White banner small

Article

Understanding your mobile business account: 9 terms you should know! | Essential Glossary

In today’s telecommunications landscape, getting a hold of key aspects of a mobile business account is essential for efficient management and secure connectivity. From seamless transitions between providers to enabling accurate billing and device compatibility, these elements play a critical role in day-to-day operations. Knowing the terminology behind these processes empowers businesses to make informed choices, streamline operations, and deliver a better experience to clients. We go over 9 terms that we believe are relevant for you and your account management needs!

Billing Account Number

A unique number assigned to a customer's account for identification and billing purposes. It serves as a primary identifier for customer accounts, allowing businesses to efficiently manage and track individual interactions, billing, and service histories.

Why it’s important for businesses: it goes without saying but the billing account number is the central anchor for all related actions. It connects with billing activities, and other administrative functions, serving as a core reference for linking various aspects of the customer’s telecommunications journey.

Porting & Port Authorization Code (PAC)

Porting is the process of transferring a phone number from one mobile network to another. This allows businesses to retain their existing phone number when they switch providers, ensuring continuity in communication.

The Port Authorization Code (PAC) consists of nine characters, which includes 3x letters followed by 6x numbers. When requested, the current provider supplies this code, which the customer provides to the new provider to initiate the transfer. The PAC is usually valid for a limited time.

Why it’s important for businesses: porting allows customers to retain their existing number, which is crucial for businesses and individuals who want continuity in communication. By facilitating smooth transitions between providers, companies like Revolve Communications can increase customer satisfaction and reduce barriers for customers considering a switch.

Migration

Migration in telecommunications refers to the process of moving a customer's services or account details from one system or provider to another, but staying on the same mobile network. This can involve transferring numbers & account information, and is often done when upgrading mobile handsets, changing plans, or switching providers, maintaining service continuity while minimizing disruptions to the user.

Why it’s important for businesses: migration interrelates with porting, account management, and billing, as it requires the transfer of numbers, account details, and often involves billing updates

“Bar”

A bar is restriction or limit that can be placed on a business account.

There are different types of bars that you can set, such as:

  • Service bars: These restrict access to specific services, such as premium rate calls or international roaming.
  • Spending bars: These set limits on the amount of money you can spend on your account each month.

Why it’s important for businesses: Having bars on your account can help you manage your spending and avoid unexpected charges, helping a business stay within budget. For example, a business could set a bar on their data usage to prevent employees from using excessive amounts of data, which could lead to high charges.

Calling Line Identification (CLI)

Calling Line Identification (CLI) is a feature that displays the phone number of the line that is currently connected on a call. This can be useful for identification verification of numbers not saved in a mobiles contact’s list.

Why it’s important for businesses: CLI is directly related to the core of telecommunications services. It relies on accurate account information and device identifiers like IMEI and SIM details to function correctly, ensuring reliable caller ID for customers.

Unique Device Identifier – Apple devices only (UDID)

The Unique Device Identifier (UDID) is a distinct alphanumeric code assigned to each Apple device, including iPhones & iPads. It’s unique to each device, allowing for precise identification and is often used for app development, device registration, and security purposes. The UDID plays a key role in Apple’s ecosystem by allowing developers and administrators to track and manage devices securely.

Why it’s important for businesses: it supports device-specific configurations and secure access to services, which is critical in the case of mobile device management for a business.

If you have an iOS device, here’s how you can find your UDID.

SIM Card Number (ICCID)

The SIM Card Number, also known as the Integrated Circuit Card Identifier (ICCID), is a globally unique number embedded within every physical SIM card. This number, typically 19-20 digits long, is crucial for identifying the SIM card on the network and ensuring proper connection between the user’s device and the telecom infrastructure.

Why it’s important for businesses: it enables seamless service activation, device compatibility, and security measures like SIM unlocking, making it a core component for both service continuity and customer flexibility across networks.

International Mobile Equipment Identity (IMEI)

The International Mobile Equipment Identity (IMEI) is a unique 15-digit number assigned to every mobile device.

Why it’s important for businesses: This number is vital for security and management, as it allows providers to block or disable a device if it is reported lost or stolen, preventing unauthorized use. The IMEI also supports fraud prevention and aids in device tracking, ensuring that stolen phones cannot connect to any network worldwide. Police will need the IMEI when reporting stolen devices.

Personal Unlocking Key (PUK)

The Personal Unlocking Key (PUK) is a security code necessary to unlock a SIM card after it has been blocked due to multiple incorrect PIN entries. If a user enters the wrong PIN too many times, the SIM becomes locked, and only the PUK can reactivate it.

Why it’s important for businesses: the PUK code is usually provided by the telecom operator and is crucial to restoring access to the network for locked SIM cards, reducing service disruptions for customers.

Frequently Asked Questions

So, what’s the difference between an ICCID and IMEI?

ICCID is for the SIM card, and IMEI is for the device.

What’s the difference between porting and migration?

Porting involves transferring your phone number to a new provider to retain it, while migration refers to moving all account services—like numbers, billing, and service configurations—between providers or systems. Migration often includes porting as part of the process but is more comprehensive.

How does CLI help me in day-to-day communication?

Calling Line Identification (CLI) allows you to see the number of the caller before answering. This feature helps with verifying who’s calling, and maintaining clarity in business communications.

Why is the UDID important for Apple devices?

The Unique Device Identifier (UDID) is crucial for app testing, device management, and security. For businesses managing multiple Apple devices, it ensures precise identification for configurations or troubleshooting in secure environments.

Can I have multiple SIM cards with different ICCIDs in the same device?

Yes, if your device supports dual SIMs or eSIMs. Each SIM card, physical or digital, has its own ICCID, allowing you to manage multiple networks or plans from the same device.

Why should I note my IMEI number?

The IMEI is essential for device security. If your phone is lost or stolen, we can report the IMEI to your carrier, who can block the device from being used on any network.

Conclusion

Familiarity with the terms related to business accounts can make a significant difference in managing telecom needs effectively. These terms provide the foundation for smooth transitions, enhanced security, and consistent service, which are crucial for maintaining uninterrupted connectivity and protecting information. By understanding these elements, businesses can stay informed, and well-equipped to handle their telecommunications requirements.