WO2011026121A2 - Systèmes, procédés et produits-programmes informatiques permettant d'identifier des utilisateurs dans des réseaux de télécommunications - Google Patents
Systèmes, procédés et produits-programmes informatiques permettant d'identifier des utilisateurs dans des réseaux de télécommunications Download PDFInfo
- Publication number
- WO2011026121A2 WO2011026121A2 PCT/US2010/047362 US2010047362W WO2011026121A2 WO 2011026121 A2 WO2011026121 A2 WO 2011026121A2 US 2010047362 W US2010047362 W US 2010047362W WO 2011026121 A2 WO2011026121 A2 WO 2011026121A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- usage
- profile
- usage profile
- identity
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
Definitions
- Post-paid service the consumer is billed by the end of the month after it has used the services. Such billing scheme is possible with people with credit lines, with which the operator can build long lasting relationships.
- pre-paid schemes the user buys a service usage allowance amount in advance, and each usage is debited from this credit.
- Pre-paid is popular with people with no credit lines such as teens, tourists, or foreign citizens. Pre-paid schemes are also popular due to some advantages, including: (a) in many countries, pre-paid phone usage may be had without disclosing personal details, thereby enabling anonymity of the user; and (b) as the customer is not bounded by long term usage agreements, he has the freedom to move between operators, aiming to get the most lucrative plan available at any time.
- pre-paid billing usage In some markets, for example, Italy, and certain developing countries, as many as 80-90% of mobile customers use pre-paid schemes. In addition, several trends further strengthen the popularity of the pre-paid billing usage: (a) penetration strategies of mobile virtual network operators (MVNOs) are increasingly based on pre-paid users; (b) economic recessions may provide incentives for keeping mobile service, but containing recurring costs; and (c) handset evolution is happening at a faster pace, and post-paid plans with two-year contracts lock customers in to specific devices; however, pre-paid plans allow faster handset replacement cycles.
- MVNOs mobile virtual network operators
- pre-paid billing schemes present several challenges to operators.
- customers are anonymous, operators have a problem developing and managing relationship with them.
- anonymous customers are also harder to reach. It is also harder transforming those customers into post-paid users.
- the herein proposed systems and method may enable the user to identify customers along their appearance in the network (even with different identities). This enables the operator to develop marketing relationships with pre-paid customers, further an operator to (a) offer promotions and incentives, (b) understand customer usage patterns (since now the user's different identities are aggregated into a single identity along time, his usage patterns are more accurate), (c) provide better personalized experience, even when the customer resurfaces in the network with new identity, the operator can fetch his profile and provide him with a customized experience (as consumption patterns are known). It will be recognized that the present invention may be used to increase loyalty and higher ARPU of the pre-paid user. This translates later to higher probability that the high ARPU prepaid customer will transform to a post-paid one.
- the present invention may be used to accurately identify the high ARPU customers. Economical models have shown that it is a better strategy to keep the high ARPU customers, rather than invest in acquiring new customers.
- the present invention may be used to allow identification of post-paid users when they are using pre-paid accounts. For example, people may buy a pre-paid card when they want to have a specific anonymous usage. Providing benefits in this channel as well, helps strengthening the customer's loyalty to the brand.
- the present invention may further assist in detection and resolution of identify theft.
- fraud is not the main purpose of the present system, if an identified number resurfaces with a significantly different usage pattern, the system can point that fact to the operator, to mitigate a risk of fraud.
- the herein disclosed systems and methods may enable network operators (e.g., a mobile operator) or associated entities (e.g., marketers) to develop marketing relationships with their anonymous pre-paid users, by identifying the customers along their usage of the network even if they are appearing with different identities (MSISDN numbers). This may be done by capturing the customer's unique social, usage habits and/or geographic fingerprints. By this identification, operators can provide customized promotions and personalized services, increasing ARPU and loyalty in the competitive pre-paid market.
- network operators e.g., a mobile operator
- associated entities e.g., marketers
- Fig. 1 is a schematic flow diagram showing a method according to an embodiment of the present invention
- Fig. 2 is a block diagram of user identification as may be implemented in systems and methods according to embodiments of the invention
- Fig. 3 is a schematic diagram of a state machine that may be implemented as a system or method for identifying users of a network according to embodiments of the present invention
- Fig. 4 is a schematic illustration of a system for user identification according to embodiments of the invention.
- Fig. 5 is a schematic diagram of a batch use case according to an embodiment of the invention.
- Fig. 6 is a schematic diagram of an online pull use case according to an embodiment of the invention.
- the herein disclosed systems and methods may address and handle situations in which a prepaid user may appear and reappear in the network using different identities (e.g., different MSISDN numbers and/or different mobile devices).
- identities e.g., different MSISDN numbers and/or different mobile devices.
- a pre-paid customer buys a new prepaid phone, he may be assigned a different number (i.e., a number with which the user was not previously associated in the system), and thus, without more information, the operator cannot detect that the user is the same customer as had previously used a different number.
- the proposed systems and methods enable operators of communication networks (e.g., cellular telephony, WiFi, WiMax, etc.) to identify a pre-paid customer even despite having changed an identifying number, e.g., MSISDN.
- a service may be provided to the user based on this identification.
- the herein disclosed systems and methods implement identification of one or more identifying patterns of a user (which is usually pre-paid user, but it is clear that the invention can be extended to other types of network users as well - e.g. non-paying users, and even rough unauthorized users), also known as fingerprints.
- the fingerprints of each user are substantially unique to that user, and may be valid regardless of the identity being used by the user for communicating over the network.
- identification patterns which may be implemented in various embodiments of the invention are: (a) the people/entities with which the user is in relationship (which may be other users of the network, but also external to the network - e.g. land telephony user, internet users, and so forth); (b) consumption patterns of the user, such as interests or time of use; and (c) geographic location patterns where the user calls from, receives calls, or is otherwise connected to the network.
- the different systems and method disclosed herein aim to capture one or more identifying patterns of the user (such as but not limited to the ones disclosed above), and try to identify the user throughout his usage of the network.
- systems and methods disclosed herein may be used for the identification of multiple network usages by the same anonymous user
- the disclosure further covers systems and methods which may be used for identification of multiple network usages by single users which are not entirely anonymous.
- some users may provide partial details, but such that may not be sufficient for a certain identification of the user over different connection.
- a single user may use more that a single identifiable account (e.g. a single user using different e-mail accounts, various cellular phone numbers, etc), in which case the herein disclosed systems and methods may be used for determining that two or more identifiable accounts are used by a single entity.
- the systems and methods disclosed are not limited to those few examples.
- Figure 1 illustrate a method for identifying a user which may connect using different details at different times (e.g. a cellular telephony prepaid user), according to an embodiment of the invention.
- the method may include some or all of the following stages depicted in Fig. 1.
- information may be collected about multiple users (also referred to as customers) of one or more networks. It is noted that users of the multiple users may connect to the network through the different channels of usage.
- a fingerprint of the usage of different users may be assembled for future identification (wherein this may be carried out for all users, or only for some subgroups selected according to various selection criteria - e.g. only prepaid users, only users who are power-users, only users that talk for over one hour a day, and so forth).
- the stream of usage may be continuously monitored or sampled, in order to identify customers resurfacing with different identities, by comparing information gathered about the resurfacing customer during a later session to finger print information associated with one or more user identities. It is noted that in some cases, where the identification of the user is not clear, additional data may be actively collected to enable better comparison, and/or data may be gathered but not associated to the user identity, until a positive identification is reached (e.g., call history of that call will be logged, but geographical location will only be added to the user identity patterns when the behavioral and call records will not enable identification).
- the system calculate a similarity number, e.g., ranging from 0 to 1, and repeat a comparison with stored profiles until the similarity number reaches a similarity threshold, in which case, the highest ranking similar profile may be determined to be the user's identity.
- a similarity number e.g., ranging from 0 to 1
- the highest ranking similar profile may be determined to be the user's identity.
- a unified profile of the customer along time (e.g., including prior numbers or accounts) may be constructed to have accurate statistics.
- a service may be offered or provided to the customer based on information gathered in relation to the customer when the customer connected to the network using different identifying details than those used during to providing of the service. For example, a user who is known to make calls to certain foreign countries may be offered relevant promotions. In another example, promotions may be offered to high- frequency users to induce loyalty and keep them in the network, etc. It is noted that other than providing service to the customer based on such information gathered, other actions may be carried out as well, such as recording user calls, limiting bandwidth allocated to the user, and so forth.
- a system that implements the method may have a substantially unique leading identity associated with each user.
- This unique identifier allows managing all information around a single key. When a new number is detected as belonging to an existing user (identity), it may then be associated with this identity.
- each identity may be associated with one or more MSISDNs (mobile phone numbers).
- the above disclosed method may be implemented by a system, which includes a monitor for monitoring connections of multiple users of the network, and a processor which is configured to analyze information gathered by the monitor as disclosed in relation to the method, and to identify the recurring patterns.
- a system which includes a monitor for monitoring connections of multiple users of the network, and a processor which is configured to analyze information gathered by the monitor as disclosed in relation to the method, and to identify the recurring patterns.
- FIG. 2 illustrates is a block diagram of user identification as may be implemented in systems and methods as herein disclosed, according to an embodiment of the invention. It will be understood that different embodiments of the invention need not have every one of the shown modules. Certain exemplary aspects of the embodiments of the invention shown in Fig. 2 are described below.
- the Social Network Analysis also referred to by the acronym SNA
- SNA Social Network Analysis
- the system builds a network representing the social group of the user.
- Each node in this network represents a user, and nodes are connected by weighted edges if the people the nodes represent are communicating via some mobile channel. The more two people are communicating (like more calls or more SMSs), the weight of the edge connecting them in the network is larger.
- weights may have decay functions that govern the decreasing of the weight along time automatically according to some function. Thus, occasional, erroneous or limited scope communication between individuals is not captured in the network (and in the fingerprint).
- hubs, or popular nodes that are common to many people's peer group may be filtered out from the graph.
- the intention is to have a graph with neighborhoods (the nodes connected to each node representing the people the person is in contact with on a regular basis) as unique to each customer as possible.
- the degree of the neighborhood for a specific node is extended.
- the fingerprint may be representing not just the direct peers, but also the peers of the peers (second degree neighborhood) to find differentiating patterns.
- the SNA is maintained along time, to capture the evolving social worlds of the customer.
- Usage habits fingerprints may be used, according to an embodiment of the invention, in situations where the user cannot be identified based solely on his social fingerprint, even though it may be used in other situations as well.
- the system will include information about his usage habits to try and make his signature unique.
- Usage habits patterns may be collected, according to an embodiment of the invention, from value added services (VAS services), and include statistics on how the user is using VAS services such as MMS, SMS, WAP, Mobile Internet etc.
- VAS services value added services
- Examples for such statistics for a cellular network scenario may include: (a) consumption distribution of different services (percentage of SMS in the VAS usage, of MMS, etc.); (b) time and week day usage distribution; (c) web content types (interests as hinted by the web pages the user is browsing); (d) time to reach percentage of consumption (namely, how much time it takes the user to consume 80% of his balance); (e) pre-paid indicators such as time interval between top-ups, sum of typical top-up, etc.
- the usage habits may be a principal indicator, or they may be used secondarily to supplement or confirm one ore more other principal indicators, e.g., to confirm or deny an identification based on the social network.
- the BTS the station that the handset communicated with
- the system can capture a distribution of where a person usually makes his calls form (ride home, office, house, gym etc.). This geographical pattern is used to further differentiate between several otherwise common identities.
- the Geographic Information from the voice service may be used.
- the geographic usage may be a principal indicator or one of a number of principal indicators.
- coactivity may be used an additional measure to differentiate between identities. That is, if two nodes are considered to be the same person based on all other facets, then having those two nodes active in the same time may hint that they are two separate identities and the two will be maintain in the system as such. This is mainly important at the initial phase of a new identity which for a limited period of time resembles an existing identity. Coactivity may enable managing them as two separate identities earlier.
- Figure 3 illustrates a state machine which may be implemented either by a system or as a method, for identifying users of a network, according to an embodiment of the invention.
- a number (or other user identifier) is used for connecting of a user to network resources
- the system tries to see if it is a new number (e.g. MSISDN). If it is identified as a known active number, it is going through a filtering phase to decide if it belongs to a black list.
- a black list may include known identities that have been deemed as inappropriate for long term relationships (tourists, foreign workers, people with high complaint rate with customer care, people with poor credit risks, other forms of financial or operational risk, etc.).
- the system may permit an administrator (or administrator software) to browse this list from time to time and reconsider the status of selected blocked numbers (for example, if marketing policy has changed).
- the number is not an active one, it is moved for the identification phase. Since it is new in the system, one can assume that not enough information is available to construct a fingerprint and make a decision about its identity. Thus, the number stays in the accumulation state until the user has made enough usage of the network so a pattern is emerging. From time to time, the system tries to use the collected information to build a fingerprint that will identify the user. Once it succeeds, the system first checks the black list to see if the identity is not blocked (in case the leading identity the new number has been associated with), and if applicable, manages the number as an identified identity.
- Figure 4 illustrates a system for user identification, according to an embodiment of the invention.
- the proposed system may include some or all of the following main components (as well as possibly additional components).
- the Social Network Analysis (SNA) engine is responsible for building and maintaining the social fingerprint of the user.
- the Customer Experience Management (CEM) engine is responsible for capturing the usage patterns of the customer while using services.
- the Location Engine is responsible for building the geographic usage distribution of the calls the user is making.
- the Identity Engine manages the identity of customers. It has association between a main identity (e.g. general unique code or MSISDN) and all the MSISDN' s associated with this specific user.
- the identity engine gets its information from the SNA, CEM and Location engines.
- the Customer Browser is an application that allows the operator to browse the identities in the identify engine data base. Using query and filtering the user can digest a specific customer population viable for a promotion.
- Pre-Paid management this would be necessary to get pre-paid usage information (top-up date and time, amount etc), and to update MSISDN profiles (for example, if some benefit is to be given to the customer).
- Billing systems - part of the benefits of the system is to make focused campaigns, thus integration with the billing system to update prices and rates is necessary. Further, the billing system may act as a source for the CEM system to build the profile of the user.
- the herein disclosed methods and systems may supports one or both of the followings modes of operation - batch and real time.
- Fig. 5 depicts an example use case of batch mode.
- the system allows the operator to generate timely identification lists of Identities based on specific attributes. For example, the operator can ask the identity server to provide all customers with specific attributes like average ARPU or activity in the network for some consecutive period of time. Once this list of customers has been generated, the user send this list to other systems (marketing automation, billing etc) and the action and management of interaction with the customer is beyond the scope, or involvement of the proposed system.
- the operator would access the customer browser and ask for all customers active for the last 6 months, with an average top up sum of $60 and more than 8 top up events that are using voice, SMS and mobile internet. Let this list be deemed List A.
- the operator marketer then scans every day the list of MSISDNs that have been top-upped in that day and looks for MSISDNs that appear in List A. All customers from List A appearing for the first time after a top-up event are being sent an SMS notifying them that they got 20 minutes of air time for free.
- the proposed system is not part of identifying when a customer is active after a top-up, or delegating the marketing campaign to him.
- the batch scenario has the benefits of simple and cheaper integration in comparison with the real time version.
- Fig. 6 depicts an exemplary use case for real time mode.
- systems within the operator can access the identity server at any time to gain insight about a specific entity identity/identifier (e.g. MSISDN).
- a specific entity identity/identifier e.g. MSISDN
- a marketer can access the marketing automation system and select a group of customers. This marketing automation is integrated with the proposed system, so all customer data is up to date.
- the marketer defines a campaign, and the list of the target customers is maintained in the marketing automation system.
- the marketing automation system would like to issue the daily promotion, it can access the identity system in real time to see if more customers have been identified as viable for the campaign. Further, when identifying a specific MSISDN it can approach the identity server for mapping for the main identity.
- the operator systems work with the proposed system in iterative mode in contrast to the batch scenario where beyond a one-time generation of customer identities, the proposed system was not part of the promotion life cycle.
- Different systems as disclosed above may include such computer readable media, and/or may be configured to read such media to acquire the instructions, and to execute the read instructions by one or more processors of the system.
Landscapes
- Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Economics (AREA)
- Game Theory and Decision Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Marketing (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
La présente invention concerne un procédé et un système destinés à déterminer lidentité dun utilisateur sur un réseau qui autrement ne permet pas didentifier lutilisateur en tant que tel, par exemple, un utilisateur de téléphone mobile prépayé. Selon un mode de réalisation de linvention, une pluralité de profils dutilisateur peuvent être constitués, en fonction de la consommation de communications sur le réseau, et pour les nouveaux utilisateurs, un profil dutilisation peut être constitué et comparé aux profils dutilisateur précédemment constitués. En fonction du degré de similitude, on peut déterminer que cet utilisateur correspond à un utilisateur ayant précédemment utilisé le système. Différents profils dutilisation peuvent être utilisés, comprenant, par exemple, réseau social, utilisation géographique, activité de compte, etc.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US23825609P | 2009-08-31 | 2009-08-31 | |
US61/238,256 | 2009-08-31 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2011026121A2 true WO2011026121A2 (fr) | 2011-03-03 |
WO2011026121A3 WO2011026121A3 (fr) | 2011-04-21 |
Family
ID=43628708
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2010/047362 WO2011026121A2 (fr) | 2009-08-31 | 2010-08-31 | Systèmes, procédés et produits-programmes informatiques permettant d'identifier des utilisateurs dans des réseaux de télécommunications |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2011026121A2 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10505944B2 (en) | 2017-06-04 | 2019-12-10 | International Business Machines Corporation | Automated granting of access to networks and services for pre-paid devices |
CN113076776A (zh) * | 2020-01-03 | 2021-07-06 | 中国移动通信集团广东有限公司 | 通信号码的识别方法、装置和电子设备 |
US11188864B2 (en) | 2016-06-27 | 2021-11-30 | International Business Machines Corporation | Calculating an expertise score from aggregated employee data |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020116282A1 (en) * | 2000-05-23 | 2002-08-22 | Martin Jeffrey W. | Methods and systems for correlating consumption information with distribution entities |
US20080220760A1 (en) * | 2006-09-14 | 2008-09-11 | Shah Ullah | Methods and systems for usage profiling associated with device specific identifiers |
-
2010
- 2010-08-31 WO PCT/US2010/047362 patent/WO2011026121A2/fr active Application Filing
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11188864B2 (en) | 2016-06-27 | 2021-11-30 | International Business Machines Corporation | Calculating an expertise score from aggregated employee data |
US10505944B2 (en) | 2017-06-04 | 2019-12-10 | International Business Machines Corporation | Automated granting of access to networks and services for pre-paid devices |
US10505945B2 (en) | 2017-06-04 | 2019-12-10 | International Business Machines Corporation | Automated granting of access to networks and services for pre-paid devices |
CN113076776A (zh) * | 2020-01-03 | 2021-07-06 | 中国移动通信集团广东有限公司 | 通信号码的识别方法、装置和电子设备 |
Also Published As
Publication number | Publication date |
---|---|
WO2011026121A3 (fr) | 2011-04-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Phadke et al. | Prediction of subscriber churn using social network analysis | |
US9319535B2 (en) | Method and apparatus to collect, analyze, and utilize network data | |
KR102244009B1 (ko) | 스마트 장치 동작과 요금의 분류를 위한 시스템, 스마트 장치 및 방법 | |
CA2746049C (fr) | Procede informatise, systeme et produit-programme informatiques pour la tarification des telecommunications | |
US8554626B2 (en) | Mobile advertisement and marketing integration with business process and workflow systems | |
US20160225000A1 (en) | Consent valuation | |
US10264139B2 (en) | Cost allocation for derived data usage | |
US20060019632A1 (en) | Dedicated wireless device business method | |
US20150312127A1 (en) | Data Usage Analysis and Reporting | |
WO2009072741A1 (fr) | Procédé publicitaire, système publicitaire de service de mise en réseau social (sns) et support d'enregistrement | |
US9596358B2 (en) | System and method for corporate mobile subscription management | |
US10743249B2 (en) | Methods and apparatus for generating recommended changes to communication behaviors | |
US20110244826A1 (en) | Mobile communication plan offerings | |
JP5198586B2 (ja) | 電話通信データを処理するための方法および推論エンジン | |
US20110106579A1 (en) | System and Method of Management and Reduction of Subscriber Churn in Telecommunications Networks | |
Xevelonakis et al. | The impact of social network-based segmentation on customer loyalty in the telecommunication industry | |
WO2011026121A2 (fr) | Systèmes, procédés et produits-programmes informatiques permettant d'identifier des utilisateurs dans des réseaux de télécommunications | |
Hosein et al. | Soft-churn: Optimal switching between prepaid data subscriptions on e-sim support smartphones | |
Karikoski et al. | Substitution in smartphone communication services | |
KR101687012B1 (ko) | 고객 가치 기반 고객 교환 시스템 및 그 방법 | |
CA2885035A1 (fr) | Analyse d'utilisation de donnees et production de rapport | |
Bonhomme | How to get the most from WeChat | |
US10306074B2 (en) | System and method for generating telecom service access credit | |
CN115348544B (zh) | 异网用户定位方法、终端设备及存储介质 | |
Rosas et al. | Telecommunications fraud: problem analysis-an agent-based KDD perspective |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10812765 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10812765 Country of ref document: EP Kind code of ref document: A2 |