SMS Home Router

PA-SMS Home Router

Many mobile operators are looking to offer revenue-generating SMS Value Added Services (VAS) but cannot because they lack the ability to uniformly control all SMS traffic going to/from their subscribers. This is because of the limitation of outdated GSM routing mechanisms. SMS messages originating from foreign network operators are sent directly to the home operator’s subscribers by the foreign SMSC communicating directly with the home MSC where the subscriber is located. In doing so, the home network operator has no visibility or control over those messages and therefore unable to offer VAS like spam filtering, autoreply, auto signature, backup, copy, divert, and subsidized advertising.
PA-SMS Home Router is a standards-based solution that provides mobile operators with the ability to centralize all SMS traffic to a common routing point in the home network. It manages and controls all terminated messages from other Public Land Mobile Networks (PLMNs) to the home network in two ways:
1) “Being on the frontline of the mobile network to defend the network from entering malicious SMSs” as recommended by GSMA in IR.82 technical specification.
2) “Delivering SMS-based services properly to inbound/outbound roamers”.

This solution assists mobile operators to preserve their subscribers’ and network nodes’ information from being revealed during SMS signaling flows. It also facilitates the provisioning of innovative and attractive services for MNOs by centralizing incoming SMS traffic to supervise, manage, and manipulate it.

Key Features

  • Being designed based on 3GPP TR 23.840 standard facilitating definition of various ‘Rule-sets’ on both packets and flows before or during launching the system
  • Generating various real-time customer-defined reports in different formats
  • High capacity of processing 30000 packets per second
  • Providing a GUI that allows users to define/modify rule-sets, KPIs, and white/blacklists, as well as observing reports, events, notifications, and so on.
  • Catering real-time customized monitoring facility based on predefined KPIs and thresholds
  • Logging events, errors, and other required records
  • Filtering non-standard packets from being processed

Key Benefits

  • Increasing security of the network by hiding the network topology
  • Protecting confidential information (Subscriber’s IMSI and location information) from being disclosed
  • Decreasing network disturbance and service failure
  • Guaranteeing the high quality of service
  • Rising customer satisfaction
  • Discovering untapped revenue for operators