Method for billing in a telecommunications network

ABSTRACT

The present invention is directed to a method for placing a call between a client in one network and a client in another network. The IP network includes a SIP server and a network gateway configured to provide access to a public switched network. The method includes receiving a SIP call request message from the first client. The SIP call request message is authenticated to thereby identify an authentic originating client. Subsequently, a database is searched to find client billing tag corresponding to the authentic originating client. The call is completed if the client billing tag is obtained, and not completed if the client billing tag cannot be obtained. Thus, the present invention provides an efficient method for billing phone calls that are placed from SIP enabled devices to a telephone connected to the Public Switched Telephone Network (PSTN). The method of the present invention also substantially eliminates certain types of fraud.

This application claims benefit under 35 U.S.C. §119(e) of U.S. Provisional Patent Application 60/276,923, filed Mar. 20, 2001, entitled “IP Communications,” U.S. Provisional Patent Application 60/276,953, filed Mar. 20, 2001, entitled “IP Communications,” U.S. Provisional Patent Application 60/276,955, filed Mar. 20, 2001, entitled “IP Communications,” and U.S. Provisional Patent Application 60/276,954, filed Mar. 20, 2001, entitled “IP Communications”, the content of which is relied upon and incorporated herein by reference in its entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates generally to telecommunications, and particularly to billing SIP-originated communications sessions in an efficient manner.

2. Technical Background

In the context of communications networks, the Session Initiation Protocol (SIP) is an application-layer signaling protocol that has been developed to create, modify, and terminate sessions having one or more users. These sessions include Internet telephone calls, multi-media conferences, and multi-media distribution. SIP has enjoyed wide-spread acceptance as a means for signaling telecommunications services over the Internet since its approval as an official telecommunications standard in 1999.

The main function of SIP is to initiate and terminate interactive communications sessions between users. One requirement of initiating a session involves determining the location of the destination user. The destination user may have a SIP phone at work, a personal computer at both work and home, a non-SIP phone at home, or a mobile phone, among others. A call placed to this user may require the ringing of all devices at once, or there may be call forwarding, or some other feature employed to locate the user. After the destination user is located, SIP conveys the response to the session invitation to the originating user. The response may include either an accept or reject message. If the invitation is accepted the session becomes active. At the conclusion of the session, SIP is used to terminate the session.

The other main function of SIP is to provide the destination user with a description of the session he is being invited to. SIP is not concerned with the details of the session, but does provide information about the protocol used to describe the session. For example, SIP may employ Multipurpose Internet Mail Extension (MIME), the session description protocol (SDP), or some other suitable means to describe the session. SIP can also be used to negotiate a common format to describe a particular session.

One type of telephone call that can be placed by a customer is a call from an IP enabled device to a standard telephone set connected to the Public Switched Telephone Network (PSTN). The IP enabled device communicate to the PSTN via an IP network gateway. The network gateway functions as an interface, providing mediation from a packet switched IP signaling/voice system to the circuit switched, time division multiplexed (TDM) system employed by the PSTN. One problem associated with making these types of calls involves billing. Using SIP signaling, the network gateway receives a call set-up message from the originating SIP client. The call set-up message includes the IP address of the caller, which seems to be a relatively straight-forward way of identifying the entity responsible for paying for the call. Unfortunately, it is relatively easy for fraudulent users with access to a personal computer to insert an incorrect caller identification. Thus, the SIP message itself is not a reliable basis for billing purposes. What is needed is a method for billing SIP phone calls in an efficient way that substantially eliminates fraud.

SUMMARY OF THE INVENTION

The present invention addresses the needs described above. The present invention provides an efficient method for billing phone calls that are placed from SIP enabled devices to telephones connected to the Public Switched Telephone Network (PSTN). The method of the present invention also substantially eliminates fraud.

One aspect of the present invention is a method for placing a call between a first client and a second client. The IP network includes a SIP server and a gateway configured to provide access to a public switched network. The method includes receiving a call request message. The call request message is authenticated to identify an authentic originating client. A database is searched to find a client billing tag corresponding to the authentic originating client. The call is authorized to be completed if the client billing tag is obtained, and is not authorized to be completed if the client billing tag cannot be obtained.

In another aspect, the present invention includes a computer readable medium having computer executable instructions for performing a method for placing a call between a first client in an IP network and a second client in a public switched telephone network. The method includes receiving a call request message. The call request message is authenticated to identify an authentic originating client. A database is searched to find a client billing tag corresponding to the authentic originating client. The call is authorized to be completed if the client billing tag is obtained, and is not authorized to be completed if the client billing tag cannot be obtained.

In another aspect, the present invention includes a computer readable medium having computer executable instructions for performing a method for placing a call between a first client in an IP network and a second client in a public switched telephone network. The method includes receiving a SIP call request message. The call request message is authenticated to identify an authentic originating client. A database is searched to find a client billing tag corresponding to the authentic originating client. The client billing tag is inserted into the call request message. The call request message is transmitted to the gateway after the client billing tag is inserted into the call request message.

In another aspect, the present invention includes a computer readable medium having computer executable instructions for performing a method for placing a call between a first client in an IP network and a second client in a public switched telephone network. The method includes receiving a SIP call request message from the first client. At least one calling feature in a profile of the second client is evaluated. An authentic originating client is determined based on the at least one calling feature. The client billing tag corresponding to the authentic originating client is retrieved. The client billing tag is inserted into the call request message.

In another aspect, the present invention includes a computer readable medium having computer executable instructions for performing a method for placing a call between a first client in an IP network and a second client in a public switched telephone network. The method includes: receiving a SIP call request message; adding a header to the SIP call request message, the header including a server identifier; and transmitting the SIP call request and header to a gateway.

In another aspect, the present invention includes a computer readable medium having computer executable instructions for performing a method for placing a call between a first client in an IP network and a second client in a public switched telephone network, the method includes: receiving a call request message; checking the call request message for the presence of a header appended to the call request message; and completing the call based on the presence of the header.

In another aspect, the present invention includes a system for placing a call between a first client and a second client. The system includes an IP network. A SIP server is coupled to the IP network. The SIP server is configured to process at least one SIP call request message received from the first client to determine an authentic originating client. The SIP server also is configured to obtain a client billing tag corresponding to the authentic originating client. A network gateway is coupled to the SIP server, the network gateway is configured to provide at least one of the first client and the second client conditional access to a public switched telephone network.

In another aspect, the present invention includes a server system for placing a call between a first client in the IP network and a second client in a public switched telephone network. The system includes a database configured to store at least one client billing tag. A processor is coupled to the database. The processor is programmed to: process at least one call request message to identify a authentic originating client; and, search the database to find the client billing tag corresponding to the authentic originating client. The server allows the call to be completed if the client billing tag is obtained, and does not allow the call to be completed if the client billing tag cannot be obtained.

In another aspect, the present invention includes a network gateway system for placing a call between a first client in the IP network and a second client in a public switched telephone network. The system includes a communications interface for establishing a call with a circuit switched network. A processor is coupled to the communications interface. The processor is programmed to: receive at least one call request message; attempt to retrieve a client billing tag from the at least one call request message; and transmit the client billing tag and at least one call statistic to a network management system.

In another aspect, the present invention includes a network gateway system for placing a call between a first client in the IP network and a second client in a public switched telephone network. The system includes a communications interface for establishing a call with a circuit switched network. A processor is coupled to the communications interface. The processor is programmed to: receive a call request message; check the call request message for the presence of a header appended to the call request message; and complete the call based on the presence of the header.

Additional features and advantages of the invention will be set forth in the detailed description which follows, and in part will be readily apparent to those skilled in the art from that description or recognized by practicing the invention as described herein, including the detailed description which follows, the claims, as well as the appended drawings.

It is to be understood that both the foregoing general description and the following detailed description are merely exemplary of the invention, and are intended to provide an overview or framework for understanding the nature and character of the invention as it is claimed. The accompanying drawings are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification. The drawings illustrate various embodiments of the invention, and together with the description serve to explain the principles and operation of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an IP network suitable for placing calls from SIP enabled devices to telephones connected to the PSTN in accordance with one embodiment of the present invention;

FIG. 2 is a chart showing a method for obtaining correct billing information in accordance with one embodiment of the present invention;

FIG. 3 is a chart showing a method for obtaining correct billing information in accordance with another embodiment of the present invention; and

FIG. 4 is a chart showing a method for ensuring that calls are placed by a network gateway only after being processed by a network SIP server in accordance with yet another embodiment of the present invention.

DETAILED DESCRIPTION

Reference will now be made in detail to the present exemplary embodiments of the invention, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts. An exemplary embodiment of the network architecture of the present invention is shown in FIG. 1, and is designated generally throughout by reference numeral 10.

In accordance with the invention, the present invention includes a method for placing a call between a first client and a second client. The IP network includes a SIP server and a gateway configured to provide access to a public switched network. The method includes receiving a call request message. The call request message is authenticated to identify an authentic originating client. A database is searched to find a client billing tag corresponding to the authentic originating client. The call is authorized to be completed if the client billing tag is obtained, and is not authorized to be completed if the client billing tag cannot be obtained. Thus, the present invention provides an efficient method for billing phone calls that are placed from SIP enabled devices to a telephone connected to the Public Switched Telephone Network (PSTN). The present invention also substantially eliminates fraud.

As embodied herein, and depicted in FIG. 1, a network 10 suitable for placing calls via an IP network is disclosed. Network 10 includes IP network 100 coupled to enterprise network 130, enterprise network 140, PBX 150, PSTN 160, and SIP phone 170.

IP network 100 includes SIP Proxy Server computer (SPS) 102 coupled to IP network backbone 104 and Redirect Server (RS) 110. RS 110 is coupled to Redirect Server database (RSDB) 112. Network backbone 104 is coupled to network gateway 106, DAL gateway 116, SIP voice mail server 118, SIP conferencing platform 120, and SIP phone 170. INCP gateway 122 is coupled to RS 110. Gateway 106 is connected to PSTN 160 by way of switch 162. Non-SIP telephone 164 is connected to PSTN 160. Gateway 106 is also coupled to Network Management System (NMS) 108. By way of example, enterprise network 130 includes SIP device 136 and SIP device 138 coupled to enterprise WAN/LAN 132. LAN 132 is coupled to enterprise router 134. Also by way of example, enterprise network 140 includes SIP device 146 and SIP device 148 coupled to enterprise WAN/LAN 142. LAN 142 is coupled to enterprise router 144. PBX system 150 is coupled to WAN/LAN 142 by way of enterprise gate 114.

It will be apparent to those of ordinary skill in the pertinent art that modifications and variations can be made to the various elements of network 10 of the present invention. SPS 102, RS 110, network gateway 106, and SIP devices 136, 138, 146, 148, and 170 may be of any suitable type provided that they be in conformance with SIP standards detailed in RFC 2543. SIP is an application layer control and signaling protocol that enables the creation, modification, and termination of sessions between users. SIP is also a client-server protocol. A SIP client is a software client that runs, for example, on a personal computer or a laptop. From a signaling perspective, devices 136 and 146 may operate similarly to SIP phones 138, 148, and 170.

IP network backbone 104 includes a nationwide high speed network that operates at 622 MB/sec (OC-12). Backbone 104 employs advanced packet switching technology commonly known as the Asynchronous Transfer Mode (ATM). Backbone 104 also utilizes a fiber-optic transmission technology referred to as the Synchronous Optical Network (SONET). The combination of ATM and SONET enables high speed, high capacity voice, data, and video signals to be combined and transmitted on demand. The high speed of backbone 104 is achieved by connecting Internet Protocol through the ATM switching matrix, and running this combination on the SONET network.

NMS 108 may be of any suitable type, but there is shown by way of example a distributed computing system that includes customer management, account management, billing, network facilities provisioning, and network data collection functionality. In one embodiment, the computing system is based on technology provided by SUN Microsystems. In another embodiment, the databases employed by the computing system are based on technology provided by ORACLE.

The customer management system provides and controls access to customer accounts. Users may utilize a web page to monitor service, login to their account, and manage certain elements permitted by user profiles. The account management system allows network personnel to establish, maintain, or deactivate customer accounts. In one embodiment, customer information is viewed via a web interface. The billing system processes customer event records, the customer pricing plan data, adjustments, taxation and other data in the preparation of customer invoices. The network facilities provisioning system provides the information required by network engineers to ensure that the appropriate hardware and software is in place to provide service. This may involve the creation of a customer profile, and the reconfiguration of SPS 102, RS 110, and other network elements. Network provisioning may also require the placement of hardware plug-in devices used in backbone 104.

SPS 102 may be of any suitable type, but there is shown by way of example a SIP proxy server that conforms with SIP standards detailed in RFC 2543. SPS 102 functions as both a server and a client for the purpose of making requests on behalf of other clients. SPS 102 may service a request directly or pass it on to another server. SPS 102 may also rewrite a message before forwarding it.

RS 110 may be of any suitable type, but there is shown by way of example a SIP redirect server that conforms with SIP standards detailed in RFC 2543. RS 110 accepts SIP messages, maps the address into one or more new addresses, and returns these addresses to the client, which could be SPS 102. RS 110 does not initiate its own SIP requests, and RS 110 does not accept calls. RS 110 is essentially, a location server where information about possible terminating locations can be obtained.

INCP 122 is an Intelligent Network Control Point that is accessed to obtain dial plan information for existing private network customers. INCP 122 is an additional database that may be queried by RS 110 to route specific private calls. INCP 122 may also be accessed by SPS 102. In another embodiment, RS 110 may query some other legacy system or database for routing information.

PSTN 160 may be of any suitable type, but there is shown by way of example a circuit switched network employing Signaling System No. 7 (SS7). Switch 162 may be a class 3 switch, a class 5 switch, or any suitable switching apparatus. Telephone 164 may be any suitable telephone set currently in use or on the market.

DAL gateway 116 may be of any suitable type, but there is shown by way of example a system configured to support private traffic between IP locations and non-IP locations.

As embodied herein, and depicted in FIG. 2, a chart showing a method for obtaining correct billing information is disclosed. Referring back to FIG. 1, by way of example, an originating user attempts to establish a call from device 136 to a destination user at conventional telephone 164. Device 136 transmits an INVITE message to proxy server 102. Since telephone 164 is not a SIP device, the INVITE message includes the telephone number of telephone 164 and not an URL. In step 202, SPS 102 challenges device 136 to authenticate itself by transmitting a random number. Device 136 employs the random number, its password, and username to calculate an authentication result using the MD5 hash algorithm and transmits the random number, the username (but not the password), and the result to SPS 102.

SPS 102 uses the username to find a matching password in a database, which may or may not be resident on server 102. SPS 102 performs the same calculation using the username and random number provided by client 136, and the password retrieved from the database. If the results match, the originating client at device 136 is authenticated. Once client 136 is authenticated, SPS 102 uses the username and password to find the authentic originating client, e.g., the party responsible for bearing the cost of the call. SPS 102 searches a database to find the client billing tag that corresponds to the authentic originating client. In step 214, SPS 102 inserts the client billing tag into the call request message (INVITE) and subsequently transmits the message to gateway 106 via backbone 104.

At this point, gateway 106 attempts to establish a circuit switched call with telephone set 164 via switch 162. If gateway 106 is successful, an ACCEPT message is transmitted back to device 136, and the call is established. After the call is completed, gateway 106 transmits the client billing tag, the call length, and any other relevant call statistics to NMS 108. Obviously, if the authentication procedure of step 204 fails the call is not authorized to be completed. Likewise, if the client billing tag is not in the database, the call is not authorized to be completed, and the call request message is not passed onto gateway 106. One of ordinary skill in the art will recognize that the method depicted in FIG. 2 can be embodied as computer executable instructions disposed on any computer readable medium such as ROM, RAM, CD-ROM, hard drive or diskette. These instructions can be stored in the read-only memory (ROM) of SPS 102, or they can be stored as a network resource in some other location within network 100.

As embodied herein, and depicted in FIG. 3, a chart showing a method for obtaining correct billing information is disclosed. Referring back to FIG. 1, in this example, an originating client at device 136 is attempting to establish a session with a destination user at device 148. Step 300 and 302 are identical to steps 200-206 depicted in FIG. 2. In step 304, SPS 102 evaluates the profile of destination user 148. For a SIP device, a profile typically includes the user's authentication user name, password, account data, and other information. In this context however, the important profile information relates to the call features that are enabled. The features include unconditional call forwarding, conditional call forwarding, find-me, call blocking, call screening, alias management, password change, and default address management. In this example, a call forwarding feature is enabled, directing SPS 102 to forward the call to telephone set 164.

In this case, since the destination user is requesting that a call be established with telephone set 164 via PSTN 160, the destination user should bear the cost of the call. SPS 102 obtains the user name and password associated with device 148 from the profile, and uses the username and password to find the authentic originating client, e.g., the party responsible for bearing the cost of the call. SPS 102 searches a database to find the client billing tag that corresponds to the authentic originating client. In step 310, SPS 102 inserts the client billing tag into the call request message (INVITE) and transmits the message to gateway 106, via backbone 104. At this point, gateway 106 attempts to establish a circuit switched call between client 136 and telephone set 164. If gateway 106 is successful, an ACCEPT message is transmitted back to device 126, and the call is established. After the call is completed, gateway 106 transmits the client billing tag, the call length, and any other relevant call statistics to NMS 108.

One of ordinary skill in the art will recognize that the method of depicted in FIG. 3 can be embodied as computer executable instructions disposed on any computer readable medium, such as ROM, RAM, a CD-ROM, a hard drive or a diskette. These instructions can be stored in the read-only memory map (ROM) of SPS 102, or they can be stored as a network resource within network 100.

Those of ordinary skill in the art will recognize that billing tags can be added for all call types processed by server 102. Calls placed between all or any combinations of SIP-phones, enterprise gateways, network gateways, DAL gateways, INCP gateways, SIP-voicemail servers, and SIP conferencing servers may employ the present invention. Those of ordinary skill in the art will also recognize that the present invention can be employed using any suitable type of transport network. Further, the present invention is applicable to any type of session that may be established including, but not limited to, telephony, video, audio, instant messaging, and et cetera. It is also contemplated that the present invention may be employed for billing purposes, in a wide variety of services offered by the network. These services include, but are not limited to, call return, call forwarding, caller ID, caller waiting, call blocking, and especially any service that may be charged on a per-call basis.

As embodied herein, and depicted in FIG. 4, a chart showing a method for placing calls by a network gateway is disclosed. In FIG. 4, steps 400-404 are substantially the same as steps 200-214 depicted in FIG. 2. Unfortunately, these steps do not address the scenario wherein a fraudulent user attempts to contact the gateway directly, to thereby avoid bearing the cost of the call. Other measures are required to prevent this type of fraud. Thus, in step 406, SPS adds a security header to the INVITE message. The security header is used to identify SPS 102 as the server sending the INVITE message. In step 408, SPS 102 transmits a message containing both the INVITE request and the header to gateway 106. Gateway 106 is configured to look for the header before processing the call request. If gateway 106 cannot find the header, or if the header cannot be successfully read, gateway 106 does not attempt to complete the call. If gateway 106 can read the header, gateway 106 attempts to establish the call between client 136 and telephone set 164. One of ordinary skill in the art will recognize that the method depicted in FIG. 4 can be embodied as computer executable instructions disposed on any computer readable medium such as ROM, RAM, a CD-ROM, a hard drive or a diskette. These instructions can be stored in the read-only memories of SPS 102 and gateway 106, or they can be stored as a network resource located within network 100.

It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit and scope of the invention. Thus, it is intended that the present invention cover the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents. 

1. A method for placing a call between a first client and a second client, the method comprising: receiving a SIP call request message; challenging a device that originated the SIP call request message to authenticate itself, the device performing a first authentication process based on a username and a password associated with the device to generate a first authentication result as a result of authenticating itself; authenticating the SIP call request message by performing a second authentication process based on the username and the password associated with the device to generate a second authentication result and comparing the second authentication result to the first authentication result; evaluating at least one calling feature in a profile of the second client; identifying, based on the at least one calling feature, an authentic originating client when the second authentication result matches the first authentication result; searching a database to determine whether the database includes a client billing tag that identifies the authentic originating client as a party responsible for paying for the call; authorizing the call to be completed if the client billing tag is included in the database; and not authorizing the call to be completed if the client billing tag is not included in the database.
 2. The method of claim 1, further comprising: inserting the client billing tag into the SIP call request message; and transmitting the SIP call request message to a gateway after the client billing tag is inserted into the SIP call request message.
 3. The method of claim 2, further comprising providing, by the gateway, a network operating support system with the client billing tag.
 4. The method of claim 1, wherein at least one of the first authentication process or the second authentication process includes performing a calculation using a hash algorithm.
 5. The method of claim 1, further comprising inserting, by a server, a client billing tag corresponding to the second client into the SIP call request message based on the at least one calling feature.
 6. The method of claim 5, further comprising transmitting, by the server, the SIP call request message to a gateway after the client billing tag corresponding to the second client is inserted into the SIP call request message.
 7. The method of claim 5, wherein a gateway provides a network operating support system with the client billing tag.
 8. The method of claim 1, wherein the at least one calling feature includes a call forwarding command.
 9. The method of claim 1, wherein the at least one calling feature includes a call transfer command.
 10. The method of claim 1, further comprising: retrieving the client billing tag corresponding to the authentic originating client; and inserting the client billing tag corresponding to the authentic originating client into the SIP call request message.
 11. The method of claim 10, further comprising transmitting, by a server, the call request message to a gateway after the client billing tag is inserted into the call request message.
 12. The method of claim 10, wherein the at least one calling feature includes a call forwarding command.
 13. The method of claim 10, wherein the at least one calling feature includes a call transfer command.
 14. The method of claim 1, further comprising: adding a header to the SIP call request message, the header including a server identifier; and transmitting the SIP call request message to a gateway, the gateway being configured to complete the call if the header is detected and not complete the call if the header is not detected.
 15. The method of claim 1, further comprising: checking the SIP call request message for the presence of a header, the header including a server identifier; and completing the call if the header is detected.
 16. The method of claim 15, wherein the call is not completed if the header is not detected.
 17. The method of claim 1, wherein the first client is a SIP-telephone and the second client is a SIP-telephone.
 18. The method of claim 1, wherein the first client is a SIP-telephone and the second client is a standard telephone coupled to a PSTN.
 19. The method of claim 1, wherein at least one of the first client or the second client is coupled to a network gateway.
 20. The method of claim 1, wherein at least one of the first client or the second client is coupled to an enterprise gateway.
 21. The method of claim 1, wherein at least one of the first client or the second client includes a SIP voicemail server.
 22. The method of claim 1, wherein at least one of the first client or the second client includes a SIP conferencing server.
 23. The method of claim 1, wherein at least one of the first client or the second client is coupled to a DAL gateway.
 24. The method of claim 1, wherein at least one of the first client or the second client includes a client PBX system.
 25. The method of claim 1, wherein at least one of the first client or the second client includes a personal computer.
 26. The method of claim 1, wherein authenticating the call request message includes: receiving the username and the first authentication result from the device, determining a password that corresponds to the username, performing a hash function based on the username and password, and determining whether a result of the hash function matches the first authentication result.
 27. A computer-readable medium having computer executable instructions for performing a method for placing a call between a first client and a second client, the computer-readable medium comprising: instructions for receiving a call request message; instructions for challenging a device that originated the call request message to authenticate itself, the device generating an authentication result as a result of authenticating itself; instructions for authenticating the call request message based on the authentication result; instructions for evaluating at least one calling feature in a profile of the second client; instructions for determining, based on the at least one calling feature, an authentic originating client when the call request message is authenticated; instructions for searching a database to identify whether the database includes a client billing tag that identifies the authentic originating client as a party responsible for paying for the call; instructions for not authorizing the call to be completed if the database does not include the client billing tag; instructions for authorizing the call to be completed if the database includes the client billing tag; instructions for inserting the client billing tag into the call request message when the call is authorized to be completed; and instructions for forwarding the call request message with the inserted client billing tag when the call is authorized to be completed.
 28. The method of claim 27, wherein authenticating the call request message includes: receiving a user name and the authentication result from the device, determining a password that corresponds to the user name, performing a hash function based on the user name and password, and determining whether a result of the hash function matches the authentication result.
 29. A computer-readable medium having computer executable instructions for performing a method for placing a call between a first client and a second client, the computer-readable medium comprising: instructions for receiving, by a SIP server, a SIP call request message; instructions for challenging, by the SIP server, a device that originated the SIP call request message to authenticate itself, the device generating an authentication result as a result of authenticating itself; instructions for authenticating, by the SIP server, the SIP call request message based on the authentication result; instructions for evaluating at least one calling feature in a profile of the second client; instructions for determining, based on the at least one calling feature, an authentic originating client when the SIP call request message is authenticated; instructions for searching, by the SIP server, a database to find a client billing tag that identifies the authentic originating client as a party responsible for paying for the call; instructions for inserting, by the SIP server, the client billing tag into the SIP call request message; and instructions for transmitting, by the SIP server, the SIP call request message to a gateway.
 30. The computer-readable medium of claim 29, further comprising: instructions for completing, by the SIP server, the call if the client billing tag is obtained; and instructions for not completing, by the SIP server, the call if the client billing tag cannot be obtained.
 31. The computer-readable medium of claim 29, wherein the gateway provides a network operating support system with the client billing tag and call statistics after receiving the SIP call request message from the SIP server.
 32. The method of claim 29, wherein authenticating the SIP call request message includes: receiving a user name and the authentication result from the device, determining a password that corresponds to the user name, performing a hash function based on the user name and password, and determining whether a result of the hash function matches the authentication result.
 33. A method for placing a call between a first client and a second client, the method comprising: receiving a SIP call request message from the first client; challenging a device that originated the SIP call request message to authenticate itself, the device generating an authentication result as a result of authenticating itself; evaluating at least one calling feature in a profile of the second client; determining an authentic originating client based on the at least one calling feature and the authentication result; retrieving a client billing tag that identifies the authentic originating client as a party responsible for paying for the call; and inserting the client billing tag into the SIP call request message.
 34. The method of claim 33, further comprising transmitting, by a server, the SIP call request message to a gateway after the client billing tag is inserted into the SIP call request message.
 35. The method of claim 34, further comprising providing, by the gateway, a network operating support system with the client billing tag and at least one call statistic after the call is completed.
 36. The method of claim 33, wherein the at least one calling feature includes a call forwarding command.
 37. The method of claim 33, wherein the at least one calling feature includes a call transfer command.
 38. The method of claim 33, wherein the party responsible for paying for the call is the first client.
 39. The method of claim 33, wherein the party responsible for paying for the call is the second client.
 40. The method of claim 33, wherein authenticating the SIP call request message includes: receiving a user name and the authentication result from the device, determining a password that corresponds to the user name, performing a hash function based on the user name and password, and determining whether a result of the hash function matches the authentication result.
 41. A system for placing a call between a first client and a second client, the system comprising: a SIP server configured to: challenge a device that originated the call by requesting the device to authenticate itself, the device performing a first authentication process based on a username and password associated with the device to generate a first authentication result as a result of authenticating itself, process a SIP call request message received from the first client by performing a second authentication process based on the username and the password associated with the device to generate a second authentication result and comparing the second authentication result with the first authentication result, evaluate at least one calling feature in a profile of the second client, determine an authentic originating client based on the at least one calling feature and a result of comparing the second authentication result with the first authentication result, obtain a client billing tag that identifies the authentic originating client as a party responsible for paying for the call; and a network gateway coupled to the SIP server, the network gateway being configured to provide at least one of the first client or the second client conditional access to a public switched telephone network.
 42. The system of claim 41, wherein the server transmits the SIP call request message to the network gateway if the client billing tag is obtained, and does not transmit the call request message to the network gateway if the client billing tag cannot be obtained.
 43. The system of claim 41, wherein the SIP server is configured to insert the client billing tag into the SIP call request message and transmit the call request message to the network gateway.
 44. The system of claim 43, further comprising a network operation support system coupled to the network gateway, the network gateway being configured to transmit the client billing tag to the network operation support system after the call is completed.
 45. The network of claim 41, wherein the SIP server inserts a client billing tag corresponding to the second client based on the at least one calling feature.
 46. The network of claim 41, wherein the SIP server is configured to add a header to the SIP call request message.
 47. The network of claim 46, wherein the network gateway is configured to complete the call if the header is detected and not complete the call if the header is not detected.
 48. The method of claim 41, wherein the first client is a SIP-telephone and the second client is SIP-telephone.
 49. The method of claim 41, wherein the first client is a SIP-telephone and the second client is a standard telephone coupled to a PSTN.
 50. The method of claim 41, wherein at least one of the first client or the second client is coupled to the network gateway.
 51. The method of claim 41, wherein at least one of the first client or the second client is coupled to an enterprise gateway.
 52. The method of claim 41, wherein at least one of the first client or the second client includes a SIP voicemail server.
 53. The method of claim 41, wherein at least one of the first client or the second client includes a SIP conferencing server.
 54. The method of claim 41, wherein at least one of the first client or the second client is coupled to a DAL gateway.
 55. The method of claim 41, wherein at least one of the first client or the second client includes a client PBX system.
 56. The method of claim 41, wherein at least one of the first client or the second client includes a personal computer.
 57. The system of claim 41, wherein the SIP server is further configured to: receive the username and the first authentication result from the device, determine a password that corresponds to the username, perform a hash function based on the username and password, and determine whether a result of the hash function matches the first authentication result.
 58. A server system for placing a call between a first client and a second client, the system comprising: a database configured to store at least one client billing tag; and a processor coupled to the database, the processor being programmed to: challenge a device that originated the call by requesting the device to authenticate itself, the device performing a first authentication process based on a username and password associated with the device to generate a first authentication result as a result of authenticating itself, process a SIP call request message by performing a second authentication process based on the username and the password associated with the device to generate a second authentication result and comparing the second authentication result with the first authentication result, evaluate at least one calling feature in a profile of the second client; determine an authentic originating client based on the at least one calling feature and a result of comparing the second authentication result with the first authentication result, search the database to find the client billing tag that identifies the authentic originating client as a party responsible for paying for the call, allow the call to be completed if the client billing tag is obtained, and not allow the call to be completed if the client billing tag cannot be obtained.
 59. The system of claim 58, wherein the processor is programmed to insert the client billing tag into the SIP call request message.
 60. The system of claim 59, wherein the processor is programmed to transmit the SIP call request message with the client billing tag to a network gateway.
 61. The system of claim 58, wherein the processor is further programmed to: add a header to the SIP call request message, the header including a server identifier identifying the server system that forwards the call request message; and transmit the SIP call request message and header to a network gateway.
 62. The system of claim 58, wherein the processor is further programmed to: receive the username and the first authentication result from the device, determine a password that corresponds to the username, perform a hash function based on the username and password, and determine whether a result of the hash function matches the first authentication result. 