You are on page 1of 8

EMERGING TECHNOLOGIES & APPLICATIONS

Capacity Openness Boosts Digitization Transformation


of Telecom Operators
Jiannan Guo
China Academy of Information and Communications Technology, 52 Huayuan North Road, Haidian District, Beijing 100191, China

Abstract: With the emergence of digital I. INTRODUCTION


transformation success stories, more and more
enterprises are launching digital solutions to From the perspective of the development of
improve business efficiency or achieve opti- major industries in the world, both the infor-
mal revenue growth. The traditional commu- mation industry represented by the Internet
nication market tends to be saturated, and the and communications, and the traditional indus-
digital transformation of telecom operators is tries represented by finance and manufacturing
imminent. This article combining the devel- have entered the tide of digital innovation in
opment trend of telecom operators’ product varying degrees. Digital transformation is be-
business and the application situation of the coming the driving force for innovation in var-
pilot summarizes the innovative application ious industries. As an important breakthrough
categories that telecom operators continue to point, the digital business is a new place to
launch based on their own advantages and in compete. Internet companies have established
response to the needs of the industry. This ar- business models successfully by opening
ticle focuses on the transformation of security up their own business capabilities and core
capabilities in communication services, big resources. In order to solve the dilemma of
data, Internet of Things, artificial intelligence, traditional business growth, telecom operators
unified authentication and network informa- are opening up high-quality resources for new
tion security, and deeply analyzes the business opportunities and challenges such as 5G and
characteristics and application modes from the “Internet+”[1], accelerating the construction of
aspects of resource integration, open platform an open-minded ecosystem, sharing resources
construction, new connection construction, and capabilities, and gradually evolving into
and innovative business development. This supporters and main force of digital services.
article puts forward suggestions for the secu-
rity development of telecom operators, and II. DEVELOPMENT STATUS
provides basic research content for the subse-
quent research on the innovative application Embracing “Internet +” and empowering tra-
of telecom operators’ capability openness. ditional industries have become an strategic
Keywords: capacity openness; digital trans- choice for telecom operators. In the era of mo-
Received: Oct. 27, 2019
formation; big data; artificial intelligence; tele- bile Internet, telecom operators, which have
Revised: Jul. 24, 2020
com operators vast user resources, are not only network ac- Editor: Shangguang Wang

China Communications • November 2020 231

Authorized licensed use limited to: Universidad Nacional Abierta y a Distancia. Downloaded on April 08,2021 at 12:35:33 UTC from IEEE Xplore. Restrictions apply.
cess providers but also service providers. They terface access by encapsulating self-contained
This article focuses on have great influence and control over terminal ability, cooperation ability and integration
the transformation of manufacturing and content provision. How to ability into lightweight network remote access
security capabilities in position themselves, play a greater role and interface. It can be accessed in 15 minutes and
communication ser-
take more social responsibilities are the com- online in 1 hour. In addition, it provides timely
vices, big data, Inter-
net of Things, artificial
mon challenges faced by telecom operators. response, service and security for its partners,
intelligence, unified At the same time, telecom operators de- and provides business support for its partners
authentication and cisively seize the opportunity to advocate by providing API interfaces, SDK toolkits, and
network information and practice the capability openness strategy, H5 pages. The number of API real-time calls
security, and deeply integrate their own capabilities to provide of its communication capability openness plat-
analyzes the business
external services, continuously improve ser- form is more than 9 billion, and the number of
characteristics and
application modes
vice quality, ensure business security, and its partners is more than 30,000.
from the aspects of reduce operational risks. They are committed In the development of DICT¹ business of
resource integration, to creating flexible, convenient and mutually China Telecom, it actively responds to the digi-
open platform con- beneficial business model and further build tal and information needs of various industries.
struction, new connec- an open ecosystem of capabilities. Recently, It promotes the integration of informatization
tion construction, and
telecom operators have also signed strategic with government management and social ser-
innovative business
development.
framework agreements with governments vices, the integration of information technology
and communication companies to further with real economy, the integration of informati-
promote exchanges and cooperation in new zation with new industrialization, urbanization
areas of digitalization, and actively expand and agricultural modernization, the integration
the development space of capacity openness, of informatization with military and civilian.
technology evolution, informationization and It steadily improves the quality of service sup-
related emerging business areas. They provide ported by the transformation of various indus-
multi angle and multi-level infrastructure and tries. On the one hand, they will go all the way
digital services for the government, industry, to promote the development of digital economy
enterprises and individual users to create more in the fields of government affairs, education,
social and economic benefits. health care, industrial Internet, finance, trans-
In China Mobile, capacity openness is the portation and logistics, modern agriculture, etc.
focus of digital transformation and a new on the other hand, they have achieved fruitful
service form for users. In order to deepen the results in the fields of electronic payment,
company’s “big connection” strategy, and ac- IPTV, Internet of things, etc. In addition, there
celerate the four development steps of “seam- are more than 122 million users in the “Smart
less and worry-free big connections, smart Home Ecosphere”; there are an average of
business big data, open capabilities of large 43.41 million active users a month in the “Inter-
platforms, cooperation and win-win big ecolo- net Finance Ecosphere”; there are more than 23
gy”, the ability to open up plays an important million service users in the “DICT Ecosphere”;
role in transformation path of “from large con- there are more than 110 million users in the
nections to large Data, from the big data to the “Internet of Things Ecosphere”; there are more
big platform, from the big platform to the big than 600 million user in the “Smart Connection
ecological”, and is a strong support to promote Business Ecosphere”.
the four major development steps. Capacity
openness construction has realized the opening III. INNOVATIVE APPLICATIONS
up of basic communication capabilities, intel-
ligent pipeline capabilities, big data capabili-
3.1 Communication service
ties, Internet capabilities and IT capabilities.
capability application
Capability openness construction provides
one-stop service experience and standard in- Communication capability is the tradition-

232 China Communications • November 2020

Authorized licensed use limited to: Universidad Nacional Abierta y a Distancia. Downloaded on April 08,2021 at 12:35:33 UTC from IEEE Xplore. Restrictions apply.
al advantage of telecom operators. It is a numbers”. The intermediate numbers will be
breakthrough in the digital transformation displayed on both parties, and the intermediate
of telecom operators to form a high-quality numbers will be untied and recycled after the
capability set and provide packaged services order is over. It not only ensures smooth com-
or products to external partners. With the rise munication between the two parties, but also
of express delivery industry, takeout industry effectively encrypts and protects the mobile
and sharing economy, the telecom operators’ phone information of both parties, so as to
“unified number” capability, “intermediate prevent telephone harassment or other vicious
number” capability, and voice verification incidents caused by the number leakage of the
code capability can help service providers and two parties, and provide effective solutions
users to quickly establish secure and reliable for personal information protection of specific
communication channels, and supervise ser- industry users[2].
vice quality for enterprise users, although the
3.2 Big data capability application
traditional voice and SMS business volume
has gradually declined. At the same time, it After years of accumulation and possessing a
will strictly control the data security and infor- large number of users, telecom operators have
mation security of business services, and can formed a wealth of product capabilities and
protect the legitimate interests of both parties. have the basis for outputting high-quality big
When facing partners, the telecom operators data. On the basis of ensuring the security of
often perform the secondary encapsulation of users’ personal information, telecom operators
the underlying basic capabilities according to integrate B domain and O domain² big data
the typical application scenario. They provide capabilities for output, and combine industries
one-click notification, corporate business card application scenarios to create industries prod-
and other functions, provide them with scene- uct solutions. At present, big data applications
based and embeddable communication capa- involve smart tourism, municipal transpor-
bilities, make the service more agile, more tation, public safety, health care, consulting
efficient and safer. planning, financial credit reporting, training
As shown in Figure 1, the “middle num- and education, and business evaluation. For
ber” business is characterized by the service example, big data applications provide big
of telephone communication between the two data analysis services for government depart-
parties in the field of online car, O2O online ments such as tourism, public security and
and offline transactions, e-commerce platform,
logistics platform, intermediary consulting,
etc., and the temporary number can be ran-
domly assigned to the caller as the middle Online car
application
number. The middle number is used according
to the order status. After the end of the order, ①The order is successfully established,
and the system assigns the passenger
the middle number will be untied with the and driver virtual number.
calling number immediately. It establishes a
secure privacy barrier between the two parties.
Especially in the network car industry, tele-
Capability open
com operators have developed in-depth co- platform
operation with the main operating companies Passengers
Drivers
to achieve two-way protection for passengers
②The passenger dials the driver's ③The driver receives the passenger‘s incoming
and drivers’ mobile phone numbers. When the virtual number with the real number. call,and the mobile phone displays the
passenger's virtual number.
order is generated, the actual mobile phone
number of the driver and passenger will be
hidden, and are replaced by the “intermediate Fig. 1. “Intermediate number” capability application in field of online car.

China Communications • November 2020 233

Authorized licensed use limited to: Universidad Nacional Abierta y a Distancia. Downloaded on April 08,2021 at 12:35:33 UTC from IEEE Xplore. Restrictions apply.
transportation[3], or achieve strategic cooper- identify the fraudulent behavior of medical
ation and business with financial institutions. insurance. On the other hand, it can predict the
At the same time, It can meet the big data spread range of infectious diseases and carry
analysis needs of enterprise users in aspects out disease prevention and control based on
of brand promotion, product promotion, user the trajectory analysis of patients.
care, public service advertising, and corporate In addition, telecom operators make big
culture. data analysis a new way to help government
For example, Data statistics products can departments deal with telecom network fraud
realize the real-time statistics of passenger by using big data real-time processing capabil-
flow in the supervision area and intelligent ities. Telecom operators are actively respond-
management of floating population, as well ing to the relevant requirements of the state
as intelligent insight and monitoring analysis and the government, and are making every ef-
through large screen by the big data platform. fort to carry out the rectification work of fraud
The main application scenarios are as follows: calls. Telecom operators built a big data model
First, the tourism industry can get the total to deeply mine fraud data, and also realized
amount and average number of visitors, source machine automatic learning with the help of
information, stay time data, loyalty data ac- the model. They can continuously output sus-
cording to time and level. Abundant data can pected fraud calls based on the latest samples
provide better basis for the management de- and scene iteration model, conduct research
partment to plan scenic spots, and then change and judgment on public security organs and
the present situation of tourism post statistics, anti-fraud centers, and achieved remarkable
improve capabilities of real-time feedback and results.
rapid response, and strengthen tourism ser-
3.3 Application of IoT capabilities
vices and control effectiveness. Second, data
mining and algorithm analysis are carried out With the rise of applications such as consumer
according to users’ preference, consumption electronics and personal wear, users’ demand
behavior, user location, social contact and for IoT-related services is increasing. By the
other information, to facilitate the real-time end of 2018, telecom operators already have
monitoring and early warning of passenger hundreds of millions of IoT users. Relying on
flow, personnel concentration density and Internet of Things technology, telecom opera-
activity trend in the region, provide accurate tors can build efficient, stable and secure appli-
support services for public management such cation platforms between IoT services and real
as security and emergency response, avoid devices. It can provide customized services in
trampling and other incidents in time, help im- finance, retail, smart cities and smart agricul-
prove the service awareness and work level of ture to help application developers to connect
public management departments. The third is terminal devices with cloud platform[4], and it
risk management and control, which is main- also support multi-API application develop-
ly aimed at three typical business scenarios: ment. The specific service scenario includes
pre-lending, lending, and post-lending. Under two aspects. One is device-oriented. It covers
the premise of user authorization, it provides a equipment registration, addition, replacement,
personal information-based risk control prod- query and other services, adapts to a variety
uct plan to help banks improve and reduce the of network environments and common trans-
risk of the credit service process. Fourth, tele- mission protocols, and provides fast access
com operators can carry out relevant analysis solutions and equipment management support
by user location information, credit records for various hardware terminals. The second is
and behavior characteristics to play an import- the application layer. It provides a large num-
ant role in the medical field. On the one hand, ber of APIs and data distribution capabilities
it helps the medical and health institutions to to meet the development needs of various in-

234 China Communications • November 2020

Authorized licensed use limited to: Universidad Nacional Abierta y a Distancia. Downloaded on April 08,2021 at 12:35:33 UTC from IEEE Xplore. Restrictions apply.
dustry application systems, enable IOT enter- in a variety of harsh environments to realize
prises to focus more on their own application remote and intelligent equipment monitor-
development, shorten the formation cycle of ing[8]; Fifth, the energy industry, the Internet
the Internet of things system, reduce the R & of Things has changed the traditional door-
D and operation and maintenance costs of en- to-door meter reading method, and achieve
terprises[5]. remote automatic meter reading; Sixth, as
For example, the IoT card service is a shown in Figure 2, integrate the Internet of
mobile communication access service pro- Things into financial terminals and achieve
vided by telecom operators to an IoT user convenient mobile consumption in the smart
using an IoT dedicated number segment as finance industry; Seventh, smart medical care
an MSISDN³. The dedicated network element industry, IoT-related businesses establish a
device supports basic communication services wireless data channel for health monitoring
such as SMS and data, and provides smart terminals and achieve portable monitoring and
channel service such as communication status protection of the health.
management and communication authentica- Recently, telecom operators have released
tion. At the same time, as a communication the first batch of 5G modules. The downlink
guarantee, the Internet of things dedicated speed is higher than 2Gbps and uplink speed
SMS access service number and Internet of is up to 1.2Gbps. It is mainly used in the field
things dedicated APN are opened by default[6]. of VR/AR, video surveillance, industrial In-
At present, telecom operators have completed ternet and PDA. China Mobile took the lead
the construction of IoT networks and base in launching 5G application innovations in 74
stations with large scale and wide coverage. scenarios across 14 key industries. It achieves
On the one hand, one-stop service can be ac- 4K Ultra HD content transmission historically
cepted and opened, and it provides users with with 5g network. At the same time, with the
convenient network-wide connection services. 5G ultra-low latency feature, it realizes the
On the other hand, VPN, the physical line and first remote human operation based on 5g in
other methods provide users with a dedicated China. It was successfully implanted by neu-
data transmission channel on the network side, rosurgery experts 3000 kilometers away. The
and can output hundreds of APIs to the users development of digital technology will ac-
by platform docking to meet the business op- celerate the continuous innovation of various
erations demand such as the status display of industries such as automobile, manufacturing,
the association card, usage query, and account medical treatment, agriculture and other in-
information management. dustries. 5G technology will play a huge role
In addition, IoT-related businesses have
broad application prospects in other industries.
First, the Internet of Vehicles industry, lead-
ing-edge Internet vehicles, auto-driving and IoT capability
openness
Warning

other technologies rely on IoT wireless com- platform Area lock and send
out a warning
munication[7]; Second, the security industry,
IoT-related businesses can provide wireless Determine the area where the POS machine is used
Confirm

data channel for all types of security sensors,


and provide deployment in a wide area with
low cost; Third, the field of wearable devices,
IoT-related businesses allow wearable devices Restart Stop working

to keep data connected anytime to complete


The IoT card temporarily Locate in real time,
real-time data collection and information dis- Restart the IoT card
stops working and confirm violation

tribution; Fourth, the industrial manufacturing


industry, IoT-related businesses can be used Fig. 2. Internet of Things application in field of smart finance.

China Communications • November 2020 235

Authorized licensed use limited to: Universidad Nacional Abierta y a Distancia. Downloaded on April 08,2021 at 12:35:33 UTC from IEEE Xplore. Restrictions apply.
in various fields. 3.5 Unified authentication capability
application
3.4 Artificial intelligence application
At present, most Internet applications use the
Telecom operators have a variety of business
mobile phone number or real-name authen-
forms of artificial intelligence applications,
tication to register and log in. This authenti-
which are mainly reflected in intelligent voice
cation process is cumbersome in the identity
recognition processing[9]. In the process of pro-
authentication phase. It is usually used to log
viding access services, telecom operators work
in by inputting mobile phone number, graphic
together with partners to develop advanced
verification code and SMS verification code,
voice recognition processing technologies
but authentication errors may occur. For ex-
such as voice synthesis, voice evaluation, and
ample, when a registered user changes his
semantic understanding[10], and provide stable
mobile phone number or uses another user’s
service support and abundant access methods
account number to re-enter the network, it is
to help the application platform to quickly ac-
easy to generate security risks such as account
cess services with the minimum development
information disclosure, counterfeiting and
cost. In terms of e-commerce channels sup-
theft. In order to further optimize the authen-
port, it can provide capabilities of verification,
tication method and reduce or eliminate such
ordering and query for cooperation channels,
problems, the telecom operators create authen-
and support users to easily understand and or-
tication capabilities such as “One-Click Login
der the basic services of telecom operators by
Using The Local Number” and “Secondary
various channels, and participate in relevant
Number Registration” to enhance the user’s
marketing activities in a timely manner.
perception of various services. This capability
In addition, in the era of explosive growth
will also be exported to the entire information
of Internet content, abundant information is
industry.
continuously generated and delivered. Once
Relying on the relatively perfect security
the content operation platform has a large
authentication system of the communication
number of illegal and harmful information
network, “One-Click Login Using The Local
such as terrorism, pornography, and violence,
Number” can effectively control the risk of
it will lead to lower user satisfaction and
short term verification based on the mobile
be risks of being notified by the competent
phone number in the process of login authen-
authorities of the industry. Therefore, more
tication. It can quickly identify the user’s
human resources should be invested in the
identity with only one click in seconds, which
content operation platform to audit the infor-
is several times faster than the original veri-
mation content. The traditional mode of audit-
fication speed. It can be used for login, regis-
ing adopts pure manual sampling, which has
tration, password retrieval, payment and other
the problems of high labor cost and low audit
functions. It is a convenient login and authen-
efficiency. The intelligent technology instead
tication service provided by telecom operators
of manual audit can reduce human resources
for mobile Internet applications. There are
cost and improve audit efficiency. Intelligent
two advantages. On the one hand, there is no
voice recognition technology can convert full
need to fill in the password, which can prevent
audio into text, compare the transcribed text
the password from being hijacked, stolen and
with sensitive word database, and highlight
leaked, and it is more secure. On the other
the content of sensitive words after matching,
hand, as shown in Figure 3, it is suitable for all
which can effectively improve the efficiency
risk control scenarios requiring mobile phone
and coverage of the review, process more con-
number verification, which makes the opera-
tent per unit time, and the audit scope can also
tion convenient, low delay and smooth.
be increased several times, so as to further
The function of “Secondary Number Reg-
reduce the investment of human resources.

236 China Communications • November 2020

Authorized licensed use limited to: Universidad Nacional Abierta y a Distancia. Downloaded on April 08,2021 at 12:35:33 UTC from IEEE Xplore. Restrictions apply.
istration” can determine whether the current the level of user network security defense.
number is a secondary number by data com-
parison, and then combine with the collabora- IV. CONCLUSION
tive platform to build a complete and unified
user system. At present, many large Internet Based on the aggregation and opening of net-
companies are conducting related business work, data and product capabilities, telecom
docking tests with telecom operators, and the operators provide support for digital transfor-
effect is good. mation in four aspects: broadening the market
boundary, promoting multi ecology, enhancing
3.6 Network information security
the value of large connection and strengthen-
capabilities application
In order to further expand its influence and
service effectiveness, the network information
security capability has also become the focus
of telecom operators to promote and expand.
At this stage, telecom operators are concen-
trating on incubating various security products Number
validity check
for governments, enterprises, individuals and
other users, and provide them with a wider APP user “One-Click
Login Using The
range of network information security ser- Local Number”
vices. As more and more parents equip their Capability openness platform

children with smart phones, erosion of bad


network information and excessive addiction
of mobile phones have seriously affected the
User successfully logged
physical and mental health of minors. Parents into the APP
urgently need to effectively manage and guide
their children online. As shown in Figure 4, Fig. 3. “One-Click Login Using The Local Number” application in field of APP
telecom operators have developed and de- login scenario.
ployed the “Sunshine Guardian” business as
a comprehensive solution for protecting the
health of minors. By enabling the function of
mobile phone security protection, parents can
intelligently filter pornographic, violent and Internet management
viral websites to create a green and secure
online environment for their children. At the Xiao Ming

same time, it encourages children to develop Xiao Ming is here


good habits through the time division network
management function.
Favorite
In addition, telecom operators provide car-
rier-class protection services such as “cloud
embankment” for government and enterprises
Healthy Internet Access
users to prevent network security attacks. The
core is to quickly integrate the pipeline con-
trol ability and security protection ability of
backbone network. They output the network
security capability of telecom operators in the
way of Internet, and achieve fast access and
full self-service experience, so as to improve Fig. 4. The function example of “Sunshine Guardian” business.

China Communications • November 2020 237

Authorized licensed use limited to: Universidad Nacional Abierta y a Distancia. Downloaded on April 08,2021 at 12:35:33 UTC from IEEE Xplore. Restrictions apply.
ing the realization of resources. Telecom oper- cation,” Standards Press of China, 2017.
[3] V. Schonberger, and K. Cukier, “Trans. big data,”
ators focus on the capabilities open platform,
Zhejiang People’s Publishing House, no. 12,
integrate the advantages of various fields. 2012.
They provide full range of capabilities support [4] X. Chen. “Thoughts and suggestions on the
and resource sharing for partners to move development strategy of cloud computing busi-
ness for telecom operators,” China Telecommu-
towards “Internet+” through encapsulation,
nications Trade, no. 6, 2019, pp. 23-26.
openness and output capabilities. [5] Y. Li, P. Shang, and D. Wang, “Cloud platform
In the future, telecom operators should take construction and management,“ China Railway
security development as the criterion, coop- Press, 2018.
[6] H. Zhao et al., “Distributed output feedback
erate with partners to complement each other,
consensus of discrete-time multi-agent sys-
continue to adhere to the principle of open tems,” Neurocomputing, no. 138, 2014, pp. 86-
sharing and win-win cooperation, actively tap 91.
the new value of industrial integration, joint- [7] J. Hu, and G. Feng, “Distributed tracking control
of leader-follower multi-agent systems under
ly respond to the new situation of industrial
noisy measurement,” Automatic, no. 46, 2010,
reform, strive to cultivate new momentum of pp. 1382-1387.
digital economy, actively expand new space [8] H. Yan et al., “Decentralized event-triggered
for business development, and steadily create consensus control for second-order multi-agent
systems,” Neurocomputing, no. 133, 2014, pp.
a new chapter of industrial win-win.
18-24.
[9] K. Li, “AI · future,” Zhejiang People's Publishing
Remarks: House, no. 131, 2018.
[10] K. Li, and Y. Wang, “Artificial intelligence,” Cul-
tural Development Press Co., Ltd., no. 75, 2017.
1.DICT: Deep fusion of DT, it and CT.
2. B domain: Data domain of business sup- Biographies
port system. O domain: Data domain of oper- Jiannan Guo, got a master's
ation support system. degree from Beijing Normal
3.MSISDN: The numbers that uniquely can University in 2013, Engineer.
identify mobile users. The research direction is the
new technology and new busi-
ness security assessment and
References
data security of the Internet.
[1] L. Sun, “Thinking on the development strategy Take the lead in developing
of Internet of things business of telecom opera- standards such as "Internet Resource Collaboration
tors,” Telecom Network Technology, no. 3, 2018, Service of Information Security Assessment Require-
pp. 38-43. ments for New Technologies and New Business of
[2] “GB/T 35273-2017 Information security tech- the Internet" and so on.
nology - personal information security specifi-

238 China Communications • November 2020

Authorized licensed use limited to: Universidad Nacional Abierta y a Distancia. Downloaded on April 08,2021 at 12:35:33 UTC from IEEE Xplore. Restrictions apply.

You might also like