1
Mahshad Koohgoli, Sorin Cohn Sfetcu, John D Lockton: Call set-up and spectrum sharing in radio communication on systems with dynamic channel allocation. Northern Telecom, BCE Telecom International, Foley & Lardner, January 4, 1994: US05276908 (113 worldwide citation)

The call set-up technique of this invention is characterized by the use of channel information from both base station and subscriber terminal in determining the radio traffic channel upon which to set-up a new call. Communication between the base station and subscriber terminal is carried out on a s ...


2
CLARK DAVID: System and method for unlocking a device. BCE, Henderson Neil, July 8, 2010: WO/2010/075623 (76 worldwide citation)

A system for unlocking a mobile device including: an input module configured to receive voice information; an output module configured to output an unlock signal; a processor connected to the input module and output module and configured to: receive the voice information from the input module; analy ...


3
William B Crago, Hakem M Habib, Marie Berthe Barbara Wilkes, Bernard Brabant, Guy Caron: Emergency call handling in a voice-over-packet environment. BCE, July 18, 2006: US07079627 (75 worldwide citation)

A method of routing an emergency call received at a network element. The method comprises determining a directory number associated with a communication device having originated the emergency call, consulting a local database to obtain routing information associated with the directory number, and di ...


4
William G O Brien, Tet Hin Yeap: User authentication for contact-less systems. BCE, July 24, 2007: US07246744 (23 worldwide citation)

A validation phase is performed at an RFID reader, in order to ascertain which of a plurality of potential candidates for authentication, are actual candidates for authentication. Once a candidate has been successfully validated, an authentication phase is initiated with a host computer, to determin ...


5
Tet Hin Yeap, Dafu Lou, William G O Brien: System and method for secure access. BCE, April 19, 2011: US07930412 (20 worldwide citation)

The present invention provides a method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a modem) and the computer equipment. Public and private keys are used by the secure access controller and a ...


6
Robert J Fletcher, Neil C McPhedran: Secure electronic procurement system and method. BCE Emergis, Kusner & Jaffe, May 30, 2006: US07054844 (18 worldwide citation)

A secure electronic procurement system allows a user (e.g. pharmacist) to order and confirm receipt electronically over a network (e.g. Internet) goods normally subject to a verifiable chain of custody (e.g. narcotics, controlled drugs and substances, other public distribution regulated goods or val ...


7
Hosein Nikopour Deilami, Amir Keyvan Khandani, Aladdin Saleh: Parallel soft spherical MIMO receiver and decoding method. BCE, University of Waterloo, Leslie A Kinsman, Border Ladner Gervais, July 26, 2011: US07986752 (13 worldwide citation)

A method and system for detecting and decoding multiple signals. A low-complexity MIMO detector that combines sphere decoding and m-algorithm approaches, while accounting for the effect of channel condition on the decoding operation, is provided. Taking into account the channel condition effectively ...


8
Tyson MaCaulay: System and method for generating and refining cyber threat intelligence data. BCE, Gowling Lafleur Henderson, August 25, 2015: US09118702 (13 worldwide citation)

A method of refining cyber threat intelligence data, comprising: sending a first version of a threat list to a first cyber threat intelligence source and to a second cyber threat intelligence source; obtaining original first cyber threat intelligence data from the first source; obtaining original se ...


9
David William Clark, Sean MacLean Murray: Service level selection method and system. BCE, June 17, 2014: US08756321 (13 worldwide citation)

A method, system and graphical user interface for service level selection, for use in connection with a data network that supports multiple service levels. A server monitors usage of a network to identify a communication session and a service level associated with the communication session. The serv ...


10
Tet Hin Yeap, Dafu Lou, William G O Brien: System and method for access control. BCE, March 8, 2011: US07904952 (12 worldwide citation)

A system and method for access control is provided. In one embodiment, a system includes a computing device connected to an access server that controls the ability of the computing device to access to a computing resource, such as the Internet. The access server connects to an activation server via ...