09.09.2024
Home / Instructions / What is mobile billing? How does mobile operator billing work? Billing in banking: a payment system convenient for everyone

What is mobile billing? How does mobile operator billing work? Billing in banking: a payment system convenient for everyone

In the section Billing you can:

  • change the tariff;
  • connect additional options;
  • replenish balance;
  • activate promotional codes;
  • keep track of accounts;
  • view payment history;
  • manage payment methods.

Login and navigation

Go to section Billing possible in 4 ways:

1. After pressing the buttonRate… :


2. After selecting a menu item[ Login ] Billing :



3. After pressing the button Top up balance , if due to the expiration of the tariff, access to sections is blocked:


When you enter the section, it opens home page Balance :


Account balance

The account balance is tied to the user's account and is common to his projects.Current funds in the account are displayed in the block Balance. The cost of the tariff is debited from the account once a day.

If the account balance approaches zero, Roistat sends a notification letter to email and SMS to the phone number specified in your account.

Tariff debits are stopped and Roistat functions are blocked if the account balance is less than zero (this is possible when using).

You can transfer funds between accounts. To transfer funds from your account to another account:

Promo code

The bonus promotional code is indicated in the upper right corner in the corresponding field and is activated using the button Activate :


If the correct promotional code is entered, the system will request confirmation of the transaction. To cancel the operation, press the button Return :


If an incorrect promotional code is entered, the system will report an error. To re-enter the promotional code, click the button Return :

Service management

Tariffs and services are displayed on the tab Balance in the block Cost details :


View and change the tariff

The name of the tariff and its daily cost are displayed in the line Rate:… .

To view the conditions of all tariffs, click on this line. For each tariff, the following parameters are displayed:

  • cost per day;
  • list of included options;
  • maximum number of visits per month;
  • maximum number of projects per month.

The tariff activated for your account is marked as Current tariff.

To select a different tariff, click the button Choose .

View and select options

The number of connected options and their total cost per day are displayed in the line Additional options .

To view all options, click on this line.

Those options that are included in the current tariff are marked included in the tariff .

Other options are available for connection using the button connect . To disable these options, click the button disable .

Details of costs for the service Number tracking

The number of numbers being tracked and the daily subscription fee are displayed in the line Call tracking .

When you click on this line a duplicate line will appear Subscription fee :


Relevant projects.

Details of costs for the service Call back

The amount of the daily subscription fee is displayed in the line Call back.

When you click on this line a duplicate line will appear Subscription fee :


More detailed information information about this service is in the section relevant projects.

Total amount for the day

The daily cost of the selected tariff and services is calculated automatically and displayed in the line Amount for today :


Payment and balance replenishment

You can pay for services or deposit money into your account on the tab Balance by pressing the button Top up balance :


or on the tab:


After pressing the button Top up balance The payment parameters window will open:



The minimum payment amount is 5000 rubles.

Payment for services and replenishment of balance are possible in three ways:

After payment by bank card, this card will be saved as the last payment method to make future payments more convenient.

Cashless payment

When choosing a non-cash payment method, you can:

    request an invoice by email- for this in the field Send by email enter the email address to which the invoice will be sent and click the button Proceed to payment :


    if automatic selection of payment method is configured, request an invoice by email without entering an address and press the button Top up :



    download the invoice immediately– to do this, click the link download invoice


Money is not transferred automatically after payment. The payment first arrives in the company's bank account (this may take several days), and then the account balance is replenished.

To speed up the process, you can send a scanned copy of the payment document to technical support, which will speed up the transfer of money to your account.

Payment by credit card via the Internet

To pay by credit card via the Internet, set the switch to the appropriate position and press the button Proceed to payment


The money is credited to your account immediately after you confirm the transaction.

Payment using Yandex.Money, Qiwi Wallet, WebMoney

For payment using Yandex.Money, Qiwi Wallet, WebMoney set the switch to the appropriate position and press the button Proceed to payment . After this, you will be automatically redirected to the payment page:



Payment via Paypal

To pay using the electronic payment system PayPal, set the switch to the appropriate position and click the button Proceed to payment . After this, you will be automatically redirected to the payment page:


Payment via PayOnline

To pay using the PayOnline electronic payment system, set the switch to the appropriate position and press the buttonProceed to payment . After this, you will be automatically redirected to the payment page:

The money is credited to your account immediately after you confirm the payment transaction.

Account history

An electronic invoice is created automatically after you go to the payment page, request an email, or click a link With download account .

Created invoices are displayed on the tab Accounts and are divided into 3 categories:

  • All – all user accounts;
  • Unpaid – accounts for which there have been no deposits yet;
  • Paid – accounts with completed transactions.


Each account corresponds to one line in the tabular section:


The table displays the following account information:

    Number– account number;

    Creation date – date of account creation;

    Sum – amount to be paid;

    Status – current payment status: New or Paid;

    Date of status change – date last change account status;

    Payment method – method of payment of the invoice. There are 4 possible statuses:

    • Invoice not paid – set for unpaid invoices;

      Sending an invoice by email – set for paid invoices using non-cash payment method;

      Plastic card (Visa, MasterCard) – set for paid invoices when paying by credit card via the Internet;

      Via PayPal – set for paid invoices when paying via PayPal.

Unpaid invoices can be paid on this tab. Opposite such accounts on the right are displayed:



Payment history

All payment transactions are recorded and displayed on the tab Payment history .

Payments can be grouped by period:

The table displays the following account information:

    Date – day of the month on which at least 1 payment transaction was carried out;

    Operation – type of payment transaction;

    Amount, r . – payment amount in rubles;

    Remainder, p . – account balance in rubles.

The data in the table can be sorted by any of the columns (both ascending and descending values).

Payment settings

To speed up the payment process and replenish your balance, you can:

    tune automatic account replenishment to prevent the tariff or service from being disconnected due to insufficient funds;


These parameters are configured on the tab Payment settings

Automatic account replenishment

To complete setting up automatic replenishment, save your payment method.

Minimum period between automatic account replenishment daily.

Saving a payment method

In the block Payment methodselect payment method:

  • Plastic card:
    1. Set the switch Plastic card.
    2. Click the button Choose.
      You will be directed to the Yandex Cashier page, where you need to enter the details of the card from which funds will be debited. To save the card data, a test payment of 10 rubles will be made.
  • Sending an invoice by email.
    1. Set the switch Sending an invoice by email.
    2. Enter your email address. You can specify several email addresses ([email protected] , [email protected] etc.)
      Bank transfer invoices will be sent to the email addresses entered.



To change your email address or credit card information:


Changing or deleting a payment method

To change or delete established method payment, click on the corresponding icons:


Advertising budget limit

Roistat tariffs have a limit on the advertising budget. If the user has exceeded the advertising spending limit, Roistat will transfer him to a suitable tariff with the wording “Marketing spending limit exceeded.”

What happens if you don’t top up your Roistat account?

If for a long time do not replenish your Roistat account, then the money on your balance will run out.

What will happen to the project:

Integrations with CRMAnalyticsCall trackingEmail trackingLead catcherSplit testingEventsBid management
  1. Applications from CRM will be collected.
  2. Applications from CRM will be transmitted for another 14 days.
  3. After 14 days, you will receive a notification that applications have stopped being sent to the CRM system.
You cannot view the report.

It will be impossible to add new numbers (both your own numbers and numbers from Roistat).

Will stop workingWill stop workingWill stop workingWill stop workingWill stop working

Analytics will be collected in the project.The numbers will be assigned to the project for another 7 days.





After paying for the service, analytics will be available for the days when the balance was negative. To open this data, you will need to pay for the selected period.A room rental fee will apply. If you do not top up your balance within seven days, the numbers will be disconnected for non-payment and removed from the project. These numbers can be returned to the project within 14 days after they are disabled.




Top up your account on time!

  • No labels

1. Technical capabilities of identifying the location of a mobile subscriber cellular communications.

The presence of a mobile cell phone, which can be considered a radio beacon, often allows one to determine both the current location of its owner and trace his previous movements in space.

If a subscriber uses cellular communication services (makes or receives calls, sends SMS messages, uses WAP, GPRS), information about his actions is saved as a file in the memory of the billing server. IN this file contains the following information: subscriber's SIM card number, time and duration of the call, base station (BS) number, base station sector number (if there are sectors).

If the subscriber moved during the connection and his service was transferred from one BS to another, the file may contain a list of several BS numbers. The accuracy of determining the subscriber's location in this case depends on a number of factors: the topography of the area (forest, hills, buildings, etc.), the presence of interference and reflections from buildings, the position of base stations, the number of phones currently operating in a given cell. The size of the cell in which the subscriber is located is also of great importance, so the accuracy of determining his position in the city is much higher than in rural areas.

In a city, a base station can have up to three sectors, in which case it is possible to determine in which direction the signal was. In the case of circular radiation from the base station, it is not possible to accurately determine the direction of the signal (typical for rural areas). The accuracy of this determination depends on the size of the coverage area of ​​the base station: in the best case, the error can be up to 150 meters (picocell), in the worst - up to 30 kilometers (using the example of a GSM cellular network, in other networks the parameters for determining the location of the subscriber may differ).

Analysis of data in the subscriber's communication sessions with various base stations (through which and to which base station the call was transmitted, date of the call, etc.) allows you to restore all the subscriber's movements in the past. Such data is automatically registered in the billing servers of companies providing cellular communication services, since payment for services is based on the duration of use of the system.

This method of reconstructing a subscriber's movement pattern is widely used by law enforcement agencies during investigations, since it makes it possible to reconstruct, down to the minute, where the suspect was, who he met (if the second person also used a cell phone), how long the meeting took place, or whether the suspect was near the place crime at the time of its commission.

In practice, the signal parameters at the receiving location always depend on many factors. So, for example, in dense urban areas, multi-beam reception always takes place, in which both the handset and the base station can receive both a direct radio signal and one reflected from the walls of houses and other objects (a person can be close to one base station , but is served by the reflected signal of another, more distant one). In this regard, the amplitude of the signals, their angle of arrival and the value of the base-tube distance can continuously change within very large limits, and determining the actual coordinates becomes almost impossible. In rural areas, telephone signal reception is usually carried out by one station with a circular direction, which eliminates the possibility of determining the direction and makes data on the subscriber’s distance very inaccurate (with an error of up to 30 km).

Thus, the method of identifying a subscriber’s location based on data from a cellular communication system does not guarantee an accurate determination of the subscriber’s location, because the correctness of the data obtained depends on a significant number of factors. Nevertheless, this method can be a significant help in carrying out operational search activities and investigative actions, especially when investigating crimes committed by a group of persons.

Technical capabilities for using transcripts of telephone numbers, SIM cards, IP telephony, the Internet, etc. when investigating criminal cases.

In particular, there is a legal basis for the use of automated information system technical means to support operational-search activities" (AIS SORM). This AIS is used when conducting operational-search activities carried out through electronic communication channels, and also provides control and recording of negotiations.

“Considering the possibilities of using SORM in the investigation of serious and especially serious crimes, it should be noted that this system automatic mode provides the ability to record and control information transmitted and received by any user (subscriber) in the process of providing any telecommunication services, including the Internet. In other words, with the help of SORM, any informative emissions, transmissions or receptions of signs, voice signals, written text, images, sounds or messages of any kind can be monitored and recorded via radio, wired, optical and other electromagnetic systems (Article 2 of the Federal Law " About communication"). At the same time, SORM allows you not only to record information about messages and subscribers who sent and received them, but also to control - to filter out the necessary conversations (messages) according to various technical and lexical parameters (phone number, IP address, IMEI identifier of a cellular radiotelephone, call sign , keywords, phrases, etc.) specified in the investigator’s resolution. For these purposes, various specifications of SORM hardware and software systems are used, adapted to the corresponding types of telecommunications (technological systems, channels and means of communication, message formats and standards).

From a technical point of view, SORM includes: a set of hardware and software located on the node(s) of the documentary telecommunications network, including the Internet; a complex of hardware and software located at a remote control point; data transmission channel(s), providing (e) communication between the first two complexes in a secure mode.

In other words, SORM consists of 2 sets of special software and hardware devices, one of which is installed at the operator (provider) of telecommunication services (Internet), and the other - on the central SORM control panel located at a remote facility - a single central control point.”

GSM

In 1982, the European Conference of Postal and Telecommunications Administrations organized a group called GSM to develop common technical specifications for the first digital mobile network. The implementation of the standard began in 1991. Voice transmission in this network is carried out in digital form. The transmitting and receiving frequencies in the mobile and base stations can change 217 times per second. The GSM standard achieves high degree security of message transmission by encrypting messages using a public key algorithm.

Functionally, the GSM network consists of a mobile switching center, which switches the mobile network with the fixed network or metropolitan network, as well as between mobile subscribers. In addition, the center generates data on conversations and sends them to the billing center, which manages the procedures for registering the subscriber's location and base stations. The movement register and position register store information about the location of the mobile subscriber. These registers contain international number IMEI, which is used to identify the mobile station.

The authentication center houses equipment that verifies the identity of the subscriber. The Equipment Identification Register contains three lists: white (authorized mobile stations), black (phones stolen or subscribers denied service) and gray list (subscribers having equipment problems).

Authentication equipment is rarely used in Russia.

Base station

The area covered by the GSM network is divided into cells, each of which is served by a base transceiver station. A base station typically has from 2 to 6 transmitters, which have antennas with a radiation pattern (AP) of 120 degrees and uniformly cover the area. In sparsely populated areas, 900 MHz stations are used, with a coverage area of ​​400 to 35 km. In densely populated areas, 1800 MHz stations can be additionally installed, having a coverage area from 200 m to 1.5 km. This is due to the propagation of radio waves, the number of subscribers and other technical reasons.

Determining the location (positioning) of the subscriber

Positioning of moving objects is carried out by transmitting special sequences of signals to the network.

Available technical feasibility determine the subscriber's current position and the subscriber's movement in the past. The current situation can be revealed in two ways. The first of these is the method of triangulation (direction finding) from three points. The second method is through the computer of the communication company, which constantly records where a particular subscriber is located in at the moment time even if he is not talking (using identifying service signals automatically transmitted by the phone to the base station). The accuracy of determining the subscriber's location in this case depends on a number of factors: rough terrain, the presence of interference and reflections from buildings, the position of base stations, the number of phones currently operating in a given cell. The size of the cell in which the subscriber is located is also of great importance, so the accuracy of determining his location in the city is much higher than in rural areas.

Analysis of data on a subscriber's communication sessions with various base stations makes it possible to restore all the subscriber's movements in the past. Such data is automatically registered in the companies' computers, since payment for their services is based on long-term use of the communication system. Depending on the type of telecom operator, such information is stored from 60 days to 7 years.

An example is the criminal case charging Chernov and Kuharkin, employees of the Internal Affairs Directorate for the Arkhangelsk Region, with extortion and receipt of a large-scale bribe. During the investigation, it was established that they received the first part of the bribe from the applicant six months before they were detained while receiving the second part of the required amount. During the investigation, Kuharkin put forward an alibi that he could not participate in receiving the first part of the money, since in the period from February 27 to March 10, 2007, he was on a business trip in the Arkhangelsk region, which was confirmed by travel documents. The investigation, by order of the court, obtained statistics of connections on Kuharkin’s phone during this period, indicating base stations. When analyzing statistics, it was established that Kuharkin was indeed in the Vinogradovsky district of the Arkhangelsk region until March 6, 2007, as evidenced by the base stations with which the phone contacted. On March 6, 2007, the movement of a subscriber along the M-8 highway from the village of Dvinskoy Bereznik to Arkhangelsk was established, as well as subsequent calls to the subscriber from the territory of Arkhangelsk from March 6 to March 11, 2007. In addition, by analyzing the statistics of Kukharkin’s connections during the specified period, witnesses were identified who confirmed the fact of Kukharkin’s passage to Arkhangelsk with a stop and repair of the car in the village of Brin-Navolok, and also a resident of Arkhangelsk was identified, with whom Kukharkin spent the night on the night of 6 as of March 7, 2007. The accused's alibi was refuted.

Let's consider technologies for determining the location of a subscriber in relation to the GSM standard.

Positioning by Cell Id

This is the simplest technology for determining the approximate position of a subscriber using a cell identifier (Cell Identifi), based on the fact that at the time of localization or conversation, the mobile station communicates with the network and exchanges service information.

Positioning by arrival time

This technology is based on analyzing the measurement of the time period during which a signal from a mobile station reaches at least three base stations equipped with location determination units. In this case, a special computer collects the received information and calculates the subscriber’s location using the triangulation (direction finding) method.

This method gives high performance, but due to the high cost and increased network load, it has not been widely used.

Positioning using GPS system

The technology is based on the use of the GPS satellite positioning system and provides accuracy in determining the location of the subscriber up to 10 meters in open areas and up to tens of meters in a room with windows. The accuracy of the determination decreases if the equipment “does not see” four satellites. To use this technology, a mobile receiver must be equipped with a GPS receiver.

Positioning using time difference

The technology is much like time-of-arrival positioning. The mobile station plays a more active role, measuring the signal travel time to it from one base station equipped with a special unit, and compares it with the corresponding signal travel time from at least two more stations. The distance between the base blocks is known and the travel time of signals from each of them is known. From the mobile phone, information is transferred to the network to a special computer, which performs the appropriate calculations.

SIM card

SIM is a standard subscriber authentication module. SIM is a chip in which an international identification number - IMSI, its own individual authentication key - K and an authentication algorithm are stitched. The SIM card has memory for notebook, designed for 100 or more subscribers. To ensure security functions, the SIM card is assigned certain codes. Using the information stored in the SIM card, as a result of mutual data exchange between the mobile station and the network, a full authentication cycle is carried out and the subscriber's access to the network is allowed. The verification procedure is implemented as follows: the network transmits the number to the mobile station, the response is calculated in the SIM card, which is transmitted to the network and compared with the correct solution generated in a special module of the switching subsystem - the authentication center.

2.1. Collection of information about the circumstances of the crime committed

a) witnesses and eyewitnesses of the crime are identified who could have seen persons using mobile communications on the eve of the commission of the crime, as well as before or after the commission of the crime. During the survey, attention is paid to the following details: what kind of negotiations were carried out (incoming or outgoing connections), the number of connections, and also at what time these connections were made;

b) the scene of the incident is linked to objects and roads adjacent to the scene of the incident, and a detailed diagram is drawn up, oriented by geographic coordinates;

c) in rural areas or in areas remote from large populated areas, it is determined which of the cellular operators has the most stable signal reception network in this territory.

When committing a crime involving the kidnapping of a person (with a subsequent demand for ransom), as well as in cases where it is impossible to establish the exact location of the crime, it is advisable to carry out such an operational-search activity as monitoring technical communication channels (hereinafter referred to as CTCC) in relation to the subscriber who made telephone connections, indicating the time of interest. Moreover, if the mobile phone was used by an unidentified person, then the requested period of time is calculated from the moment the contract for the provision of services was concluded mobile communications GSM standard up to 180 days; if the mobile phone belongs to the victim, then the requested period of time is calculated from the moment the first ransom demand is presented to 180 days. Carrying out monitoring of technical communication channels as an operational investigative measure complies with the legislation in force in the Russian Federation on operational investigative activities (see paragraph 9 and paragraph 11 of Article 6 Federal Law“On operational investigative activities” dated August 12, 1995 No. 144-FZ).

When carrying out this activity, along with information about connections, it is also necessary to obtain information about the identification number of the mobile radiotelephone - IMEI and the numbers of base stations of cellular operators at which the subscribers of interest were registered. This need is due to questions that may arise in subsequent investigative actions and operational investigative activities:

1/ using the IMEI number, you can determine the model of the radiotelephone used, which subsequently, when the defendants are detained and their existing radiotelephones are confiscated, can be used for proof purposes in the investigation of a criminal case:

In this case, value 1 (serial number) when registering a switched-on radiotelephone and replacing the SIM card remains unchanged, since it is strictly individual for each mobile radiotelephone, and values ​​2 and 3 are stored in the memory of the SIM card; they are also strictly individual for the subscriber and change when every SIM card replacement;

2/ often, persons of operational interest, in order to prevent intelligence officers from eavesdropping on conversations, use several SIM cards. If the IMEI is known, the use of different SIM cards by the defendants will not be a significant obstacle when conducting wiretapping of telephone conversations of accomplices in the crime;

3/ information about the numbers of base stations at which the mobile radiotelephone was registered helps to establish the location of the person involved, the route of his movement, as well as the vehicle used.

2.2. Analysis of received information in order to establish the ownership of radiotelephones, the persons using them, as well as their connections

The information obtained during the operational-search activities of the KTKS is large in volume and requires painstaking work to isolate from the entire mass of records only those that are of operational interest.

When carrying out such activities, it is necessary to reduce the requested time of connections to a minimum.

To establish the ownership of radiotelephones, it is advisable to carry out measures to verify their owners according to all available operational records of the ATC, using the forces and means of operational services, to carry out operational measures at the place of residence of the persons involved, as well as operational and technical measures for the identified means of communication.

Several people often take part in the commission of such particularly serious crimes as murders, and they can actively use mobile communications.

To ensure that the information obtained about the defendants’ conversations on mobile phones is used in the investigation process, when conducting searches at their place of residence, one should strive to detect and seize the following items: contracts for the provision of cellular communication services, SIM cards, express payment cards, empty boxes from mobile radiotelephones , radiotelephones themselves (even if they are not working properly or their components). All this can be evidence in a criminal case.

Thus, it should be taken into account that the study of billing information relating to the connections of both criminal competitors and potential victims of crime, as well as negotiations of law enforcement officials, may also come to the attention of representatives of criminal groups.

Let's consider some possibilities of using billing in the detection and investigation of grave and especially grave crimes committed in complicity, but we should not forget that when collecting and analyzing information about the use of mobile cellular communications by persons involved, the main principles of work in the investigation process are: respect for rights and freedoms person and citizen, respect for the rule of law, secrecy, compliance with secrecy.

An analysis of the crimes committed shows that during their preparation and commission, accomplices actively use mobile means of communication. To identify persons involved in crimes and using high-tech mobile communications, the following recommendations may be useful:

1) receiving billing data about subscriber connections through mobile operators, linked to the base station and indicating individual identification numbers;

2) analytically identifying cellular subscribers who may be involved in the commission of the crimes under investigation;

3) based on the results of the analysis, the orientation of operational units to carry out actions in order to detect and detain persons involved in committing crimes.

The frequency-territorial plan of the distribution network of communication facilities allows you to establish the geographical coordinates and installation location of the base station.

The process of obtaining billing information about connections of mobile cellular subscribers indicating the BS, their processing and analysis is as follows:

1/ Based on available information about the location of the crime, the initiator requests the number of the base station serving this territory (to draw up the appropriate resolution and obtain a court decision).

2/ Cellular operators are sent a request to provide billing information about subscriber connections for a certain period of time, linked to the base station and indicating the IMEI of subscribers.

3/ We get billing in the following form: type account, telephone number of subscriber A, dialed sequence of subscriber B, date and time of the start of the connection, duration, IMEI, data from the base station of subscriber A (at the beginning of the conversation), data from the base station of subscriber A (at the end of the conversation), data from the base station of subscriber B (at at the beginning of the conversation), data from the base station of subscriber A (at the end of the conversation).

4/ Search for matches by place and time.

5/ Orienting operational units to take action against identified subscribers who may be involved in the commission of a crime.

If the statistics were obtained by the operational services within the framework of the Law “On Operational Investigation”, then there is a need to obtain these statistics within the framework of the Code of Criminal Procedure of the Russian Federation by applying to the court with petitions for permission to monitor and record telephone conversations. To do this, it is necessary to request from the employees providing operational support in the case a certificate of the results of the analysis of statistics of connections of the persons of interest. Having received a court order, you can instruct the investigative body to obtain statistics from the cellular operator. After receiving the statistics, analyze and examine them, drawing up a protocol in which it is necessary to reflect all the points of interest to the investigation.

A positive example of conducting an in-depth analysis of telephone connection statistics can be a criminal case of murder 3. with signs of an order. During the initial investigative actions, it was established that the victim had been followed for a long time, and therefore it was assumed that the criminals could use mobile phones to communicate with each other. CID officers analyzed all calls made in the coverage area of ​​the base station, in the coverage area of ​​which the crime scene was located. In addition, there was operational information that the crime could have been committed by residents of other regions of the country, in particular the Vologda region. A huge amount of information was processed six months before the crime was committed. In parallel with this, the statistics of the connections of V., suspected of organizing the crime, were analyzed. When comparing telephone numbers it was established that V. several times connected with telephone numbers of subscribers who were several times in the area of ​​coverage of the base station sector covering the crime scene. These phones belonged to residents of Vologda. Having received statistics of connections of the specified phone numbers, they were established Phone IMEI, in which SIM card data was used, as well as numbers of other SIM cards used in these phones. When receiving and studying the statistics of connections of other numbers, it was found that subscribers using SIM card data were constantly in Vologda, but periodically came to Arkhangelsk, where they stayed for 10 days, moving around the city. It was established that the subscribers were in the coverage areas of base stations covering the crime scene, as well as establishments visited by the victim. After studying the statistics, the identities of the subscribers were established. They were subsequently detained and charged with murder for hire. Connection statistics served as one of the pieces of evidence exposing those responsible for organizing and committing a particularly serious crime.

Department of Criminalistics of the Investigation Department

Investigative Committee of the Russian Federationin the Arkhangelsk region

The use of these methodological recommendations, along with the investigation, will allow the defense to prove the innocence of its client, to convict a person of perjury, which law enforcement agencies do not hesitate to involve as the only opportunity to achieve a guilty verdict.

Contacts:

7 937 1111 777 (24 hours)

[email protected]

Mari El, Yoshkar-Ola, st. Chekhova, 70, office 311 (Beryozka)

Billing in this sense refers to a whole complex of operations, which requires software and hardware, as well as legal and banking support for all payment acceptance procedures. Therefore, only large providers of any services organize their own billing, and most companies and individuals use the services of specialized billing companies. The basic billing process is to measure the number of services issued to a user. If this is access to the Internet or talking on the phone, then software the company providing this service, call time or time spent on the global network. And, for example, when purchasing books, programs or access to a paid site on the Internet, it is not the time, but the number of units purchased. The billing company's software then automatically calculates the cost of such a service based on the rates entered into the program. In the same automatic mode, according to a pre-entered schedule, the program issues an invoice to the buyer for payment for the purchased services, and transfers the proceeds to the seller, deducting the agreed payment for the operation of this system. The receipt of money from customers is also taken into account by the billing center software package. In our modern computerized life, every day an increasing number of private entrepreneurs and companies begin to provide paid services using electronic payment systems. Therefore, there is growing interest in billing companies that take on the technical part of this complex process described above. There are already several dozen such companies, and if you decide, for example, to sell your own product via the Internet, you will have to spend some time choosing billing. They have to compete with each other, creating more and more simple ways connecting their systems to any business project and more favorable service conditions, so there is no clear leader. When choosing a billing company, the first thing you should pay attention to is the payment methods it can provide to your future clients. The maximum set includes up to a dozen electronic payment systems (Webmoney, Yandex-money, PayPal, etc.), several international systems serving credit cards (Visa, MasterCard, American Express, Cirrus Maestro, etc.). Payment option bank transfer, check, call to a paid mobile number is also included in the range of services of billing companies. Others important characteristics When choosing, you should consider the cost of the company’s services, its reliability (good business history), and the availability of technical support.

Billing is an automated process that uses professional software. It analyzes how the signal passes through each cell, then it is sorted and calculated what the cost of services will be for a specific owner. It is telephone billing that generates payment for telephone communication. After the call, he writes off as much money as indicated in your tariff plan.

Billing systems

Mobile phone billing is a complex process that requires modern, high-quality and powerful tools. Software, banking and legal support are components of new technologies. It is because of this that the phone billing program only exists in big companies who are engaged in e-commerce and, of course, in regional cellular companies.

The function of this new system is that it calculates the price for mobile communication services separately for each person. Programs save information about the time when the user called, the duration and other characteristics of conversations for a certain period (for a year or six months). Phone billing involves professional software that is used in the accounting calculations of telecommunications operators.

Load distribution

As a rule, mobile operators cooperate with each other. They install one station and use it together without spending additional money on software and Typically, in each city, one operator installs a separate tower for itself. In rural areas and highways, several companies use one. There will be only one owner of this mobile station, but other operators pay him for rent, its cost is calculated based on the number of calls.

Internet traffic is also handled by billing systems. In this case, the subscriber is charged at a separate rate. Each company is different. In one, you need to pay for the time spent on the Internet, in the other, for transmitted and received information packets.

Billing functions

Phone billing is based on a fairly simple principle. The switching node records all data, namely the duration and characteristics of the call. Then all the information received is sent to the central station, where the calculation is made.

The software, which is installed in the central office, processes all data and monitors regulations, tariffs and prices. Phone billing contains all information about the user (tariff, availability of bonuses, prices for certain areas).

These modern databases store information about all payments made by each customer. This allows you to calculate withdrawals. Billing stations are equipped with high-quality and powerful computers that allow you to make calculations very quickly. Due to this, subscribers’ requests for account status receive results almost instantly.

The software also monitors the user's account status. The system has the ability to deactivate a subscriber. If a person has not topped up his account for a long time and has not used the services mobile company, then it is simply turned off.

As you may have guessed, due to billing cell phones A message pops up stating that the system cannot establish a connection with a zero account. If you top up your phone balance, you can immediately use the services; the system connects them automatically.

Most mobile operators create a feedback function. It also controls cell phone billing. With its help, by going to personal account, you can replenish, disable, connect various services, change your tariff and much more.

If you go to your website mobile operator, you will be able to see your actions for the last month using your phone billing. You can see who you had conversations with, for what duration, and how much money they charged you for it.

Additional billing options: mobile surveillance

The mobile phone that we use for communication, like a camera, video camera, beacon, has some other functions. Nowadays, most crimes are investigated using billing. This system is able to track all calls.

How can phone billing help in a murder investigation? It's simple, this system records when we log on to the Internet and where this happens, call or send SMS.

With the help of new technologies, namely billing, many high-profile crimes have already been investigated and the culprits found.

The subscriber is always available

Mobile phone is a great achievement of man, new technology, which advanced progress. Unfortunately, this technology can be used not for good, since a cell phone is a kind of radio beacon that will help track a person’s location.

As we have already found out, the entire territory where there is mobile communication is divided into cells. There are towers and special stations that have a specific address.

If you analyze the signal from a mobile phone, you can determine at what distance and where a person is (in a car, at home, on the street). It is also not difficult to determine the subscriber’s movement. You can take several towers and find out a person’s route with a small error.

Private billing

The first to use billing for investigations were private detectives. Of course, their actions violated the Criminal Code.

If it's prohibited, how did they get the information? The first way is to purchase data from employees of a mobile company. But now it’s not so simple, services have begun to struggle with information leakage.

Now, to get the data to detectives, you will need to pay $500. And in order to analyze it, to find out the movement of a person, you need to pay 1,500 dollars. In most cases, in order for a cellular company employee to become interested in this “business,” you need to constantly learn numbers in large quantities.

Another way is to ask familiar operatives to find out about mobile phone and the person to whom it belongs. But this is quite long, the investigation may drag on.

They cannot exist without billing, thanks to which bills are issued to consumers of their services and the economic component of their activities is ensured.

For billing systems in telecommunications in Russian the term is also used automated payment system (ACP), in particular, this term is used in official documents of the Russian Ministry of Communications, prescribing mandatory certification of billing systems.

Billing features

Billing functions at an enterprise are grouped into three main blocks: settlement operations, information services, and financial services.

Broadly speaking, when considering billing in integration with revenue management. Billing and revenue management ) additionally highlight such functions as guaranteeing income (eng. revenue assurance), subscriber profitability management (eng. profitability management), subscriber fraud control (eng. fraud management).

Settlement operations

The calculation operations block highlights such functions as determining consumption (for example, receiving detailed information about calls from switches, processing data from switching equipment on traffic consumption, receiving data from a mediation system), estimating consumption (determining the calculated characteristics of consumption data), aggregation estimates and formation of charges for subscribers, calculation of taxes, discounts, additional charges, adjustments, issuing invoices for payment, ensuring delivery or familiarization of subscribers with invoices for payment, managing personal accounts of subscribers.

The implementation of the calculation block can differ significantly for both different types communications and different models relationships with subscribers.

Prepaid

Prepaid (prepayment) - a model of settlements with subscribers and agents, which involves the preliminary deposit of funds into your personal account of a communication service operator, which are subsequently spent on paying for the services received. Prepaid settlement systems usually keep records in real time, directly managing the process of providing services; upon reaching the lower threshold of the amount of funds in the counterparty's account, the mode of providing services can be changed (up to complete termination). The amount of funds in the account, the duration of maintaining a positive balance, the size and regularity of receipts can serve as tariff parameters when calculating the cost, quality and quantity of services provided.

Functionality to support restriction of access to real-time communications services with a prepaid billing model is sometimes referred to as hot billing.

Postpaid

Postpaid- a payment model in which the operator first provides services to the subscriber or agent within the framework of an agreement concluded with him, and then carries out charging and issuing invoices for payment. The process of tariffing and invoicing is planned and regular and usually covers the calendar period of time specified in the contract (most often a month, sometimes a week, quarter, year). The counterparty is obliged to pay the amount of the invoice within the period of time specified in the contract; in case of late payment, the methods of working with the debtor specified in the contract are applied to him, as part of the processes for collecting receivables.

Information service

Information services include functions to support operational information about subscribers, about products and services, including their tariffs, restrictions, possible combinations, as well as configuration data about billing in general (for example, billing and billing schedules, managing subscriber notification events, auditing and aging settings information, acceptable characteristics of subscribers).

Financial services

Financial services cover the functions of payment processing, their reconciliation for issued invoices and services, management of subscriber accounts receivable and the process of collection, processing of tax data.

Billing location in the enterprise

Inter-operator billing

Transit billing

Convergent billing

Convergent billing(from lat. convergego- “bringing together”) - billing focused on issuing uniform bills to subscribers in the conditions of multi-service networks and various payment models.

Convergent billing system unifiedly processes data on a wide range of services provided, providing a single personal account and single invoices for payment for each subscriber, regardless of the set of services used by the subscriber (this can simultaneously be various services of fixed telephony, mobile communications, data transmission, television, content services), and regardless of the principle of calculating charges for them (services can be purchased either prepaid or paid according to contractual principles)

Billing systems market

The annual volume of the global billing systems market in 2007 was estimated at $6 billion, and its growth is projected to reach $7.2 billion by 2012, while the market was divided into the following components by area of ​​application:

Notes

  1. , pp. 3-5
  2. Billing. TM Forum Knowledge. TM Forum (May 17, 2011). Archived"Billing" is the group of processes and systems that are responsible for collection of appropriate usage records, determining charging and billing information, production of timely and accurate bills, for providing pre-bill use information and billing to customers, for processing their payments, and performing payment collections
  3. Ministry of Communications and Mass Communications of the Russian Federation On approval of the rules for the use of automated settlement systems (Russian). Rossvyaz (July 2, 2007). Archived from the original on August 24, 2011. Retrieved May 15, 2011.
  4. , pp. 3-7
  5. , pp. 7-13
  6. , pp. 13-14
  7. Pulkkinen, Kari Convergent charging is the route to increased competitiveness for operators. OSS/BSS Analyst (29 May 2006). Archived
  8. Törnkvist, Robert and Schubert, Ralph Ericsson convergent charging and billing. Ericsson Review Magazine. Ericsson (2009-30-01). Archived from the original on August 24, 2011. Retrieved May 16, 2011.
  9. Dinan, Michael Forecast: Global Telecom Billing to Hit $7.6 Billion in 2012 (English). TMC Network (17 October 2008). Archived from the original on August 24, 2011. Retrieved May 17, 2011.
  10. Mottishaw, Peter Billing market share report 2009. Sample pages Archived from the original on August 24, 2011. Retrieved May 17, 2011.
  11. Mottishaw, Peter Billing market share report 2009 (English). Analysis Mason (27 July 2010). Archived from the original on August 24, 2011. Retrieved May 17, 2011.

Literature

  • Hunter, Jane M. and Thiebaud, Maud E.