throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`_________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`_________________
`
`GOOGLE LLC,
`Petitioner,
`
`v.
`
`BUFFALO PATENTS, LLC,
`Patent Owner.
`
`_________________
`
`Case No. IPR2023-01387
`U.S. Patent No. 8,204,737
`_________________
`
`Declaration of Shauna L. Wiest Regarding Campbell
`
`Page 1 of 51
`
`GOOGLE EXHIBIT 1020
`
`

`

`Declaration of Shauna L. Wiest
`
`I, Shauna L. Wiest, state and declare as follows:
`
`I.
`
`Introduction
`
`1.
`
`I have prepared this Declaration in connection with Google LLC’s
`
`(“Petitioner”) Petition for Inter Partes Review of U.S. Patent Nos. 8,204,737
`
`which I understand will be filed concurrently with this Declaration.
`
`2.
`
`I am a senior research analyst with the Research & Information
`
`Services team at Finnegan, Henderson, Farabow, Garrett & Dunner, LLP
`
`located at 3300 Hillview Avenue, Palo Alto, CA 94304 (“Finnegan”).
`
`3.
`
`I am over eighteen years of age, and I am competent to make this
`
`Declaration. I make this Declaration based on my own personal knowledge,
`
`and my professional knowledge of library science practices.
`
`4.
`
`I earned a Master of Science in Library Science degree from the
`
`University of North Carolina at Chapel Hill in 1999, and a Bachelor of Arts in
`
`Political Science degree from the University of California at San Diego in
`
`1989. I have worked as a law librarian for over eighteen years. I have been
`
`employed in the Research & Information Services Department at Finnegan
`
`since 2021. Before that, from 2000-2015, I was employed as a Law Librarian
`
`at Stoel Rives LLP, and from 2015-2016, I was employed as a Competitive
`
`Intelligence Specialist for Nossaman LLP.
`
`2
`
`Page 2 of 51
`
`

`

`Declaration of Shauna L. Wiest
`
`II.
`
`Standard Library Practices for Receiving, Cataloging, Shelving, and
`Making Materials Publicly Available
`
`5.
`
`I have knowledge of and experience with standard library practices
`
`regarding receiving, cataloging, shelving, and processes for making materials
`
`available to the public. I am fully familiar with the Machine-Readable Cataloging
`
`(“MARC”) system, an industry-wide standard that libraries worldwide use to
`
`catalog materials.
`
`6.
`
`The MARC record system was developed during the 1960s to
`
`standardize bibliographic catalog records so they could be read by computers and
`
`shared among libraries. By the mid-1970s, MARC had become the international
`
`standard for cataloging bibliographic materials and is still used today. Many
`
`libraries provide public access to their MARC records via the Internet and/or their
`
`electronic cataloging systems at the library. In a MARC record, each field provides
`
`specific information about the cataloged item, including how materials are held
`
`and when they were catalogued and made available to the public.
`
`III. MARC Record Field Tags
`
`7.
`
`The MARC record system uses a specific three-digit numeric code
`
`(“field tags”) (from 001-999) to identify each field in a catalog record. For
`
`example, MARC field tag 008 provides the six-digit date the item was received
`
`and catalogued (Date entered on file). The first six characters of field tag 008 are
`
`always in the “YYMMDD” format. Descriptions and definitions of all of the
`
`3
`
`Page 3 of 51
`
`

`

`
`character positions of field tag 008 are outlined here:
`
`Declaration of Shauna L. Wiest
`
`
`https://www.loc.gov/marc/bibliographic/bd008a.html
`
`8.
`
`As is relevant to this Declaration, MARC field tag 022 provides the
`
`International Standard Serial Number (ISSN), a unique identification number
`
`assigned to a serial publication. MARC field tag 260 identifies the place of
`
`publication, name of publisher, and date of the publication. MARC field tag 362
`
`sets forth the dates of publication and/or sequential date(s) of publication
`
`designation for a work. MARC field tag 991 provide local holdings information to
`
`assist the public in identifying the location of a desired resource.
`
`9.
`
`Based on standard library practice, when a library receives an item,
`
`it generally stamps (and/or labels) the item with the library name, barcode,
`
`often with a date that is within a few days or weeks of receipt. Next, the library
`
`will catalog the item within a matter of a few days or weeks of receiving it. As
`
`a general practice, cataloguing is centralized and performed by a cataloguing
`
`department within a library or university setting. In certain circumstances the
`
`catalogued item may be subsequently sent to a library location within the
`
`library or university setting where it may be stamped and/or labeled after it has
`
`been catalogued.
`
`10. Generally, after an item is cataloged, the public may access the
`
`item by searching a library catalog, browsing the library shelves, and either
`
`
`
`4
`
`Page 4 of 51
`
`

`

`Declaration of Shauna L. Wiest
`
`requesting or electronically accessing the item from the library. Standard
`
`library practice is to make the item available to the public within a few days or
`
`weeks of cataloging it.
`
`IV.
`
`Serial Publications
`
`11. A serial publication, often known as a “journal,” is a resource that
`
`is issued in successive parts and has no predetermined conclusion. These
`
`successive parts are commonly referred to as “issues,” and each issue is usually
`
`chronologically numbered and dated. The presence of enumeration, years of
`
`coverage, and/or other chronological information, also indicates a serial
`
`publication.
`
`12.
`
`There are differences between cataloging finite resources
`
`(books/monographs) and continuing resources (serials). For serials, the catalog
`
`record provides information about the serial as a whole, including the first or
`
`earliest available issue. It also provides information as to holdings – the volumes
`
`and issues received and held by the library, including public availability of those
`
`holdings. In serials cataloging, there are identifying characteristics unique to serials
`
`that are slightly different from monographs (books). The issue date for a serial
`
`publication, for example, generally appears on the cover (front or back), the
`
`masthead page, the title page (if any), the table of contents page(s), or on the pages
`
`of the individual articles contained within the issue. More information regarding
`
`5
`
`Page 5 of 51
`
`

`

`Declaration of Shauna L. Wiest
`
`the unique aspects of cataloguing serials can be found at this link:
`
`https://www.loc.gov/aba/pcc/conser/scctppt/Basic-2014/Basic-Trainee-
`
`Mannual.pdf
`
`V.
`
`Public Availability of Campbell
`
`13.
`
`This Declaration relates to the date of public availability for the
`
`following reference: J. P. Campbell, “Speaker recognition: a tutorial, (An
`
`Invited Paper)" (“Campbell”) in Proceedings of the IEEE, vol. 85, no. 9, pp.
`
`1437-1462, September 1997 (“1997 IEEE Publication”). I understand that
`
`Campbell has been submitted as Exhibit 1010 in this proceeding. That same
`
`reference is appended to my Declaration as Appendix A.
`
`14. As detailed below, I have reviewed the print reference, public
`
`holdings information, and Library of Congress MARC record for Campbell to
`
`determine the date of public availability of this reference.
`
`15. Appendix A to this Declaration is a true and accurate copy of the
`
`print journal cover (including binding), title page, and table of contents for the
`
`issue of the 1997 IEEE Publication containing Campbell held by the Library of
`
`Congress. Appendix A also includes pages 1437-1462, which is the article titled
`
`“Speaker recognition: a tutorial, (An Invited Paper),” i.e. Campbell. The date
`
`stamp for this issue indicates that Campbell was received by the Library of
`
`Congress on September 23, 1997. The journal cover provides directional
`
`6
`
`Page 6 of 51
`
`

`

`Declaration of Shauna L. Wiest
`
`information so that members of the interested public could access the print volume
`
`containing Campbell at Call Number TK5700 .I6.
`
`16. Appendix B to this Declaration is a true and correct copy of the
`
`Library of Congress public catalog record for its copy of 1997 IEEE Publication
`
`containing Campbell which was downloaded from https://lccn.loc.gov/86645263
`
`on August 18, 2023. The Library of Congress’s public catalog record for its copy
`
`of 1997 IEEE Publication containing Campbell sets forth the publication history
`
`and item availability including onsite holdings and onsite location information for
`
`members of the public seeking the print issue of 1997 IEEE Publication containing
`
`Campbell. The public catalog record indicates that the print issue for 1997 IEEE
`
`Publication containing Campbell should be requested in the Jefferson or Adams
`
`Building Reading Rooms within holdings v.82-v.108 (1994:Nov.-2020:Dec.) at
`
`Call Number TK5700 .I6. Based on my experience as a librarian, the public
`
`catalog record (Appendix B) references the 1997 IEEE Publication containing
`
`Campbell (Appendix A).
`
`17. Appendix C to this Declaration is a true and accurate copy of the
`
`Library of Congress MARC record for its holdings of the serial publication 1997
`
`IEEE Publication containing Campbell, which was downloaded from
`
`https://catalog.loc.gov/vwebv/staffView?searchId=20720&recPointer=0&recCount
`
`=25&searchType=2&bibId=11315346 on August 18, 2023. The Library of
`
`7
`
`Page 7 of 51
`
`

`

`Declaration of Shauna L. Wiest
`
`Congress MARC record field tag 022 denotes the unique International Standard
`
`Serial Number (ISSN) for 1997 IEEE Publication as 0018-9219. MARC field tag
`
`260 denotes the place of publication, publisher, and publication date as: a [New
`
`York, N.Y.] : |b Institute of Electrical and Electronics Engineers, |c 1963-. MARC
`
`record field tag 362 denotes a chronological designation of a continuing (serial)
`
`resource. In this MARC record for the 1997 IEEE Publication, the sequential serial
`
`designation begins with Volume 51, no. 1 (Jan. 1963)- with no end date noted. And
`
`MARC field tag 991 set forth the local holdings, location, and call number
`
`information for The Library of Congress holdings for 1997 IEEE Publication
`
`containing Campbell. The MARC record denotes this information as: General
`
`Collection, Call Number TK5700 .I6 with holdings beginning with the issue
`
`Volume 64, Jan-Jun 1976.
`
`18. Appendix C confirms the fixed data elements of MARC field tag 008
`
`as 751101c19639999nyumrp0a0engc. As discussed above, the first six characters
`
`“751101” are in typical “YYMMDD” format and indicate that the serial
`
`publication 1997 IEEE Publication was initially catalogued by the Library of
`
`Congress on November 1, 1975. The publication status code “c1963” appearing in
`
`MARC field tag 008 refers to “continuing resource currently published,” indicating
`
`that the serial 1997 IEEE Publication began publication in 1963 and is a continuing
`
`published resource. Based on my experience as a librarian, the MARC record
`
`8
`
`Page 8 of 51
`
`

`

`Declaration of Shauna L. Wiest
`
`(Appendix C) references the 1997 IEEE Publication containing Campbell
`
`(Appendix A).
`
`19. Based on the information in Appendices A, B and C, the issue of the
`
`1997 IEEE Publication containing Campbell was received by the Library of
`
`Congress on or around September 23, 1997. Based on standard library practices,
`
`Campbell would have been processed and catalogued by the Library of Congress
`
`within a matter of a few days or weeks of September 23, 1997.
`
`20. Accordingly, Campbell would have been made available to the public
`
`within a few days or weeks of being checked-in and catalogued. The public could
`
`have accessed Campbell by searching the Library of Congress catalog and
`
`requesting the item in the Newspaper & Current Periodical Reading Room
`
`(Madison LM133) within a few weeks of September 23, 1997.
`
`VI. Conclusion
`
`21.
`
`In signing this Declaration, I understand it will be filed as evidence
`
`in a contested case before the Patent Trial and Appeal Board of the United
`
`States Patent and Trademark Office. I understand I may be subject to cross-
`
`examination in this case and that cross-examination will take place within the
`
`United States. If cross-examination is required of me, I will appear for cross-
`
`examination within the United States during the time allotted for cross-
`
`examination.
`
`9
`
`Page 9 of 51
`
`

`

`Declaration of Shauna L. Wiest
`
`22.
`
`I declare that all statements made herein of my knowledge are true,
`
`that all statements made on information and belief are believed to be true, and that
`
`these statements were made with the knowledge that willful false statements and
`
`the like so made are punishable by fine or imprisonment, or both, under Section
`
`1001 of Title 18 of the United States Code.
`
`Executed on September 11, 2023.
`
`Shauna L. Wiest
`
`10
`
`Page 10 of 51
`
`

`

`APPENDIX A
`APPENDIX A
`
`Page 11 of 51
`
`Page 11 of 51
`
`

`

`Page 12 of 51
`
`va3
`
`
`
`SUIIEERINE
`
`Bat)
`
`433
`
`L661
`
`Page 12 of 51
`
`

`

`fi
`
`» THE INSTITUTE OF ELECTRICAL AND ELECTRONICS eenase Nex
`
`SEPTEMBER1997
`
`\
`
`y
`’
`
`*IrisRecognition
`
`THE PROCEEDINGS
`
`AEU
`aedHLmeet
`
`SOL
`
`+ Fingerprint Identity Authentication
`« Fingerprint Features
`EyHLA CARE ETO
`_
`+ Speaker Recognition
`+ EvaluationofIdentification ~
`and Verification Systems
`Sy ZENCLO SYA
`
`1915 Classic Paper:
`“The Pure Electron Discharge
`andIt’s Applicitnim
`Radio Telegraphy aud Telephony”
`by Irving Langmuir
`
`Scanning the Past: Ralbh Bown &
`The Golden Age ofPropagation Research
`
`EI
`
`Page 13 of 51
`
`Page 13 of 51
`
`

`

`& IPIROCIEIEIDIINGS®TEEE
`
`
`
`published monthly by the Institute of Electrical and Electronics Engineers, Inc.
`September 1997 Vol. 85
`No. 9
`
`
`
`ear
`
`SEP 23 1997
` SPECIAL ISSUE ON
`
`AUTOMATED BIOMETRICS
`Edited by Weicheng Shen and Rajiv Khanna
`
`1343
`
`Scanning the Special Issue on Automated Biometrics, W. Shen and R. Khanna
`
`PAPERS
`
`1348
`
`1423
`
`1437
`
`Iris Recognition: An Emerging Biometric Technology, R. P. Wildes
`1347 Prolog, W. Shen and R. Khanna
`1365—AnIdentity-Authentication System Using Fingerprints
`A. K. Jain, L. Hong, S. Pankanti, and R. Bolle
`1364 Prolog, W. Shen and R. Khanna
`1390_—_—~Fingerprint Features—Statistical Analysis and System Performance Estimates
`(Invited Paper), A. R. Roddy and J. D. Stosz
`:
`1389 Prolog, W. Shen and R. Khanna
`Face Recognition: Eigenface, Elastic Matching, and Neural Nets
`(Invited Paper), J. Zhang, Y. Yan, and M. Lades
`1422 Prolog, W. Shen and R. Khanna
`Speaker Recognition: A Tutorial (Invited Paper), J. P. Campbell, Jr.
`1436 Prolog, W. Shen and R. Khanna
`1464~~Evaluation of Automated Biometrics-Based Identification and Verification Systems
`W. Shen, M. Surette, and R. Khanna
`
`
`
`
`
`VEVIVIVEDEDEDEDEDDE)ssevemecnoerere1]0]001TTTTTUTITTTTTTTTTPTPTETETEETETTTT
`
`Prolog, W. Shen and R. Khanna
`1463
`Biometrics: Privacy’s Foe or Privacy’s Friend? J. D. Woodward
`1479
`Prolog, W. Shen, R. Khanna, and J. D. Woodward
`Comments on “The Pure Electron Discharge and Its Applications in Radio Telegraphy
`and Telephony” (Invited Paper), C. K. Birdsall
`1496—-The Pure Electron Discharge and Its Applications in Radio Telegraphy and Telephony
`(Classic Paper), I. Langmuir
`
`1480
`
`1493
`
`BOOK REVIEWS
`
`1509
`
`The Balanced Scorecard: Translating Strategy into Action by R. S. Kaplan and
`D. P. Norton, Reviewed by R. C. Dorf and M. Rattanen
`
`SCANNING THE PAST
`
`1511
`1514.
`1516
`
`Ralph Bown and the Golden Age of Propagation Research, J. E. Brittain
`FUTURE SPECIAL ISSUES/SPECIAL SECTIONS OF THE PROCEEDINGS
`PROCEEDINGS CLASSIC PAPER REPRINT SCHEDULE
`
`Page 14 of 51
`
`Page 14 of 51
`
`

`

`PROCEEDINGS OF ‘THE IEEE
`1997 EDITORIAL BOARD
`Richard B. Fair, Editor
`James E. Brittain, Associate Editor, History
`
`Winser E. Alexander
`Roger Barr
`Albert Benveniste
`G. M. Borsuk
`Bimal K, Bose
`Lawrence Carin
`Giovanni De Micheli
`Per Enge
`E. K. Gannett
`Erol Gelenbe
`T. G, Giallorenzi
`J. D. Gibson
`Bijan Jabbari
`Dwight L. Jaggard
`Peter Kaiser
`
`Sung-Mo(Steve) Kang
`Murat Kunt
`Chen-Ching Liu
`Massimo Maresca
`K. W. Martin
`Yale N. Patt
`Theo Pavlidis
`P. B. Schneck
`Marwan Simaan
`L. M. Terman
`Fawwaz T. Ulaby
`Paul P. Wang
`H. R. Wittmann
`Francis T. S. Yu
`
`1997 IEEE PUBLICATIONS BOARD
`Friedolf Smits, Chair
`Tariq S. Durrani, Vice Chair
`
`IEEE STAFF
`Daniel J. Senese, Executive Director
`
`Frederick T. Andrews
`David Daut
`Kenneth Dawson
`Stephen L. Diamond
`Richard B. Fair
`Gregg Gibson
`Roger Hoyt
`W. Dexter Johnston, Jr.
`Marcel Keschner
`
`Deborah Flaherty Kizer
`Prasad Kodali
`Frank Lord
`William Middleton
`Robert T. Nash
`Charles Robinson
`Allan C. Schell
`Steven Unger
`George W. Zobrist
`
`STAFF EXECUTIVES
`Anthony J. Ferraro, Publications
`Richard D. Schwartz, Business
`Administration
`
`MANAGING DIRECTORS
`Donald Curtis, Human Resources
`Cecelia Jankowski, RegionalActivities
`Peter A Lewis, Educational
`Activities
`Andrew G. Salem, Standards Activities
`W. Thomas Suttle,
`Professional Activities
`John Witsken,
`Information Technology
`
`PUBLICATIONS DIRECTORS
`
`Kenneth Moore, [EEE Press
`Lewis Moore,
`Publications Administration
`Fran Zappulla,
`Staff Director, IEEE Periodicals
`
`PROCEEDINGS STAFF
`
`Jim Calder, Managing Editor
`Margery Scanlon,
`Editorial Coordinator
`Gail S. Ferenc, Transactions Manager
`Valerie Cammarata, Edttorial Manager
`Geraldine E. Krolin,
`Managing Editor, TRANSACTIONS/JOURNALS
`Tonya Ugoretz Buzby, Associate Editor
`
`Frank Caruthers, Jim Esch,
`Howard Falk, Richard A. O’Donnell.
`Kevin Self, George Likourezos
`Contributing Editors
`Stephen Goldberg, Cover Artist
`Susan Schneiderman, Richard C. Faust,
`Advertising Sales
`
`Manuscripis should be submitted in triplicate to the Editor at the IEEE Operations Center. A
`summary ofinsiruclions for preparation is found in the most recent January issue ofthis journal.
`Detailed instructions are contained in “Information for IEEE Transactions and Journals Authors,"
`available on request, After a manuscript has been accepted for publication, the author's organi-
`zation will be requested (o honor a charge of $110 per printed page (one-page minimum charge) to
`cover part of the publication cost. Responsibility for contents of papers rests upon the authors and
`not on the IEEE orits members.
`Copyright: [t is the policy of the [EEE to own the copyright to the technical contributionsit
`publishes on behalf of the interests of the [EEE.its authors, and their employers and to facilitale the
`appropriate reuse ofthis matcrial by others. To comply with the U.S. Copyright Law, authors are
`requested (o sign an IEEE copyright form before publication. This Form, a copy of which is found
`in the most recent January issue of the journal, returns to authors and their employers righis to
`reuse thei: material for their own purposes.
`
`
`
`
`
`HTTPDS2@etests[TTTPPEEee
`
`for the following month’s issue, Send new address, plus mailing label showing old address, to the
`PROCEEDINGS OF THE [EEE (ISSN 0018-9219; cudes IREPAD)is published monthly by the
`IEEE Operations Center. Member copies of the PROCEEDINGSare for personal use only.
`Institute of Electrical and Electronics Engineers, Inc.
`IEEE Corporate Office: 345 Eas! 47th
`Street, New York, NY J00|7-2394 USA. IEEE Operations Center: 445 Hoes Lane, P, O. Box
`1331, Piscataway, NJ 08855-1331 USA,
`NJ Telephone: 732-981-0060. Copyright and
`Advertising correspondence should be addressed to PROCEEDINGS Advertising Department, IEEE
`Operations Center, 445 Hoes Lane, Piscataway, NJ 08855-1331
`Reprint Permission:—Abstracting is permitted with credit to the source, Libraries are permitted
`to photocopy forprivale use of patrons, provided the per-copy fee indicated in the code at the
`bottomof the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive,
`Danvers, MA 01923.
`Forall other copying,
`reprint, or republication permission, write to
`Copyrights and Permissions Department. [EEE Publications Administration, 445 Hoes Lane, P. O.
`Box 1331, Piscataway. NJ 08855-1331. Copyright © 1997 by the Institute of Electrical and
`Electronics Engineers. Inc.. All rights reserved. Periodicals Postage Paid at New York, NY and at
`additional mailing offices.
`Postmaster: Send address changes to PROCEEDINGS OF THE IEEE,
`IEEE. 445 Hoes Lane, P. O. Box 1331. Piscataway. NJ 08855-1331. GST Registration No.
`125634188. Printed in U.S.A
`
`Annual Subscription: Member and nonmemberprices available on request. Single copies: IEEE
`members $10.00 (first copy only), nonmembers $20,00 per copy, (Note: Add $4.00 for poslage and
`handling charge by any order from $1.00 to $50.00, including prepaid orders.) Other: Available in
`microfiche and microfilm. Changeof address must be received bythe first of a monthto be effective
`
`fax: 732-562-5456, email: j.calder@ieee.arg.)
`
`CONTRIBUTIONS
`
`The PROCEEDINGS OF THE IEEE publishes comprehensive, in-depth
`review, tutorial, and survey papers written for technically knowledgeable
`readers who are not necessarily specialists in the subjects being treated.
`The papers are of long-range interest and broad significance. Applications
`and technological issues, as well as theory, are emphasized. The topics
`include all aspects of electrical and computer engineering and science.
`From time to time, papers on managerial, historical, enconomic, and
`ethical aspects of technology are published. Papers are authored by
`recognized authorities and reviewed by experts. They include extensive
`introductions written at a level suitable for the nonspecialist, with ample
`references for those who wish to probe further. Several issues a year are
`devoted to a single subject of special importance.
`IMPORTANT: Prospective authors, before preparing a full-length manu-
`script, should submit a proposal containing a description of the topic and
`its
`importance to PROCEEDINGS readers, a detailed outline of the proposed
`
`paperand its type of coverage, and a brief biography showing the author's
`qualifications for writing the paper (including reference to previously
`published material as well as information on the author's relation to the
`topic). If the proposal receives a favorable review, the author will be
`encouraged to prepare the paper, which after submittal will go through the
`normal review process. Guidelines for proposals are available from the
`address below or the PROCEEDINGS home page:
`http://www .ieee.org/pubs/transjour/proc.
`Technicalletters are no longer published in the PROCEEDINGS. Comments
`on and corrections to material published in this journal will be considered,
`however,
`
`Please send proposals to the Editor, PROCREDINGS OF THE IEEE, 445
`Hoes Lane, Piscataway, NJ 08855-1331 USA.(Telephone: 732-562-5478,
`
`COVER Thisspecial issue covers the subject of automated biometric systemsthat are used to verify individual identity using unique biometric mcasurements
`of the human body, Our coverillustrates the concept of one of the growing number of applications of these systems.
`
`Page 15 of 51
`
`Page 15 of 51
`
`

`

`This material may be protected by Copyright law (Title 17 U.S. Code)
`
`Speaker Recognition: A Tutorial
`
`
`
`JOSEPH P. CAMPBELL, JR., SENIOR MEMBER,IEEE
`
`Invited Paper
`
`A tutorial on the design and development of automatic speaker-
`recognition systems is presented. Automatic speaker recognition
`is the use of a machine to recognize a person from a spoken
`phrase. These systems can operate in two modes:
`to identify
`a particular person or to verify a person’s claimed identity.
`Speech processing and the basic components ofautomatic speaker-
`recognition systems are shownand designtradeoffs are discussed.
`Then, a new automatic speaker-recognition system is given. This
`recognizer performs with 98.9% correct identification, Last,
`the
`performances of various systems are conipared.
`Keywords—Accesscontrol, authentication, biomedical measure-
`ments, biomedical signal processing, biomedical transducers, bio-
`metric, communication system security, computer network security,
`computer security, corpus, data bases,
`identification of persons,
`public safety, site security monitoring, speaker recognition, speech
`processing, verification.
`
`I.
`
`INTRODUCTION
`
`In keeping with this special issue on biometrics, the focus
`of this paper is on facilities and network access-control
`applications of speaker recognition. Speech processing is a
`diverse field with many applications. Fig.
`1 shows a few of
`these areas and how speaker recognition relates to the rest
`ofthe field; this paper focuses on the three boxed areas.
`Speaker recognition encompasses verification and iden-
`tification. Automatic speaker verification (ASV)is the use
`of a machine to verify a person’s claimed identity from
`his voice. The literature abounds with different terms for
`speaker verification, including voice verification, speaker
`authentication, voice authentication, talker authentication,
`and talker verification. In automatic speaker identification
`(ASI), there is no a priori identity claim, and the system
`decides who the person is, what group the person is a
`member of, or (in the open-set case) that the person is
`unknown. General overviews of speaker recognition have
`been given in [2], [12], [17], [37], [51], [52], and [59].
`Speakerverification is defined as deciding if a speakeris
`whom he claims to be. This is different than the speaker
`
`Manuscript received April 20, 1997; revised June 27, 1997.
`The author is with the National Security Agency, R22, Ft. Meade,
`MD 20755-6516 USA;
`and the Whiting School of Engineering,
`The Johns Hopkins University, Baltimore, MD 21218 USA (e-mail:
`j.campbell @ieee.org).
`Publisher Item Identifier $ 0018-92 19(97)06947-8.
`
`Speech Provessing
`
`Analysis/Synthesis
`
`Recognition
`
`Coding
`
`Speech
`Recognition
`
`Speaker
`Recognition
`
`Language
`Identification
`
`Speaker
`Identification
`
`Speaker
`Detection
`
`Speaker
`Verification
`
`Text
`Independent
`Unwitting
`Speakers
`Variable
`Quality
`Speech
`
`Text
`Independent
`Cooperative
`Speakers
`High
`Quality
`Speech
`
`Speech
`
`Text
`Independent
`Cooperative
`Speakers
`High
`Quality
`Speech
`
`Text
`Dependent
`Cooperative
`Speakers
`High
`Quality
`
`Fig. 1. Speech processing.
`
`™
`
`identification problem, which is deciding if a speaker is a
`specific person or is among a group of persons. In speaker
`verification, a person makes an identity claim (e.g., by
`entering an employee numberor presenting his smart card).
`In text-dependent recognition, the phrase is known to the
`system and can be fixed or prompted (visually or orally).
`The claimant speaks the phrase into a microphone. This
`signal is analyzed by a verification system that makes the
`binary decision to accept or reject the user’s identity claim
`or possibly to report
`insufficient confidence and request
`additional input before making the decision.
`A typical ASV setup is shown in Fig. 2. The claimant,
`who has previously enrolled in the system, presents an
`encrypted smart card containing his identification informa-
`tion. He then attempts to be authenticated by speaking a
`prompted phrase(s) into the microphone. There is generally
`a tradeoff between accuracy andtest-session duration. In
`addition to his voice, ambient room noise and delayed
`versions of his voice enter the microphone via reflective
`acoustic surfaces. Prior to a verification session, users must
`enroll in the system (typically under supervised conditions).
`During this enrollment, voice models are generated and
`stored (possibly on a smart card) for use in later verification
`
`PROCEEDINGS OF THE IEEE, VOL. 85, NO. 9, SEPTEMBER 1997
`
`1437
`
`U.S. Government work not protected by U.S. copyright.
`
`
`
`Page 16 of 51
`
`

`

`
`
`
`Pattern
`
`Feature
`|_Digital
`Filtering
`and A/D|Speech”|Extraction
`Matching|Scores
`
`
`
`
`
`NEARS Taconic
`
`Doe SS . | Surface Microphone
`
` © _ Microphone
`
`Claimed ID
`
`Fig. 3. Generic speaker-verification system.
`
`B. Problem Formulation
`
`Speech is a complicated signal produced as a result
`of several
`transformations occurring at several different
`levels: semantic, linguistic, articulatory, and acoustic. Dif-
`ferences in these transformations appear as differences in
`the acoustic properties of the speech signal. Speaker-related
`differences are a result of a combination of anatomical
`differences inherent in the vocal tract and the learned speak-
`ing habits of different individuals. In speaker recognition,
`all these differences can be used to discriminate between
`speakers.
`
`C. Generic Speaker Verification
`The general approach to ASV consists of five steps:
`digital speech data acquisition, feature extraction, pattern
`matching, making an accept/reject decision, and enrollment
`to generate speaker reference models. A block diagram
`of this procedure is shown in Fig. 3. Feature extraction
`maps eachinterval of speech to a multidimensional feature
`space. (A speech interval typically spans 10-30 msof the
`speech waveform andis referred to as a frame of speech.)
`This sequence of feature vectors 2; is then compared to
`speaker models by pattern matching. This results in a match
`score 2; for each vector or sequence of vectors. The match
`score measures the similarity of the computed input feature
`vectors to models of the claimed speaker or feature vector
`patterns for the claimed speaker. Last, a decision is made to
`either accept or reject the claimant according to the match
`score or sequence of match scores, which is a hypothesis-
`testing problem.
`For speakerrecognition, features that exhibit high speaker
`discrimination power, high interspeaker variability, and
`low intraspeaker variability are desired. Many forms of
`pattern matching and corresponding models are possible.
`Pattern-matching methods include dynamic time warping
`(DTW), the hidden Markov model (HMM),artificial neural
`networks, and vector quantization (VQ). Template models
`are used in DTW,statistical models are used in HMM,and
`codebook models are used in VQ.
`
`D. Overview
`
`The purpose of this introductory section is to present a
`general framework and motivation for speaker recognition,
`an overview of the entire paper, and a presentation of
`previous work in speaker recognition.
`Section II contains an overview of speech processing,
`including speech signal acquisition,
`the data base used
`in later experiments, speech production, linear prediction
`(LP),
`transformations,
`and the cepstrum. Section TI
`
`PROCEEDINGS OF THE IEEE, VOL. 85, NO. 9, SEPTEMBER 1997
`
`Smart Card
`
`(Ambient Noise
`
`Fig. 2. Typical speaker-verification setup.
`
`
`
`Table 1 Sources of Verification Error
`
`Misspoken or misread prompted phrases
`
`Extreme emotionalstates (e.g., stress or duress)
`
`Time varying(intra- or intersession) microphone placement
`
`Poor or inconsistent room acoustics(e.g., multipath and noise)
`
`Channel mismatch(e.g., using different microphones for
`enrollment and verification)
`
`Sickness(e.g., head colds can alter the vocal tract)
`
`Aging (the vocal tract can drift away from models with age)
`
`sessions. There is also generally a tradeoff between accu-
`tacy and the duration and number of enrollmentsessions.
`Many factors can contribute to verification and iden-
`tification errors. Table 1
`lists some of the human and
`environmental factors that contribute to these errors, a few
`of which are shown in Fig. 2. These factors generally are
`outside the scope of algorithms or are better corrected by
`means other than algorithms (e.g., better microphones).
`These factors are important, however, because no matter
`how good a speaker-recognition algorithm is, human er-
`ror (e.g., misreading or misspeaking) ultimately limits its
`performance.
`
`A. Motivation
`
`ASV andASI are probably the most natural and econom-
`ical methods for solving the problems of unauthorized use
`of computer and communications systems and multilevel
`access control. With the ubiquitous telephone network and
`microphones bundled with computers, the cost of a speaker-
`recognition system might only be for software.
`Biometric systems automatically recognize a person by
`using distinguishing traits (a narrow definition). Speaker
`recognition is a performance biometric, i.e., you perform
`a task to be recognized. Your voice, like other biometrics,
`cannot be forgotten or misplaced, unlike knowledge-based
`(e.g., password) or possession-based (e.g., key) access-
`control methods. Speaker-recognition systems can be made
`somewhatrobust against noise and channelvariations [33],
`[49], ordinary human changes (e.g.,
`time-of-day voice
`changes and minor head colds), and mimicry by humans
`and tape recorders [22].
`
`1438
`
`Page 17 of 51
`
`Page 17 of 51
`
`

`

`the divergence measure, and
`presents feature selection,
`the Bhattacharyya distance. This section is highlighted
`by the development of the divergence shape measure and
`the Bhattacharyya distance shape. Section IV introduces
`pattern matching and Section V presents classification,
`decision theory, and receiver operating characteristic
`(ROC) curves. Section VI describes a simple but effective
`speaker-recognition algorithm. Section VII demonstrates
`the performanceof various speaker-recognition algorithms,
`and Section VIII concludes by summarizing this paper.
`
`E. Previous Work
`
`There is considerable speaker-recognition activity in in-
`dustry,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket