy, allowing the Business-as-a-Service model to power every segment of operator’s A2P messaging.
Caller ID is a telecommunication service that enables users to identify incoming calls before answering. Caller ID is possible with mobile, analog, digital and VoIP calls.
Depending on the device being used, Caller ID displays on the device screen as a long number at the moment the call connects.
Users can store numbers on their personal devices using either the SIM card or the device memory for storage. Storing the number allows users to save the number under a recognizable name for quick recognition. This name is then displayed every time the stored number calls.
Caller ID is used for caller identification when receiving text messages, as well
A type of mobile payments where the purchase amount is charged to the mobile phone bill, or deducted from the prepaid balance. Typically, direct billing is used for micropayments for digital and virtual goods but can also be used for other types of transactions - such as public transport tickets or for city parking. This type of mobile payment is not intended for the payment of physical goods. The mobile operator of the user wishing to make a DMB payment needs to support the technology in order for the payment to be made.
A concatenated short message service is used to overcome the limit on the number of characters that can be sent in a single SMS text message transmission (usually 160 chars). With this method, the sending device divides the long message into smaller ones that get recombined at the receiving end, with each message charged as a single SMS message.
With this feature, the complete message appears to the receiving user as a single long text message (a concatenated SMS message). On networks which do not support Concatenated SMS, each smaller message is delivered as individual SMS text message.
Concatenated message character count is reduced by 7 characters per message. Messages longer than 160 characters are reduced to 153 characters, while messages outside the GSM-7 character set (i.e. Unicode) are reduced from 70 to 67 characters.
Communications Platform-as-a-Service (CPaaS) refers to a cloud-based platform that provides the ability to developers to add communication services to their applications. It allows them to implement SMS, Voice or other messaging capabilities without developing their own communication solutions.
CPaaS functionalities can be leveraged simply, avoiding unnecessary hardware investments, with API integration. Apart from the technical integration companies also benefit from go-to-market partnership, go-to-market strategy, sales expertise and client onboarding and customer support.
Using a CPaaS offers many advantages to companies of all sizes. It saves money and time because companies no longer need to invest into developing their own solutions, allowing resources to be spent on developing the core business.
Delivery reporting is a feature of SMS MT that reports back if the SMS message has been delivered, for every message sent. It is sourced directly from the handset.
Essentially, DLRs are URL call-backs for Delivery Reports. Instead of the gateway logging the activity, it will call-back the provided URL using a query string (at the end) with the parameters of the delivery report itself.
Dual-tone Multi-frequency code is a response code that is generated when an end-user presses the numbers on a mobile or landline phone’s keypad. Each number is uniquely identified with the DTMF code that can be received and interpreted on the receiver side. DTMF code signaling enables reception of information from the end user e.g. PIN code during a voice call.
A predetermined numeric sender identification (the mobile number that is displayed on the recipient's cell phone) that cannot be modified according to user needs and follows the standard MSISDN format - The ITU Telecommunication Standardization Sector recommendations limits the maximum length of an MSISDN to 15 digits. 1-3 digits are reserved for country code with prefixes not included.
The minimum length of the MSISDN is not specified by ITU Telecommunication Standardization Sector but is instead specified in the national numbering plans by the telecommunications regulator in each country.
A message that appears on the recipient's mobile screen directly. Recipient does not need go to the mobile phone inbox to read the message, nor is the message allocated to the SMS inbox.
Flash SMS is a VAS feature to the standard SMS delivery and is most commonly used to immediately catch the recipients’ attention. Emergency alerts, traffic alerts are the most common usage examples.
Geo-redundancy signifies a computer system operating at two or more geographical locations as a redundancy in case the primary system fails due to any reason.
A Global Title (GT) is an address used in the SCCP protocol for routing signaling messages on various telecommunications networks. Theoretically, global titles are unique addresses which refer to only one destination, but in practice those destinations can change over a given time-frame.
GT title structure is defined by the ITU-T signaling connection control part formats and codes recommendation (Q.713), further extended in the supporting numbering plan standards. Other national variants of Signalling Connection Control Part (SCCP) define their own format for the Global Title. The value of a global title is a sequence of attributes which modify the address value.
A mobile telephony standard introduced in the early 1990s by European Telecommunications Standard Institute. First launched in Finland in 1991, GSM soon became universally adopted in Europe, and then worldwide. GSM currently accounts for 90% of the world’s mobile market, which makes it the default mobile standard.
HAProxy or High Availability Proxy is a free and open source software which is most commonly used to improve the performance of a server environment by spreading requests to multiple servers and thus enhancing the speed and reliability of the server environment. The software can be run on Linux, Solaris and FreeBSD operating systems.
HLR (Home Location Register) is a database that contains various information about all of the mobile subscribers of a mobile network such as the mobile numbers, services, whether the numbers have been ported to another network and similar information.
Home Location Register lookup (HLR Lookup) is a service that dynamically contacts a central database (on the operator’s side) that contains details of each mobile phone subscriber authorized to use the GSM core network.
Infobip's HLR service is called Number Lookup.
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. Hypertext is the type of structured text that uses logical links (hyperlinks) between nodes containing the text. Basically, HTTP is the protocol of exchanging and transferring hypertext.
HTTP functions as a request-response protocol in the client-server computing model. The client submits an HTTP request message to the server. The server, which provides resources such as HTML files and other types of content and other functions for the client, returns a response message to the client. The response contains completion status information about the request and may also contain requested content in the message body.
In addition to HTTP, there is also the Hypertext Transfer Protocol Secure (HTTPS) - a communications protocol for secure communication over a computer network, with especially wide deployment on the Internet. HTTPS is the result of layering the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, adding security capabilities of SSL/TLS to standard HTTP communications.
An International Mobile Subscriber Identity (IMSI) is a unique number associated with all Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS) network mobile phone users used for identifying a GSM subscriber.
Each IMSI number has two parts. The initial part is comprised of six digits in the North American standard and five digits in the European standard. It identifies the subscriber's GSM network operator in a specific country. The second part is allocated by the network operator to uniquely identify the subscriber.
The IMSI is stored in the Subscriber Identity Module (SIM) inside the phone and is sent by the phone to the appropriate mobile network.
The IMSI is an important part of the Home Location Register (HLR) lookup process as it is used to identify to which network a mobile number belongs to. This is why the process is sometimes called IMSI Lookup in addition to HLR Lookup or Number Lookup.
An inbound message is a mobile message routed from an end user's mobile device and delivered to a mobile phone or an application. It may also be regarded as a Mobile Originated message or MO signifying that the starting point of a message is a mobile phone.
Instant Form Filling is a tool within the Mobile Identity Solution that enables users to automatically and instantly fill in various forms on your website or application when they’re using them on their mobile.
Instant Form Filling uses the user’s mobile number to automatically and instantly fill in forms which would otherwise require manual input by the user. This is done with the latest up to date information held by the appropriate Mobile Network Operator.
The data it can instantly fill in includes user information such as first name, last name, address, country.
ISO 27001 is a family of standards that deals with information security management set by the International Organization for Standardization. They are designed to help organizations and companies manage the security of various information such as financial information, intellectual property, employee details or information entrusted by third parties.
Internationally-recognised certificates confirm our compliance with information security (ISO 27001) standards applied throughout our organisation.
ISO 9001 is a family of standards that deals with quality management set by the International Organization for Standardization. They provide guidance and tools for companies and organizations who want to ensure that their products and services consistently meet a certain level of quality.
Internationally-recognised certificates confirm our compliance with the global quality management (ISO 9001) standards applied throughout our organisation.
A word that clients choose in order to identify their campaign and inbound SMS messages. It is the first word that appears in the message before the blank space, and that end user is asked to include to the message they’re sending out to a company or institution. For example, a wine brand can offer customers to text WINE (keyword) to a shortcode to participate in sweepstakes.
A feature of SMS-MT that displays the timestamp of the home network local time. It is particularly useful for international mobile service providers and enterprises, which need to have the exact sending time adapted to the local time.
A mobile network operator or MNO, also known as a wireless service provider, wireless carrier, cellular company, or mobile network carrier, is a provider of wireless communications services that owns or controls all the elements necessary to deliver services to end-users, including radio spectrum allocation, wireless network infrastructure and other necessary components.
In short, a mobile network operator (MNO) is a telecoms entity that provides services for mobile phone subscribers.
Infobip is partnered with over 400 Operators.
A mobile message routed from an end user's mobile device and delivered to a mobile phone or an application. In the latter case, incoming messages can be seen over a specialized web interface, which usually offers additional reporting and analytics abilities. Incoming messages can be forwarded to SMPP, HTTP push or pull, or email. Also, they can trigger further actions - an automatic reply, opening of a support ticket etc.
Mobile data penetration represents the number of smartphones in a country. It is usually presented as a percentage of the population using smartphones.
Mobile Identity is a verification solution that consists of several real-time identification and authorization services that enable improved UX and a stronger authentication layer to protect online transactions for user-facing applications and websites on mobile.
These services include:
It can be integrated with applications through rich API’s. Mobile Identity services require a mobile data connection to work.
Mobile Network Operators have access to various user data which can be leveraged to verify your users. Mobile Identity processes data from Mobile Network Operators’ such as the mobile phone number (MSISDN), first name, last name, address, gender and other attributes like location and device type. Mobile Identity requires user consent to work and is compliant with various security standards, such as GDPR - no data is stored, only processed to enable user verification.
Mobile Number Portability (MNP) enables mobile telephone users to retain their mobile telephone numbers when switching from one mobile network operator to another. Since its launch in Singapore in 1997, over a hundred markets today allow MNP. Most MNOs offer this service for free or for a nominal price, enabling users to change numbers or switch operators with ease.
Infobip's service Number Lookup can conduct automated number portability checks to service optimize routing and charging for a range of companies and industry verticals. From call centres seeking to automatically optimise routing and costs by checking number type before establishing a phone call or sending an SMS to cut costs.
Mobile Phone Penetration refers to the number of SIM cards or mobile phone number in a certain country, it does not refer to the number of mobile phone devices.
This information is represented by the mobile phone penetration rate which shows the number of SIM cards used in a given country. The data is presented as a percentage and can thus exceed 100% if the number of SIM cards in the country is higher than the actual population number.
MSIN stands for Mobile Subscription Identification Number. It is a unique number, consisting of maximum 10 digits, used to differentiate a mobile phone by a mobile network operator (MNO).
The Mobile Subscription Identification Number (sometime also referred to as the Mobile Subscriber Identification Number) is part of the International Mobile Subscriber Identity (IMSI) number – the last 10 digits of the 15 digit long IMSI number are the MSIN.
A number uniquely identifying a subscription in a GSM or a UMTS mobile network. An MSISDN is the phone number associated with a single SIM card, in other words, the number you call or send an SMS message to.
A mobile message routed from a client or an application and delivered to the end user’s mobile phone is a called a SMS MT (Mobile Terminated). The word Terminated means that the message is terminated (delivered) on a mobile device. It is also known as an Outbound SMS.
A mobile virtual network operator (MVNO) is a company that provides mobile phone service but does not have its own licensed frequency allocation of radio spectrum, nor does it necessarily have the entire infrastructure required to provide mobile telephone service.
Infobip is partnered with over 400 Operators.
Numeric Sender ID is the default sender type of an SMS message in standard MSISDN form. Recipients can reply to messages with a numeric sender ID, meaning that it can be used for two-way messages.
The opt-in function is connected with getting permission from the customer to send promotional materials and messages to his or her's email, mobile number or chat application.
In the messaging world, it is mostly used by marketing departments to communicate special promotional offers, last minute deals or changes in terms and conditions.
Often, the opt-in option is offered through zero rated short codes, meaning the customer can opt-in without any additional price per message. Opt-in is tightly connected with opt-out which is used so the customer can unsubscribe from the messages he receives.
The practice differs around the world and in some countries the opt-out function is a mandatory part of message text. At the end of a message, there are instructions on how to opt-out. Chat applications like Viber have an opt-out option for A2P messages at the top of the chat group.
The opt-out function is an action where a customer requests the stopping of sending promotional materials and messages to his or her's email, mobile number or chat application.
In the messaging world, it is mostly used by marketing departments as a way of offering customers the ability to unsubscribe from the messages he receives.
The practice differs around the world and in some countries the opt-out function is a mandatory part of message text by law. It usually comes at the end of a message, as instructions on how to opt-out. Chat applications like Viber have an opt-out option for A2P messages at the top of the chat group.
A feature of SMS-MT that sends over-the-air configuration messages, such as software updates, configuration settings and security locks.
A one-time PIN code is a code that is valid for only one login session or transaction using a mobile phone. It is often used in two factor authentication or 2FA to provide an extra layer of security for the user when he uses an ATM machine or tries to login to a service from a different computer.
Since the one-time pin is valid for only a single use, they are not vulnerable as static passwords (passwords that do not change) and cannot be reused a second time by anyone, including unauthorized persons and thus avoiding the threat of pin code theft.
There are a number of ways to deliver one-time passwords and pins with the two most common and secure ways being through proprietary tokens and mobile phones. Using mobile phones for delivering OTP's come as a logical step due to mobile phones being ubiquitous and that most of them meet hardware requirements needed to successfully deal with OTP's.
The usage of modern smartphones in delivering one-time PIN codes benefits both the end-users who are already familiar with their device and don't need to use another one and enterprises that need to deliver them, as using this method lowers their operational costs.
An outbound message is a message routed from a client or an application and delivered to the end user’s mobile phone. It may also be regarded as a Mobile Terminated message or MT, signifying that the endpoint of the message is a mobile phone.
P2A (person-to-application) SMS messaging is the process of sending messages from a mobile user to an application. It is often referred to as Mobile Originated (MO). The process requires the end-user to start the interaction with a business or company by sending an SMS to an application.
P2A messaging is commonly used for various TV voting campaigns, competitions, SMS lottery campaigns, subscriptions etc. With person-to-application SMS messaging, individuals can easily interact with brands, companies and service providers with text messaging providing a ubiquitous, quick and trusted route for client-business communications.
P2P SMS is process of sending mobile messages from one user to another, where an SMS message travels between two mobile subscribers. This is the usual traffic between subscribers of mobile operators. The main usage examples include basic text messaging, various chat services etc.
PCI DSS – PCI DSS stands for Payment Card Industry Data Security Standard which is a security standard for companies and organisations that handle credit card information. It was created by the Payment Card Industry Standards Council to increase the security of cardholder data.
The PCI DSS was first released in 2004 after Visa, MasterCard, American Express, Discover and JCB formed the PCI SSC to conciliate their security policies. Since then there have been several versions.
Infobip is compliant with the strict data security standards set by the payment card industry. We are trusted to process sensitive cardholder data with maximum security and reliability.
Personal Data Verification is a user data verification service within the Mobile Identity solution.
Personal Data Verification is technically similar to Silent Mobile Verification, the significant difference being that more user information is transferred in the API calls.
With Personal Data Verification you can verify user information such as first name, last name, address, birthdate when they are subscribing to your service, creating an account or making a mobile purchase. Personal Data Verification cross-checks the data entered by the user with the most current subscriber information held by the appropriate Mobile Network Operator and returns the accuracy score for each submitter customer.
Personal Data Verification verifies if the user’s mobile number is prepaid or post-paid, active, only recently been activated, or if there have been any changes in the IMSI status – anything suspicious is flagged for further verification.
This process can be used throughout the user’s journey as an additional security check for each end-user activity.
A Premium SMS number is a 3-7 digit number used for messaging that charges a premium price to the end user per sent SMS. End user pays a higher price of the message than for a normal P2P message.
That price can be anywhere from twice as high to even fifty times higher, depending on the market.
The most known use case for premium SMS is when the numbers are used for charity or voting activities. For example, in case of a natural disaster, people can easily send an SMS message to a short code in order to donate funds to help people in need.
Another use case is connected with reality show voting where shows like Big Brother or Voice usually have contestants competing for a grand prize. The show’s viewers can vote and contribute to their favorite contestant success.
Premium SMS numbers are also used for various competitions. This marketing strategy is often used by retailers who, in exchange for the competition opt-in, offer valuable awards like a car or exotic trip.
PSTN stands for Public Switched Telephone Network. It is the aggregate of the world’s circuit-switched telephone networks. Both landline and mobile numbers are covered by this abbreviation when someone is referring to PSTN networks.
Push notifications are messages received by mobile devices (or other computing devices). Push notifications originate from a server and are delivered to users who have installed an app and have opted-in to receive notifications from the app. Mobile users don't have to be using the app in question or even their device to receive incoming push notifications.
There are a lot of differences between SMS messaging and Push messaging, the most important one being the price difference – Push messages are a lot less expensive than SMS messages, making them the ideal communication tool for notifying app users while they are not using your app.
Push notifications can easily be enriched with various media such as images, videos, audio, and even emoji's in order to increase the open rate and offer a more engaging messaging communication.
Considered the next step in the evolution of mobile messaging, RCS offers rich functionalities to enable more engaging customer journeys. Businesses are using RCS to build strong relationships with their customers through branded two-way communications.
RCS-enabled A2P communications is known as RCS business messaging, and it’s used to deliver branded, interactive mobile experiences that improve and empower the ways in which people and businesses communicate.
Through a rich feature set that allows for the creation of branded messages incorporating multimedia, suggested reply buttons, barcode delivery, click-through options and more, brands now have a new way to develop relationships through two-way communication.
What’s more, this ability comes native on customer phones, not as individual apps that must be downloaded. As more native apps come pre-installed on next-generation smartphones, RCS adoption is expected to increase.
Retry refers to the process of the SMSC retrying to deliver an SMS message that failed to be delivered during a time period the message is valid, which is usually 48 hours. If a delivery of a message fails the SMSC starts a retry procedure that tries to deliver the message periodically.
Voice message delivery can also be retried during the message validity period (up to 48 hours). Retry for Voice messages is handled by Infobip based on the customer desires. Custom retry periods between the calls can be set along with the number of retry attempts.
Roaming is a term that refers to the ability of a mobile phone user to use his mobile phone for making or receiving voice calls, sending or receiving messages and data while travelling outside the coverage of his mobile service provider. The mobile phone uses the subscriber’s identity to access the network in the visited country.
Infobip's Number Lookup can help you provide roaming information for optimized routing, prevention of ATM frauds and added validation options.
RTP stands for Real-time Transport Protocol. The protocol is used for delivering audio and video over IP networks.
A Short Code is a 3-6 digit number which enables sending and receiving of SMS messages, usually in SMS sweepstakes, polling, TV voting etc. With short codes, sending and receiving messages is limited to national borders. They can be leased from mobile network operators or through specialized messaging companies that also provide consultancy and tech support.
Dedicated short codes are used by a single company, while shared ones can be used by more companies, which have their campaigns distinguished by keywords. For example, one company can use the number to receive SMS messages with the SUPPORT keyword, and the other company can use it to receive messages with the PIZZA keyword. These keywords allow the matching of inbound messages with appropriate campaigns.
Zero rated short codes
Zero rated short codes are 3 to 7 digits numbers used for 2-Way interaction between companies and their customers. With zero rated short codes end customers do not pay the price of the message they send to the company using it. For them it is totally free and the company pays for the cost of incoming SMS.
When are zero rated short codes usually used? The most important use case is the opt-out option. In different countries around the world regulation requires free opt-out option for end customers.
Zero rated short code are also used to motivate customers to leave feedback. Often companies send SMS to end customers requesting service or product ratings. In order to motivate end customers to fill out the survey and give feedback, companies stress out that the message is completely free for them.
Silent Mobile Verification is a verification service that is an integral part of Mobile Identity. It is also known as HTTP Header Enrichment.
Silent Mobile Verification works by matching the user’s phone number (MSISDN) with the Mobile Network Operator data smoothly without interupting user experience.
It is a seamless verification process that doesn’t obstruct user experience as it takes up to 5 seconds and requires no additional effort from end-users except user consent.
In addition to being used during steps such as registration or checkout, Silent Mobile Verification can also be used during the entire user journey for any mobile phone verification as an additional security check for each end-user activity."
Silent Mobile Verification is especially useful for long sessions as it significantly reduces the risk of fraudulent activities such as account takeover.
A chip card that stores the IMSI, and serves to identify the mobile subscriber and provide mobile service. A SIM card also can serve as a memory storage device, e.g. to store contacts or SMS messages, network information or apps particular to the mobile user’s mobile operator.
A service-level agreement (SLA) is an agreement between two or more parties, where one is the customer and the others are service providers and is a part of a service contract where a service is formally defined. SLA agreement defines the level of service quality, availability of service and the procedure of reporting and resolving problems that occur.
The term SLA is sometimes used to refer to the contracted delivery time (of the service or performance). Companies will include service level agreements within the terms of their contracts with customers to define the level(s) of service being sold in plain language terms.
The short message peer-to-peer protocol (SMPP) is a telecommunications industry protocol for exchanging SMS messages between SMS peer entities such as short message service centers (SMSCs).
Mobile telecom company with multiple agreements with mobile operators to send and receive data in and out of the operator's SMSC, acting as an intermediary between companies (i.e. content and brand owners) that want to interact with end users (through their mobile phones; i.e. via SMS) and mobile operators.
Since aggregators lack direct access into the SS7 protocol, SMS messages are delivered to the operator's SMSC, but not directly to the subscriber's handset. Instead, the SMSC takes care of further handling of the message through the SS7 network.
Distribution of mobile messages, including SMS and Premium SMS, directly to the end-users' mobile devices.
An SMS gateway is, generally speaking, a point of entry or exit for SMS messages. It is a network node equipped for interfacing with another network that uses the same or different protocols. The most common protocols used are SMPP, HTTP, UCP/EMI and SOAP.
A new structure for international SMS traffic, reshaping international mobile inter-operability by implementing hubs to intermediate SMS traffic and offer a larger SMS coverage. The GSM Association (GSMA) found in SMS hubbing the solution to a problem that limits the continuing growth of international SMS, culminating with the development of SMS hubbing trials in 2006, part of the Open Connectivity project.
This initiative created a new structure for international SMS interoperability, as well as developed standards and requirements that SMS hubs should follow. Regardless of the maturity of the operator or number of subscribers, each subscriber expects to be able to send an SMS to other subscribers, regardless of country and mobile network.
SMS termination refers to the delivery of an SMS message either from one mobile user to another (P2P) or from an application to a mobile user (A2P). It signifies that the message was delivered to a mobile phone user.
SMS transliteration is a process of message text conversion from one script to another. It is used, for example, to transform a text written in Greek or Cyrillic alphabet into the Latin alphabet. The transliteration process does not translate the message, it converts it into another alphabet and offers easiness of reaching an international base of users.
A short message service center (SMSC) is a mobile telecommunication networks element which stores, forwards, converts and delivers SMS messages and maintains unique timestamps in text messages.
The main duty of an SMSC is to route SMS messages and regulate the process. If the recipient is unavailable (for example, when the mobile phone is switched off), the SMSC will store the SMS message and forward the message when the recipient is available or when the message's expiry period has been exceeded.
Signaling System #7 (SS7) is a set of telephony signaling protocols which are used to set up most of the world's public switched telephone calls, also used in mobile messaging, prepaid billing and other applications.
This SMS-MT feature allows senders to manage originator and destination settings.
User Data Header (UDH) is a binary structure which may be present at the start of a short message in an SMS. It does not contain any text, but rather specifies how the message should be processed. Basically, it's a part of the SMS which tells the receiving handset what type of message being sent. This is done to ensure correct SMS message delivery.
Industry standard allowing computers to consistently represent and manipulate text expressed in any of the world's writing systems. As an SMS MT feature, it allows any content to be sent within a message.
USSD (or Unstructured Supplementary Service Data) is a communication protocol available on every GSM-enabled mobile device. It is a session-based text communication without a store-and-forward mechanism (unlike SMS) that is practical for interactive communication, such as banking or education. USSD messages can have up to 182 alphanumeric characters and the time it takes from a request to a response is 2 seconds while it takes 6 seconds for an SMS to reach a mobile phone.
USSD centre is a collection of hardware and software required to interconnect two or more disparate networks, including performing protocol conversion and is based upon the ability of the delivery agent or the source to send and receive USSD messages. It routes USSD messages from the signaling network to a service application and back and is often reffered to as „USSD gateway“.
USSD (Unstructured Supplementary Services Data) is a protocol used by GSM cellular telephones to communicate with the service provider's computers. USSD is session-based text communication protocol available on every GSM-enabled mobile device. Because there is no store-and-forward mechanism present with USSD (unlike SMS), the protocol is more practical for interactive communication, such as banking or education, establishing a real time session between mobile handset and application handling the service.
A Virtual Long Number (VLN) is a typical mobile number provided by mobile operators, consisting of 12 digits (eg. 442312345678).
They work on a country level but also work internationally and in roaming (unlike Short Code numbers), allowing businesses and institutions to build SMS interactions with end users over the SMS channel.
Also, when compared to Short Codes, VLN's are considered both less expensive and time consuming in their setup but unfortunately do not allow premium messaging services. If used internationally, higher rates may apply when sending SMS messages to the virtual long number. When used nationally, the national SMS rates apply.
Messages texted to a virtual long number can be received by different kinds of applications, and can serve as triggers for further user actions.
Virtual Long Numbers can be leased from MNOs or through messaging specialists; the latter will often provide additional supporting services and consultancy. VLNs are used in interactive SMS campaigns, TV and radio voting, SMS sweepstakes etc.
VPN or Virtual Private Network is a private network that enables users to send and receive data securely across a public network while having the benefits of a private network. It used to grant users remote access to a network as if the user was physically present at the location of the network.
VPN tunnelling is a concept that refers to sending and receiving data over a VPN securely. VPN tunnelling protocols wrap data packets and encrypt them for safe sending through the tunnel and then decipher and unwrap the data packets in order to access the original data.