Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Bce Inc patents


Recent patent applications related to Bce Inc. Bce Inc is listed as an Agent/Assignee. Note: Bce Inc may have other listings under different names/spellings. We're not affiliated with Bce Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "B" | Bce Inc-related inventors


Delivery of electronic programming guide using a caching content delivery network

An electronic programming guide (epg) may be efficiently distributed through a cdn by breaking the epg into elements including epg info element that provides an indication of the current epg version and a length of schedule blocks within the epg. The epg info can be retrieved periodically, and when a change of the epg version is detected, epg channels info can be retrieved that provides a list of all channels in the epg as well as an indication for each schedule block of the channel of the epg version in which the schedule block was last changed. ... Bce Inc

System and method for accessing multimedia content

Devices, systems, and methods are described herein that comprise a multi-screen application which allows users to establish communication sessions with other users of the multi-screen application as well as allowing the user to request multimedia content using the same multi-screen application interface. The user makes a connection request to establish a multimedia session by entering a name or phone number. ... Bce Inc

Cyber threat intelligence threat and vulnerability assessment of service supplier chain

Determining the cyber threat risk and vulnerability of an organization may be determined taking in to account the chain of service suppliers to the organization.. . ... Bce Inc

Cyber threat intelligence system infrastructure

A cyber threat intelligence infrastructure allows processing of network data to enrich captured data with data from different sources to identify possible and/or actual cyber threats.. . ... Bce Inc

Rodent resistant ground level ice bridge

An ice bridge system for a cellular transmissions site assembled with a ladder frame section to support cabling laid on top of the and a ladder support with a preformed base for resting on a ground surface, a preformed set of mounting points for securing one or more sections of the ladder frame, such that the ladder frames mate end to end with each other and a structural support section between the base and mounting points to support the weight of the ladder frame and supported cables.. . ... Bce Inc

Method and system for generating social graph information

Methods and systems for using mobile data to generate social graph information are disclosed. Using the social graph information for targeted advertising is further disclosed herein. ... Bce Inc

Systems for end user premise event notification

Methods and systems to notify a party at a given premise when a particular event, such as a fire, an intrusion, an emergency or another event, occurs at another premise. One method comprises: obtaining an indication of a particular event at a first end-user premise, the first end-user premise including first end-user equipment connected to a communications network via a first communication link; establishing a wireless communication link between the first end-user equipment and second end-user equipment at a second end-user premise, the second end-user equipment being connected to the communications network via a second communication link; and causing the first end-user equipment to transmit information to the second end-user equipment via the wireless communication link to instruct the second end-user equipment to issue a notification concerning the particular event. ... Bce Inc

Ip mpls pop virtualization and fault tolerant virtual router

A method of configuring at least one switch involves configuring the at least one switch to direct communication to at least one of a plurality of computers according to at least one outcome of simulated interaction of a plurality of virtual network routers. A method of simulating interaction of a plurality of virtual network routers involves: causing a first at least one processor circuit to simulate the interaction of the plurality of virtual network routers; and causing a second at least one processor circuit, different from the first at least one processor circuit, to simulate the interaction of the plurality of virtual network routers redundantly to the simulated interaction of the plurality of virtual network routers on the first at least one processor circuit. ... Bce Inc

Method, system and apparatus for announcing caller information over a television link

A method, system and apparatus for announcing caller information to users over a television link. The method comprises receiving, via a portion of a data network adapted for handling voice-over-ip (voip) calls, session initiation protocol (sip) signalling information associated with an incoming call destined for a destination party, the sip signalling information comprising a portion conveying information regarding an origin of the incoming call and information regarding an identity of the destination party. ... Bce Inc

Online transaction validation using a location object

A method that comprises obtaining from end user equipment a location object caused to be stored on the end user equipment by a service provider; and validating an online transaction attempted using the end user equipment, based at least in part on the location object so obtained. The method may further comprise obtaining transaction object information provided via the end user equipment; and obtaining information to assist in validating online transactions attempted using the transaction object information. ... Bce Inc

Methods and systems for enabling end-user equipment at an end-user premise to effect communications when an ability of the end-user equipment to communicate via a communication link connecting the end-user equipment to a communications network is disrupted

A method for effecting communications, such as telephone calls, accesses to data network sites, alarm system communications, and/or other communications, over a communications network. The method comprises: determining that an ability of first end-user equipment at a first end-user premise to communicate via a first communication link connecting the first end-user equipment to the communications network is disrupted; establishing a wireless communication link between the first end-user equipment and second end-user equipment at a second end-user premise; and causing information transmitted by or destined for the first end-user equipment to be exchanged over the communications network via the wireless communication link and a second communication link connecting the second end-user equipment to the communications network. ... Bce Inc

Method and system for controlling media conveyance by a device to a user based on current location of the device

A method for execution by a customer premises receiver, comprising: receiving a signal that carries an original media stream; determining a location of the receiver; obtaining an identifier of an authorized region for the receiver; determining whether said location is contained within said authorized region; if said location is determined to be contained within said authorized region, outputting the original media stream for conveyance to a user; if said location is determined to not be contained within said authorized region, outputting a second media stream that is sufficiently corrupted relative to the original media stream as to degrade the user's viewing experience while being demonstrative of non-malfunctioning of the receiver. Also, a method, comprising a service provider releasing towards a plurality of customer premises receivers information regarding a respective geographic region within which each receiver is authorized to operate, wherein different geographic regions define coverage areas of different sizes.. ... Bce Inc

Methods and systems for re-securing a compromised channel in a satellite signal distribution environment

A method implemented by a set top box that encrypts communications for a channel stacking switch (cs) using a public key of the css, the method comprising: obtaining a message from a head end; extracting electronic counter measure (ecm) data from the message; sending the ecm data to the css; receiving, in response to the sending, a new public key of the css; encrypting communications for the css using the new public key of the css. Also, a method for implementation by a css, comprising: maintaining a private key and a public key; obtaining ecm data sent by a set top box in communication with the css; obtaining an identifier of the css; formulating a new public key based on the private key, the identifier and the ecm; rendering the new public key available to the set top box.. ... Bce Inc

Validation method and system for use in securing nomadic electronic transactions

A method involving a communication device, which comprises sending a request to a communication device; receiving a response from the communication device over a local communication path; deriving a received data set from said response; determining at least one data set that had been previously transmitted to the communication device over a wireless portion of a second communication path different from the local communication path; and validating the response based on the received data set and the at least one previously transmitted data set.. . ... Bce Inc

06/01/17 / #20170155944

Method and system for trigger management in an interactive television environment

A trigger manager and related processes and systems for managing triggers for a plurality of subscribing set-top boxes in an interactive television environment are provided. In response to receipt of a configuration update request originating from a specific set-top box, the trigger manager accesses a database of subscribing set-top box profiles associating subscribing set-top boxes with respective sets of triggers. ... Bce Inc

04/13/17 / #20170104656

Methods and systems for monitoring a service provided over a packet-switched network

Methods and systems for monitoring a service provided over a packet-switched network, such as an internet protocol television (iptv) service, an internet access service, or a voice-over-internet-protocol (voip) telephony service. Various parameters related to the service (e.g., parameters indicative of packet loss, packet corruption or other packet error) are determined and used to assess various aspects of the service and/or network over which the service is delivered, including a quality of experience (qoe) of subscribers.. ... Bce Inc

01/12/17 / #20170013441

Unified service architecture

A hybrid residential gateway may provide network access using either a wireless access interface or a wired access interface. Network access over either interface may be authenticated using a single sim card within the residential gateway.. ... Bce Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Bce Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Bce Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###