throbber
ii Appllicationof
`
`Programmable
`
`IPR2022-00601
`Apple EX1053 Page 1
`
`IPR2022-00601
`Apple EX1053 Page 1
`
`

`

`Copyright © 2002 by John Wiley & Sons, Ltd
`Baffins Lane, Chichester,
`West Sussex, PO19 1UD, England
`National 01243 779777
`International (+44) 1243 779777
`e-mail (for orders and customerservice enquiries): cs-books @ wiley.co.uk
`Visit our Home Page on http://www.wiley.co.uk or http://www.wiley.com
`
`All Rights Reserved. Nopart of this publication may be reproduced, stored in a retrieval system, or
`transmitted, in any form or by any means,electronic, mechanical, photocopying, recording, scanning or
`otherwise, except underthe terms of the Copyright Designs and Patents Act 1988 or underthe termsof a
`licence issued by the Copyright Licensing Agency, 90 Tottenham Court Road, London, WIP SHE, UK,
`without the permission in writing of the Publisher, with the exception of any material supplied speci-
`fically for the purpose of being entered and executed on a computer system, for exclusive use by the
`purchaserof the publication.
`
`Neitherthe author(s) nor John Wiley & Sons Ltd accept any responsibility or liability for loss or damage
`occasioned to any person or property through using the material,
`instructions, methods or ideas
`containedherein,oractingorrefraining from acting asa result of such use. The author(s) and Publisher
`expressly disclaim all
`implied warranties,
`including merchantability of fitness for any particular
`purpose.
`
`Designations used by companiesto distinguish their products are often claimed as trademarks. In all
`instances where John Wiley & Sons is aware of a claim, the product names appearin initial capital or
`capital letters. Readers, however, should contact the appropriate companies for more complete informa-
`tion regarding trademarksandregistration.
`
`Other Wiley Editorial Offices
`
`John Wiley & Sons, Inc., 605 Third Avenue,
`New York, NY 10158-0012, USA
`
`WILEY-VCH Verlag GmbH
`Pappelallee 3, D-69469 Weinheim, Germany
`
`John Wiley & Sons Australia Ltd, 33 Park Road, Milton,
`Queensland 4064, Australia
`
`John Wiley & Sons (Canada) Ltd, 22 Worcester Road
`Rexdale, Ontario, M9W 1L1, Canada
`
`John Wiley & Sons (Asia) Pte Ltd, 2 Clementi Loop #02-01,
`Jin Xing Distripark, Singapore 129809
`
`British Library Cataloguing in Publication Data
`
`A catalogue record for this book is available from the British Library
`ISBN 0471 48643 4
`
`Typeset in Times by Deerpark Publishing Services Ltd, Shannon, Ireland.
`Printed and boundin Great Britain by T. J. International Ltd, Padstow, Cornwall.
`
`This bookis printed on acid-free paper responsibly manufactured from sustainable forestry, in whichat
`least two trees are planted for each one used for paper production.
`
`IPR2022-00601
`Apple EX1053 Page 2
`
`IPR2022-00601
`Apple EX1053 Page 2
`
`

`

` =i
`
`bp
`
`
`
`Contents
`
`Biographies
`
`List of Contributors
`
`1 Introduction
`Edgar Auslander and Alan Gatherer
`1.1 It’s a Personal Matter
`1.2 The Super Phone?
`1.3 New Services
`1.4 The Curse and Opportunity of Moore’s Law
`1.5 The Book
`
`2 The History of DSP Based Architectures in Second Generation Cellular Handsets
`Alan Gatherer, Trudy Stetzler and Edgar Auslander
`2.1 Introduction
`2.2 A History of Cellular Standards and Wireless Handset Architectures
`2.2.1 1G and 2G Standards
`2.2.2 2.5G and 3G Standards
`2.2.3 Architecture Evolution
`2.3 Trends in Low Power DSPs
`2.3.1 Process Improvement
`2.3.2 Instruction Set Enhancement
`2.3.3 Power Management
`References
`
`3 The Role of Programmable DSPs in Dual Mode (2G and 3G) Handsets
`Chaitali Sengupta, Nicolas Veau, Sundararajan Sriram, Zhenguo Gu and Paul Folacci
`3.1 Introduction
`3.2 The Wireless Standards
`3.3 A Generic FDD DSDigital Baseband (DBB) Functional View
`3.4 Functional Description of a Dual-Mode System
`3.5 Complexity Analysis and HW/SW Partitioning
`3.5.1 2G/3G Digital Baseband Processing Optimized Partitioning
`3.6 Hardware Design Approaches
`3.6.1 Design Considerations: Centralized vs. Distributed Architectures
`3.6.2 The Coprocessor Approach
`3.6.3 Role of DSP in 2G and Dual-Mode
`3.7 Software Processing and Interface with Higher Layers
`3.8 Summary
`3.9 Abbreviations
`References
`
`xiii
`
`Xv
`
`OmADAWN
`
`NNNNNnNONeeeeeeeepesSOonkwDWwWKEKONNENEE_
`
`Ln OTERTAROAENERRO LO OIE
`
`
`IPR2022-00601
`EX1053 Page 3
`
`Apple
`
`IPR2022-00601
`Apple EX1053 Page 3
`
`

`

`ve EEE Contents
`
`4 Programmable DSPs for 3G Base Station Modems
`Dale Hocevar, Pierre Bertrand, Eric Biscondi, Alan Gatherer, Frank Honore, Armelle Laine,
`Simon Morris, Sriram Sundararajan and Tod Wolf
`4.1 Introduction
`4.2 Overview of 3G Base Stations: Requirements
`4.2.1 Introduction
`4.2.2 General Requirements
`4.2.3 Fundamental CDMA BaseStation Base Band Processing
`4.2.4 Symbol-Rate (SR) Processing
`4.2.5 Chip-Rate (CR) Processing
`4.3 System Analysis
`4.3.1 SR Processing Analysis
`4.3.2 CR Processing Analysis
`4.4 Flexible Coprocessor Solutions
`4.4.1 Viterbi Convolutional Decoder Coprocessor
`4.4.2 Turbo Decoder Coprocessor
`4.4.3 Correlator Coprocessor
`4.5 Summary and Conclusions
`
`5 The Use of Programmable DSPs in Antenna Array Processing
`MatthewBromberg and Donald R. Brown
`5.1 Introduction
`5.2 Antenna Array Signal Model
`5.3 Linear Beamforming Techniques
`5.3.1 MaximumLikelihood Derivation
`5.3.2 Least Mean Square Adaptation
`5.3.3 Least Squares Processing
`5.3.4 Blind Signal Adaptation
`5.3.5 Subspace Constraints
`5.3.6 Exploiting Cyclostationarity
`5.3.7 Transmit Beamformer Techniques
`5.4 Multiple Input Multiple Output (MIMO)Signal Extraction
`5.4.1 MIMOLinear System Model
`5.4.2 Capacity of MIMO Communication Channels
`5.4.3 Linear Estimation of Desired Signals in MIMO Communication Systems
`5.4.4 Non-linear Estimationof Desired Signals in MIMO Communication Systems
`5.4.5 Conclusions
`References
`
`6 The Challenges of Software-Defined Radio
`Carl Panasik and Chaitali Sengupta
`6.1 Cellular Communications Standards
`6.2 What is SDR?
`6.3 Digitizing Today’s Analog Operations
`6.4 Implementation Challenges
`6.5 Analog and ADC Issues
`6.6 Channel Filter
`6.7 Delta-Sigma ADC
`6.8 Conclusion
`References
`
`41
`
`4]
`4
`42
`4
`43
`44
`44
`46
`46
`46
`48
`48
`50
`52
`54
`
`57
`
`57
`58
`62
`62
`66
`67
`71
`73
`75
`77
`83
`83
`86
`87
`90
`93
`93
`
`97
`98
`98
`101
`103
`103
`104
`104
`105
`105
`
`IPR2022-00601
`Apple EX1053 Page 4
`
`IPR2022-00601
`Apple EX1053 Page 4
`
`

`

`
`
`
`
`Contents Vii
`
`7 Enabling Multimedia Applications in 2.5G and 3G Wireless Terminals: Challenges and
`Solutions
`Edgar Auslander, Madhukar Budagavi, Jamil Chaoui, Ken Cyr, Jean-Pierre Giacalone,
`Sebastien de Gregorio, Yves Masse, Yeshwant Muthusamy, TiemenSpits and Jennifer Webb
`7.1 Introduction
`7.1.1 “DSPs take the RISC”
`7.2 OMAP H/W Architecture
`7.2.1 Architecture Description
`7.2.2 Advantages of a Combined RISC/DSPArchitecture
`7.2.3 TMS320C55x and Multimedia Extensions
`7.3 OMAP S/W Architecture
`7.4 OMAP Multimedia Applications
`7.4.1 Video
`7.4.2 Speech Applications
`7.5 Conclusion
`Further Reading
`
`8 A Flexible Distributed Java Environment for Wireless PDA Architectures Based on DSP
`Technology
`Gilbert Cabillic, Jean-Philippe Lesot, Frédéric Parain, Michel Bandtre, Valérie Issarny, Teresa
`Higuera, Gérard Chauvel, Serge Lasserre and Dominique D’ Inverno
`8.1 Introduction
`8.2 Java and Energy: Analyzing the Challenge
`8.2.1 Analysis of Java Opcodes
`8.2.2 Analyzing Application Behavior
`8.2.3 Analysis
`8.3 A Modular Java Virtual Machine
`8.3.1 Java Implantation Possibilities
`8.3.2 Approach: a Modular Java Environment
`8.3.3 Comparison with Existing Java Environments
`8.4 Ongoing Work on Scratchy
`8.4.1 Multi-Application Management
`8.4.2 Managing the Processor’s Heterogeneity and Architecture
`8.4.3 Distribution of Tasks and Managementof Soft Real-Time Constraints
`8.4.4 Energy Management
`8.5 Conclusion
`References
`
`9 Speech Coding Standards in Mobile Communications
`Erdal Paksoy, Vishu Viswanathan and Alan McCree
`9.1 Introduction
`9.2 Speech Coder Attributes
`9.3 Speech Coding Basics
`9.3.1 Waveform Coders
`9.3.2 Parametric Coders
`9.3.3 Linear Predictive Analysis-by-Synthesis
`9.3.4 Postfiltering
`9.3.5 VAD/DTX
`9.3.6 Channel Coding
`9.4 Speech Coding Standards
`9.4.1] ITU-T Standards
`9.4.2 Digital Cellular Standards
`9.4.3 Wideband Standards
`
`107
`
`107
`107
`111
`111
`113
`113
`114
`116
`116
`116
`117
`117
`
`119
`
`119
`120
`120
`121
`125
`127
`127
`129
`131
`132
`133
`133
`133
`133
`133
`134
`
`137
`
`137
`138
`139
`141
`141
`143
`146
`146
`146
`147
`147
`148
`152
`
`IPR2022-00601
`Apple EX1053 Page 5
`
`IPR2022-00601
`Apple EX1053 Page 5
`
`

`

`
`
`Vili
`
`.5 Speech Coder Implementation
`9.5.1 Specification and Conformance Testing
`9.5.2 ETSI/ITU Fixed-Point C
`9.5.3 DSP Implementation
`9.6 Conclusion
`Acknowledgements
`References
`
`I 9
`
`153
`153
`154
`155
`155
`156
`156
`
`10 Speech Recognition Solutions for Wireless Devices
`Yeshwant Muthusamy, Yu-Hung Kao and Yifan Gong
`10.1 Introduction
`10.2 DSP Based Speech Recognition Technology
`10.2.1 Problem: Handling Dynamic Vocabulary
`10.2.2 Solution: DSP-GPP Split
`10.3 Overview of Texas Instruments DSP Based Speech Recognizers
`10.3.1 Speech Recognition Algorithms Supported
`10.3.2 Speech Databases Used
`10.3.3 Speech Recognition Portfolio
`10.4 TIESR Details
`10.4.1] Distinctive Features
`10.4.2 GrammarParsing and Model Creation
`10.4.3 Fixed-Point ImplementationIssues
`10.4.4 Software Design Issues
`10.5 Speech-Enabled Wireless Application Prototypes
`10.5.1 Hierarchical Organization of APIs
`10.5.2 InfoPhone
`10.5.3 Voice E-mail
`10.5.4 Voice Navigation
`10.5.5 Voice-Enabled Web Browsing
`10.6 Summary and Conclusions
`References
`
`11 Video and Audio Coding for Mobile Applications
`Jennifer Webb and Chuck Lueck
`11.1 Introduction
`11.2 Video
`11.2.1 Video Coding Overview
`11.2.2 Video Compression Standards
`11.2.3 Video Coding on DSPs
`11.2.4 Considerations for Mobile Applications
`11.3 Audio
`11.3.1] Audio Coding Overview
`11.3.2 Audio Compression Standards
`11.3.3 Audio Coding on DSPs
`11.3.4 Considerations for Mobile Applications
`11.4 Audio and Video Decode on a DSP
`References
`
`12 Security Paradigm for Mobile Terminals
`Edgar Auslander, Jerome Azema, Alain Chateau and Loic Hamon
`12.1 Mobile Commerce General Environment
`12.2 Secure Platform Definition
`12.2.] Security Paradigm Alternatives
`12.2.2 Secure Platform Software Component
`12.2.3 Secure Platform Hardware Component
`
`160
`
`160
`160
`161
`16]
`161
`16]
`161
`162
`165
`165
`166
`167
`168
`168
`169
`171
`172
`173
`174
`175
`176
`
`179
`
`179
`18]
`182
`186
`187
`188
`190
`19]
`193
`195
`196
`198
`200
`
`201
`
`202
`203
`204
`204
`205
`
`IPR2022-00601
`Apple EX1053 Page 6
`
`IPR2022-00601
`Apple EX1053 Page 6
`
`

`

`
`
`
`
` Contents ix
`
`12.3 Software Based Security Component
`12.3.1 Java and Security
`12.3.2 Definition
`12.3.3 Features for Security
`12.3.4 Dependency on OS
`12.4 Hardware Based Security Component: Distributed Security
`12.4.1] Secure Mode Description
`12.4.2 Key Management
`12.4.3 Data Encryption and Hashing
`12.4.4 Distributed Security Architecture
`12.4.5 Tampering Protection
`12.5 Secure Platform in Digital Base Band Controller/MODEM
`12.6 Secure Platform in Application Platform
`12.7 Conclusion
`
`13 Biometric Systems Applied To Mobile Communications
`Dale R. Setlak and Lorin Netsch
`13.1 Introduction
`13.2 The Speaker Verification Task
`13.2.1 Speaker Verification Processing Overview
`13.2.2 DSP-Based Embedded Speaker Verification
`13.3 Live Fingerprint Recognition Systems
`13.3.1 Overview
`13.3.2 Mobile Application Characterization
`13.3.3 Concept of Operations
`13.3.4 Critical Performance Metrics
`13.3.5 Basic Elements of the Fingerprint System
`13.3.6 Prototype Implementation
`13.3.7 Prototype System Processing
`13.4 Conclusions
`References
`
`14 The Role of Programmable DSPsin Digital Radio
`Trudy Stetzler and Gavin Ferris
`14.1 Introduction
`14.2 Digital Transmission Methods
`14.3 Eureka-147 System
`14.3.1 System Description
`14.3.2 Transmission Signal Generation
`14.3.3 Receiver Description
`14.4 IBOC
`14.5 Satellite Systems
`14.6 Conclusion
`References
`
`15 Benchmarking DSP Architectures for Low Power Applications
`David Hwang, Cimarron Mittelsteadt and Ingrid Verbauwhede
`15.1 Introduction
`15.2 LPC Speech Codec Algorithm
`15.2.1 Segmentation
`15.2.2 Silence Detection
`15.2.3 Pitch Detection Algorithm
`15.2.4 LPC Analysis — Vocal Tract Modeling
`15.2.5 Bookkeeping
`
`205
`205
`205
`206
`207
`207
`208
`210
`211
`212
`213
`214
`215
`215
`
`217
`
`217
`219
`219
`224
`225
`225
`226
`226
`228
`233
`247
`248
`251
`251
`
`253
`
`253
`254
`255
`255
`262
`265
`279
`284
`285
`286
`
`287
`
`287
`288
`288
`288
`289
`289
`290
`
`IPR2022-00601
`Apple EX1053 Page 7
`
`IPR2022-00601
`Apple EX1053 Page 7
`
`

`

`I
`
`15.3 Design Methodology
`15.3.1 Floating-Point to Fixed-Point Conversion
`15.3.2 Division Algorithm
`15.3.3 HardwareAllocation
`15.4 Platforms
`15.4.1 Texas Instruments TI C54x
`15.4.2 Texas Instruments TI C55x
`15.4.3 Texas Instruments TI C6x
`15.4.4 Ocapi
`15.4.5 A\RT Designer
`15.5 Final Results
`15.5.] Area Estimate
`15.5.2 Power Estimate
`15.6 Conclusions
`Acknowledgements
`References
`
`16 Low Power Sensor Networks
`Alice Wang, Rex Min, Masayuki Miyazaki, Amit Sinha and Anantha Chandrakasan
`16.1 Introduction
`16.2 Power-Aware Node Architecture
`16.3 Hardware Design Issues
`16.3.1 Processor Energy Model
`16.3.2 DVS
`16.3.3 Leakage Considerations
`16.4 Signal Processing in the Network
`16.4.1 Optimizing Protocols
`16.4.2 Energy-Efficient System Partitioning
`16.5 Signal Processing Algorithms
`16.5.1 Energy-Agile Filtering
`16.5.2 Energy-Agile Data Aggregation
`16.6 Signal Processing Architectures
`16.6.1 Variable-Length Filtering
`16.6.2 Variable Precision Architecture
`16.7 Conclusions
`References
`
`17 The Pleiades Architecture
`Arthur Abnous, Hui Zhang, Marlene Wan, George Varghese, Vandana Prabhu, Jan Rabaey
`17.1 Goals and General Approach
`17.2 The Pleiades Platform — The Architecture Template
`17.3 The Control Processor
`17.4 Satellite Processors
`17.5 Communication Network
`17.6 Reconfiguration
`17.7 Distributed Data-Driven Control
`17.7.1 Control Mechanism for Handling Data Structures
`17.7.2 Summary
`17.8 The Pleiades Design Methodology
`17.9 The P1 Prototype
`17.9.1 P1 Benchmark Study
`17.10 The Maia Processor
`17.10.1 Control Processor
`17.10.2 Address Generator Processor
`
`
`
`290
`290
`299
`293
`293
`293
`294
`294
`294
`294
`294
`295
`295
`297
`298
`298
`
`299
`
`299
`300
`302
`303
`304
`306
`311
`ole
`313
`317
`318
`319
`320
`321
`322
`324
`324
`
`327
`
`327
`329
`331
`332
`334
`338
`339
`342
`345
`345
`348
`350
`352
`353
`353
`
`IPR2022-00601
`Apple EX1053 Page 8
`
`IPR2022-00601
`Apple EX1053 Page 8
`
`

`

`SeULEELECeeeeeCe
`
`17.10.3 MemoryUnits
`17.10.4 Multiply-Accumulate Unit
`17.10.5 Arithmetic/Logic Unit
`17.10.6 Embedded FPGA
`17.10.7 Maia Results
`17.11 Summary
`References
`
`18 Application Specific Instruction Set Architecture Extensions for DSPs
`Jean-Pierre Giacalone
`18.1 The Need for Instruction Set Extensibility in a Signal Processor
`18.2 ISA Extension Capability of the TMS320C55x Processor
`18.2.1 Control Modes
`18.2.2 Dataflow Modes
`18.2.3 Typical C55x Extension Datapath Architecture
`18.2.4 Integration in Software DevelopmentTools
`18.3 Domains of Applications and Practical Examples
`18.4 ISA Extensions Design Flow
`References
`
`19 The Pointing Wireless Device for Delivery of Location Based Applications
`Pamela Kerwin, John Ellenby and Jeffrey Jay
`19.1 Next Generation Wireless Devices
`19.2 The Platform
`19.3 New Multimedia Applications
`19.4 Location Based Information
`19.5 Using Devices to Summon Information
`19.6 Pointing to the Real World
`19.7 Pointing Greatly Simplifies the User Interface
`19.8 Uses of Pointing
`19.9 Software Architecture
`19.9.1 Introduction
`19.9.2 Assumptions
`19.9.3 Overview
`19.9.4 Alternatives
`19.10 Use of the DSPin the Pointing System
`19.11 Pointing Enhanced Location Applications
`19.11.1 Pedestrian Guidance
`19.11.2 Pull Advertising
`19.11.3 Entertainment
`19.12 Benefits of Pointing
`19.12.1 Wireless Yellow Pages
`19.12.2 Internationalization
`19.12.3 GIS Applications
`19.12.4 Entertainment and Gaming
`19.12.5 Visual Aiding and Digital Albums
`19.13 Recommended Data Standardization
`19.13.1 Consideration of Current Standards Efforts
`19.13.2 Device Data Types and Tiered Services
`19.13.3 Data Specifications
`19.13.4 Data Format
`19.13.5 Is it Sufficient?
`19.14 Conclusion
`
`Index
`
`354
`354
`354
`354
`355
`357
`358
`
`361
`
`361
`362
`364
`366
`367
`370
`372
`376
`377
`
`379
`
`379
`379
`379
`380
`380
`380
`381
`382
`382
`382
`382
`383
`383
`383
`384
`385
`386
`386
`387
`387
`387
`387
`388
`388
`388
`388
`388
`389
`391
`393
`393
`
`395
`
`IPR2022-00601
`Apple EX1053 Page 9
`
`IPR2022-00601
`Apple EX1053 Page 9
`
`

`

`iric Systems Applied To Mobile Communications
`—
`
`pion
`
`225
`
`ble 13.1 Verification resources example
`
`gable
`
`“
`Verification task
`2.1%
`8
`8K program IK search
`song distance telephone, ten continuous digits
`——
`
`MIPS
`
`EER
`
`ROM
`
`RAM
`
`is reduced to three. If a text-dependent verification system
`robabilities for the model
`contains a set of speaker-independent word HMMsthatserve as the basis for allowable
`verification phrases, then the parameters of the speaker-independent HMMsmaybeused.
`For example, it may only be necessary to estimate the parameter j.,,, while obtaining all
`ther parameters from the speaker-independent HMMs. Other parameters, such as the
`variance estimates of the Gaussian mixture components may be shared within a model, or
`even between models. Using these simplifications, typical verification models for text-depen-
`dent embedded applications require about 100 parameters per spoken word. However, more
`complex signal processing algorithms have been developed that retain performance with as
`jow as 20 parameters per spoken word[12].
`Program memory storage necessary for speakerverification will depend on the particular
`speaker verification algorithm used. For a typical text-dependent application, the speaker
`verification code will be a small addition to the speech recognition code. Processing require-
`ments for the front-end feature processing will be similar to the speech recognition code.
`Text-dependent recognition requirescalculation of the maximumlikelihoodpath through the
`sequence of HMMs making up the spoken phrase. However, unlike speech recognition
`applications, speaker verification uses the a priori knowledge of the spoken phrase. This
`implies that processing resourceswill be less than those reported for speech recognition. As
`an example,as shown in Table 13.1, except for front-end feature processing, the resources for
`text-dependent speaker verification using ten digit phrases will be about one-tenth ofthat
`reported for digit recognition as reported in Chapter 10.
`
`13.3 Live Fingerprint Recognition Systems
`
`13.3.1 Overview
`
`The ability to implementfingerprint ID systems in mobile devices hinges on the confluence of
`two technology developments: the recent commercial availability of very small, low power,
`high quality fingerprint sensors and the introduction of a new generation of fast, powerful
`DSPs into mobile devices.
`In this section we review the engineering elementsofdesigningfingerprint systems into the
`next generation mobile devices. We briefly characterize the unique aspects of mobile finger-
`print systems, develop the concept of operations for mobile fingerprint systems, and then
`examine the critical performance metrics used to control the system design and ensure its
`adequacy. The fingerprint system is then decomposedintoits basic elements. Each oftheseis
`described along with some possible design approaches and implementation alternatives.
`Lastly, we describe a prototype system architecture based on the Texas Instruments’
`OMAParchitecture, and discuss the design and implementation of a demonstration system
`constructed using this architecture.
`
`IPR2022-00601
`Apple EX1053 Page 10
`
`IPR2022-00601
`Apple EX1053 Page 10
`
`

`

`The Application of Programmable DSPs in Mobile Communications
`226
`Oe
`
`13.3.2 Mobile Application Characterization
`
`13.3.2.1 End-User Benefits
`Live fingerprint recognition on mobile devices makesbasic security and devicepersonaliza.
`tion convenient for the user. Entering usernames, passwords, or PIN numbersinto portable
`devices is inconvenient enough that most people today don’t use the security and persona.
`lization functionsin their portable devices. With live fingerprint recognition,a single touchof
`the sensor deviceis all that is required to determine the user’s identity, configure the device
`for personal use, or authorize access to private resources.
`
`13.3.2.2 Expected Usage Patterns
`
`A portable device typically has a small group of between one and five users. When an
`authorized user picks up the device and presents his/her finger to the sensor,
`the device
`should recognize the user and immediately switch its operation to conform to his/herprofile,
`
`13.3.2.3 Unique Aspects of the Application
`
`Mobile devices require fingerprint sensors that are significantly smaller than any previously
`used. This requirement propagatesinto twoaspectsof the fingerprint system design. Thefirst
`challenge is to build an adequate quality sensor small and light enough for mobile devices.
`The second challenge comes from the fact that smaller sensors generate imagesof smaller
`sections of skin. This meansless data is available for comparison than with the largersensors
`typically used for fingerprint recognition. To successfully match smallerfingerprint images
`the sensor must generate higher quality and more consistent images, and the matcheralgo-
`rithm must be designed to take advantage of the higher quality data.
`Alternatively, some systemsrequire the userto slide his finger slowly acrossthe sensor, to
`increasethe areaoffinger surface imaged. This motionis called swiping. Whilethis approach
`generates imagery ofa larger area ofskin, it seriously distorts the skin andhassignificant
`operational and performanceliabilities.
`The prototype application discussed later in this chapter uses an AuthenTec AES-4000
`sensor with a sensing area just under | cm’. Systems using even smaller sensorsare under
`developmentat several fingerprint system suppliers.
`
`13.3.3 Concept of Operations
`
`The operational concepts underpinning most fingerprint authentication systems revolve
`around three classes of user events: enrollments, verifications, and identifications. Each of
`these event classes is described below from ahigh-level process view. The procedures undet-
`lying these processes are discussedlater in this chapter.
`
`13.3.3.1 Enrollment
`
`Enrollmentis the process of authorizing a new person to use the mobile device.In a typic#!
`scenario, the ownerof the device authorizes a person to use the device by: authenticaling
`himself/herself to the device as the owner, creating a new user profile with the desired
`
`IPR2022-00601
`Apple EX1053 Page 11
`
`IPR2022-00601
`Apple EX1053 Page 11
`
`

`

`Yr
`
`piometric Systems Applied To Mobile Communications
`
`ss
`
`227
`
`rivileges on the device, and then training the device to recognize the new user’sfingerprints.
`Typically the systemis trained to recognize twoorthree fingers for each personin case injury
`makes one finger unavailable.
`The process of training the fingerprint system to recognize a new finger can be broken
`down logically into the following steps:
`e Collection of system training data samples
`Feature quality analysis
`¢ Template generation
`e Template storage
`
`Collection of Training Data Samples
`The systemcollects several viewsof a finger, prompting the newuserto lift and replace their
`finger on the fingerprint sensor several times. Each finger placementis considered as one
`view. Each view may consist of a sequence of image framesthat taken together define a view.
`
`13.3.3.2 Feature Quality Analysis
`
`The collected samples (called views) are analyzedto extract the features that will be used for
`matching. The system thenassessesthe quantity and quality of matchable feature data present
`in the views, and estimates the probable robustness of that feature data. The results of this
`analysis determine whetherthe system canusethis set of views for enrollment, or if more, or
`better, data are needed.If the data are insufficient, the system may request more viewsof the
`same finger or request the new userto present a different finger.
`
`Template Generation
`If the data is sufficient for enrollment, the system assemblesthe best of the available data and
`formats it into a template that will be used as the reference for subsequent matching of this
`finger.
`
`Template Storage
`The resulting template is then stored under an appropriate encryption schemefor recall during
`subsequent verification and identification operations. Templates can be stored on any media
`that can hold digital data. On mobile devices templates are typically stored in flash memory.
`
`13.3.3.3. Verification (Claimed Identity Verification)
`
`Verification is the process of authenticating a claimed user identity. A verification event
`occurs when: (1) a user indicates his/her identity to the system (usually by typing in a
`username) and (2) the system verifies the claimed identity by comparing the user’s live
`fingerprint to the template stored for that username. This type of comparison is often called
`a one-to-one comparison because only one stored template is comparedtothelive fingerprint.
`Verification processes generally require significantly less computational horsepower to
`perform than identification processes, and may be more reliable. However, verification is
`generally less convenient for the user as the username must be entered manually. Given that
`user convenience is a primary requirementfor fingerprint systems on mobile devices, veri-
`
`IPR2022-00601
`Apple EX1053 Page 12
`
`IPR2022-00601
`Apple EX1053 Page 12
`
`

`

`The Application of Programmable DSPs in Mobile Communication,
`228
`$$Oe
`
`fication processes are probably inappropriate and identification processes (discussed in the
`next section)are preferred.In situations where only one person uses a device (which maybeg
`significant percentage of devices) the identification process essentially devolves to a simple
`verification, so the performance penalty is minimal.
`
`Data Collection
`The system typically collects one view of the finger, which may consist of a sequenceof
`image frames. For extremely small sensors, it may be necessary to collect multiple views of
`the finger to accumulate enough data to perform the fingerprint match.
`
`Feature Analysis
`The collected images are analyzed using various forms of pattern recognition algorithmsto
`extract the features to be used for matching.
`
`Matching to a Template
`Thedata from the live finger is comparedto the stored template for the claimed identity anda
`probability that the claimed identity is true is estimated from the matchresults. The system
`returns a binary result. The claimed identity is either true orfalse.
`
`13.3.3.4 Identification (Unassisted Identification)
`
`Identification is the process of finding the current user’s identity from a list of possible
`identities, based solely on the user’s live fingerprint. Identification processes do notrequire
`the user to enter a usernameor any other co-joined authentication. Instead, a single touch of
`the fingerprint sensor is sufficient. Identification processes typically require significantly
`more computational power than verification. Additionally, in identification processes both
`the accuracy andthelatency ofthe process are not constant, as they are functionsofthesize of
`the reference dataset being searched.
`From the process perspective, identification is similar to verification with two notable
`exceptions: (1) no usernameis entered, and (2) the system must perform an indexed search
`ofall of the possible enrolled templatesto find the matching templateif it exists in the dataset.
`The result of the processis either the selected ID or an indication that the presentedfingeris
`not in the dataset.
`Theidentification process, with its one-step usage paradigm,is significantly bettersuited to
`convenient personalization than the verification process.
`
`13.3.4 Critical Performance Metrics
`
`13.3.4.1 Biometric Performance
`Biometric performance measures evaluate how well the system does the job ofrecognizing
`and differentiating people. At the system level, there are two generally accepted classes of
`problemsto be avoided in these recognition systems. Thefirst class of problems occurs when
`the system cannot acquire a reasonable quality image ofthe finger. These usability problems
`are mostly associated with the sensoritself, and are called “failure to acquire” errors. In some
`systemsavailable today, acquisition failure errors dominate the behavior of the system. The
`secondclass of problems occurs whenthe system has adequate imagery but makesanerror in
`
`IPR2022-00601
`Apple EX1053 Page 13
`
`IPR2022-00601
`Apple EX1053 Page 13
`
`

`

`
`
`Biometric Systems Applied To Mobile Communications 229I
`
`rforming the pattern recognition. This second class of problems is more generally asso-
`ciated with the pattern matching software, and can be categorized in classical terms as false
`accept errors (Type 2) and false reject errors (Type 1).
`
`Usability — Ability to Acquire
`Mobile communication devices are rapidly becoming a ubiquitous part of our everyday
`environment. As such, the fingerprint systems will have to work for everyone’s fingers.
`Failure to operate with fingers that fall outside of a norm — suchas elderly, sweaty or dry
`fingers — will not be acceptable. The systemswill have to work in a wide range of environ-
`ments; not just the office and the car, but also the tennis court, the garage, and the ski lodge.
`Manyfingerprint sensors are extremely sensitive to the conditionof the finger skin that they
`must image. Somesensors available today successfully image young healthy fingers, but are
`unable to image elderly fingers or fingers with dry skin. Some are unable to function in
`environments more demanding than a clean office. And yet, some sensors can adequately
`handle all of these conditions.
`The Ability-to-Acquire metric measures a system’s ability to capture usable fingerprint
`images overthe range of population demographics, usage patterns, and environmental condi-
`tions appropriate for that intended application. It can be represented as the expected percentage
`of successful finger imaging events over the ranges appropriate for a particular application.
`For general-purpose mobile communications and information devices we believe that the
`fingerprint system’s ability to acquire fingerprints should be in the range of 99.99%, over a
`population demographic that represents the entire world population and includes both clean
`and slightly contaminated fingers, and over a wide range of both indoor and outdoorenvir-
`onments.
`
`Identification/Verification Accuracy
`Identification and verification accuracies are usually represented as the percentage of identi-
`fication/verification events in which the system delivers an inappropriate response; either
`incorrectly rejecting a finger that should match(false reject), or incorrectly accepting a finger
`that should not match (false accept). Identification accuracy and verification accuracy (while
`using the same type of error metrics) are best treated for this discussion as two different kinds
`of specifications that are associated with two different implementationsoffingerprint authen-
`tication systems, as discussedearlier in this chapter.
`
`Verification Accuracy
`There are two classes of measurementtraditionally used to quantify identification/verification
`accuracy. These are the False Accept Rates (FARs)and the False Reject Rates (FRRs). We
`believe that mobile communications device applications when used in verification mode
`require FARs of 0.1% or less (which is sometimes considered similar to the probability of
`someoneintelligently guessing a user-selected four-digit PIN).
`Forthis type oflive fingerprint recognizer, false reject errors come in two varieties. Some-
`times a valid user will place his finger on the sensor and beinitially rejected, but will
`immediately try again, repositioning the fingeron the sensor, and be accepted. This is called
`a nuisance reject. It is a special case that only occursin live fingerprint systems, where the
`user can retry immediately. Our informal experience suggests that nuisance reject rates
`exceeding the 5-7% range can degrade the user experience and should be avoided. The
`
`IPR2022-00601
`Apple EX1053 Page 14
`
`IPR2022-00601
`Apple EX1053 Page 14
`
`

`

`
`
`
`
`230 The Application of Programmable DSPs in Mobile CommunicationsaOetons
`
`second and far moreserious type of false reject is the denial-of-service event.In this type of
`event,
`the system fails to accept a valid user’s fingers even after several retry attempts,
`Clearly, for user satisfaction reasons, the denial-of-service reject should be avoided. We
`believe that denial-of-service FRRs of 0.1% or less will be required for ubiquitous deploy-
`ment.
`
`Identification Accuracy
`False Accept Errors
`Whena system performsanidentification event, it must in essence comparethelivefinger-
`print to all of the templates that are considered possible matches for thatlive finger. For
`comparison, when an non-enrolled finger is presented to the system,a verification function
`comparesthe finger to only one template. Hence it has only one opportunity to makea false
`accepterror.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket