FIELD OF TECHNOLOGY
[0001] A new hearing instrument is provided with a receiver configured for reception of
a broadcasted message and an authenticator configured for authentication of the transmitter
of the broadcasted message, and wherein the new hearing instrument is further configured
for converting the broadcasted message into an acoustic signal for transmission towards
an eardrum of a user of the new hearing instrument upon successful authentication
of the transmitter of the broadcasted message.
BACKGROUND
[0002] Recently hearing aids have emerged that are capable of presenting sound received
from various sources to a user of the hearing aid. Examples of sources include mobile
phones, radios, media players, companion microphones, broadcasting systems, e.g. used
in a public place, e.g. in a church, an auditorium, a theatre, a cinema, etc., public
address systems, e.g. used in a railway station, an airport, a shopping mall, etc.,
etc.
[0003] For example, it is well known to use a telecoil to magnetically pick up audio signals
generated, e.g., by telephones, FM systems (with neck loops), and induction loop systems
(also called "hearing loops"), whereby sound may be transmitted to hearing aids with
a high signal to noise ratio. More recently, hearing aids have been equipped with
radio circuits for reception of radio signals, e.g. replacing or supplementing telecoils,
for reception of streamed audio in general, such as streamed music and speech from
media players, such as MP3-players, TV-sets, etc. Hearing aids have also emerged that
connect with various sources of audio signals through a short-range network, e.g.
including Bluetooth technology, e.g. to interconnect the hearing aid with cellular
phones, audio headsets, computer laptops, personal digital assistants, digital cameras,
etc. Other radio networks have also been suggested, namely HomeRF, DECT, PHS, Wireless
LAN (WLAN), or other proprietary networks.
[0004] EP2337377 discloses an assistive listening system suitable for servicing a multitude of body
worn listening devices in a wireless environment.
SUMMARY
[0005] In some situations, for example in a public place, it is desirable for a user wearing
a hearing instrument to be able to listen to broadcasted messages, such as public
announcements, e.g. train, ship or flight departures or delays, with certainty that
the transmitter of the broadcasted messages is authentic.
[0006] Thus, there is a need for a hearing instrument capable of authentication of a transmitter
of broadcasted messages.
[0007] Accordingly, a new hearing instrument, according to the subject-matter of claim 1,
is provided.
[0008] A method of authenticating broadcasted messages, according to the subject-matter
of claim 13, is also provided.
[0009] Further, a broadcasting system, according to the subject-matter of claim 15, is provided.
[0010] The hearing instrument may be a hearing aid, such as a BTE, RIE, ITE, ITC, CIC, etc,
a binaural hearing aid; an Ear-Hook, In-Ear, On-Ear, Over-the-Ear, Behind-the-Neck,
Helmet, Headguard, etc, headset, headphone, earphone, ear defender, earmuff, etc.
The broadcasted message may be a text message that is converted into speech in the
hearing instrument. Preferably, the broadcasted message is a spoken message. Throughout
the present disclosure a broadcasted message is a message that can be received by
a plurality of receivers in any form it may take from generation of the message, e.g.
the acoustic output from a human making an announcement, to transmission towards an
eardrum of a user of the hearing, including the digitized message in a form suitable
for wireless transmission and in a form suitable for signal processing in the hearing
instrument. The hearing instrument may be configured for muting at least one other
signal received by the hearing instrument, for example the signal from the microphone(s)
of the hearing instrument, during transmission of the broadcasted message towards
the eardrum of the user of the hearing instrument, upon successful authentication
of the transmitter of the broadcasted message. In this way, the user is allowed to
concentrate on announcements while possible distractions are reduced.
[0011] The hearing instrument may be configured for ignoring the broadcasted message upon
failed authentication of the transmitter of the broadcasted message, so that the hearing
instrument user will not be bothered with messages from unauthorized transmitters.
[0012] The hearing instrument may have a mixer with an input connected to an output of the
radio receiving the broadcasted message and other inputs connected to other transmitters
of audio signals, such as microphone(s) of the hearing instrument, and an output providing
an audio signal that is a weighted combination of the audio signals input to the mixer.
[0013] In the mixer, muting may be performed by setting the weights of other signals than
the broadcasted message to zero.
[0014] In the mixer, ignoring messages from unauthorized transmitters may be performed by
setting the weight of the broadcasted message to zero.
[0015] In the event that the authenticator does successfully authenticate the transmitter
of the broadcasted message, the hearing instrument may be configured to adjust the
weights of the mixer so that other signals currently transmitted to the user are attenuated
during transmission of the broadcasted message to the user so that the broadcasted
message can be clearly heard by the user without the user simultaneously loosing connection
with other signals received by the hearing instrument. For example, attenuation of
acoustic signals from the surroundings of the user received by a microphone of the
hearing instrument during transmission of the broadcasted message, allows the user
to stay connected with the surroundings while simultaneously listening to the broadcasted
message.
[0016] The hearing instrument may simultaneously receive more than one authenticated broadcasted
message; i.e. one or more broadcasted messages may be received during ongoing reception
of a previous broadcasted message, whereby more than one authenticated broadcasted
message may overlap fully or partly in time.
[0017] Such a situation may be handled in various ways. For example, broadcasted messages
may have assigned priorities and may be transmitted together with information on the
priority, e.g. an integer, e.g. larger than or equal to 1, e.g. the lower the integer,
the higher the priority. Alarm messages may for example have the highest priority,
while traffic announcements may have the second highest priority, and possible commercials
may have the lowest priority.
[0018] Successfully authenticated broadcasted messages may be presented to the hearing instrument
user one at the time in their order of priority, e.g. an authenticated broadcasted
message of highest priority may be transmitted to the hearing instrument user without
delay, while other broadcasted messages are stored intermediately for subsequent presentation
to the hearing instrument user in their order of priority.
[0019] Alternatively, successfully authenticated broadcasted messages may be presented to
the hearing instrument user one at the time in the same order in which they have been
received by the hearing instrument.
[0020] Alternatively, successfully authenticated broadcasted messages may be transmitted
to the user of the hearing instrument with substantially unchanged timing with relation
to each other. The mixer may treat each individual successfully authenticated broadcasted
message as a separate input to the mixer similar to other audio transmitters input
to the mixer as explained above. The individual successfully authenticated broadcasted
messages may be weighted in the mixer, e.g. according to their priority.
[0021] The hearing instrument may be configured to always mute one or more other signals
received by the hearing instrument during transmission of a broadcasted message of
highest priority towards the eardrum of the user of the hearing instrument.
[0022] The hearing instrument may have a user interface, e.g. a push button, a remote control,
etc. so that the user can switch muting of other signals on and off as desired in
order to be able to or not be able to, respectively, continue to listen to other sound
signals while receiving a broadcast, as desired.
[0023] The user interface may further include means for user adjustment of the weights of
the combination of the input audio signals, such as a dial, or a push button for incremental
adjustment.
[0024] In order for the hearing instrument to be able to authenticate the transmitter of
a broadcasted message, an electronic signature uniquely identifying the transmitter
of the broadcasted message may be included in the broadcasted message.
[0025] Preferably, the electronic signature is encrypted for secure authentication of the
transmitter of the broadcasted message.
[0026] The electronic signature may include a digital certificate issued by a certificate
authority.
[0027] The electronic signature may include a hash code, such as a message authentication
code, in order for the hearing instrument to be able to authenticate the transmitter
of the broadcasted message in a cryptographically simple way.
[0028] Signal processing in the new hearing instrument may be performed by dedicated hardware
or may be performed in one or more signal processors, or performed in a combination
of dedicated hardware and one or more signal processors.
[0029] As used herein, the terms "processor", "signal processor", etc., are intended to
refer to CPU-related entities, either hardware, a combination of hardware and software,
software, or software in execution.
[0030] For example, a "processor", "signal processor", etc., may be, but is not limited
to being, a process running on a processor, a processor, an object, an executable
file, a thread of execution, and/or a program.
[0031] By way of illustration, the terms "processor", "signal processor", etc., designate
both an application running on a processor and a hardware processor. One or more "processors",
"signal processors", and the like, or any combination hereof, may reside within a
process and/or thread of execution, and one or more "processors", "signal processors",
etc., or any combination hereof, may be localized on one hardware processor, possibly
in combination with other hardware circuitry, and/or distributed between two or more
hardware processors, possibly in combination with other hardware circuitry.
BRIEF DESCRIPTION OF THE DRAWINGS
[0032] In the following, preferred embodiments of the new hearing instrument are explained
in more detail with reference to the drawing, wherein:
Fig. 1 schematically illustrates electronic circuitry of the new hearing instrument,
Fig. 2 schematically illustrates operation of the authenticator utilizing message
authentication codes, and
Fig. 3 schematically illustrates operation of the authenticator utilizing digital
certificates.
DETAILED DESCRIPTION OF THE DRAWINGS
[0033] The new method and hearing instrument will now be described more fully hereinafter
with reference to the accompanying drawings, in which various examples of the new
method and hearing instrument are illustrated. The new method and hearing instrument
according to the appended claims may, however, be embodied in different forms and
should not be construed as limited to the examples set forth herein. Rather, these
examples are provided so that this disclosure will be thorough and complete, and will
fully convey the scope of the appended claims to those skilled in the art.
[0034] It should be noted that the accompanying drawings are schematic and simplified for
clarity, and they merely show details which are essential to the understanding of
the new method and hearing instrument, while other details have been left out.
[0035] Like reference numerals refer to like elements throughout. Like elements will, thus,
not be described in detail with respect to the description of each figure.
[0036] Fig. 1 schematically illustrates exemplary hearing instrument circuitry 10 of the
new hearing instrument. The illustrated new hearing instrument is a hearing aid that
may be of any suitable mechanical design, e.g. to be worn in the ear canal, or partly
in the ear canal, behind the ear or in the concha, such as the well-known types: BTE,
ITE, ITC, CIC, etc.
[0037] The illustrated hearing instrument circuitry 10 comprises a front microphone 12 and
a rear microphone 14 for conversion of an acoustic sound signal from the surroundings
into corresponding microphone audio signals 16, 18 output by the microphones 14, 16.
The microphone audio signals 16, 18 are digitized in respective A/D converters 20,
22 for conversion of the respective microphone audio signals 16, 18 into respective
digital microphone audio signals 24, 26 that are optionally pre-filtered (pre-filters
not shown) and combined in signal combiner 28, for example for formation of a digital
microphone audio signal 30 with directionality as is well-known in the art of hearing
instruments. The digital microphone audio signal 30 is input to the mixer 32 configured
to output a weighted sum 34 of signals input to the mixer 32. The mixer output 34
is input to a hearing loss processor 36 configured to generate a hearing loss compensated
output signal 38 based on the mixer output 34. The hearing loss compensated output
signal 38 is input to a receiver 40 for conversion into acoustic sound for transmission
towards an eardrum (not shown) of a user of the hearing instrument.
[0038] The illustrated hearing instrument circuitry 10 is further configured to receive
digital audio from various transmitters, such as mobile phones, radios, media players,
companion microphones, broadcasting systems, such as in a public place, e.g. in a
church, an auditorium, a theatre, a cinema, etc., public address systems, such as
in a railway station, an airport, a shopping mall, etc., etc.
[0039] In the illustrated example, digital audio, including broadcasted spoken messages,
is transmitted wirelessly to the hearing instrument and received by the hearing instrument
antenna 42 connected to a radio receiver 44. The radio receiver retrieves the digital
data 46 from the received radio signal, including the digital audio, possible transmitter
identifiers, possible network control signals, etc. Signal extractor 48 extracts the
digital audio 50 from the received digital data 46 and forwards the digital audio
50 to the mixer 32. The digital audio 50 may include audio from a plurality of sources
and thus, the digital audio 50 may form a plurality of input signals for the mixer
32, one input signal for each source of audio.
[0040] As further explained below, digital data of the broadcasted message also contains
data 52 relating to the identity of the transmitter of the broadcasted message. The
signal extractor 48 extracts these data 52 from the digital data and forwards them
to authenticator 54 that is configured to authenticate the transmitter of the broadcasted
message as will be further explained below. Output authentication signal 56 forms
a control input to the mixer 32 for control of the weights of the sum of mixer input
signals.
[0041] In the event that the transmitter of the broadcasted message cannot be authenticated,
the corresponding weight is set to zero in the mixer 32 so that the broadcasted message
62 is not transmitted to the user; rather the broadcasted message 62 is ignored.
[0042] In the event that the transmitter of the broadcasted message is authenticated, the
broadcasted message is transmitted to the user while the other signals are attenuated
during transmission of the broadcasted message. The other signals may also be muted.
The user may enter a command through a user interface of the hearing instrument of
a type well-known in the art, controlling whether the other signals are muted or attenuated.
[0043] The hearing instrument may simultaneously receive more than one authenticated broadcasted
message; i.e. one or more broadcasted messages may be received during ongoing reception
of a previous broadcasted message, whereby more than one authenticated broadcasted
message may overlap fully or partly in time.
[0044] Such a situation may be handled in various ways. For example, broadcasted messages
may have assigned priorities and may be transmitted together with information on the
priority, e.g. an integer, e.g. larger than or equal to 1, e.g. the lower the integer,
the higher the priority. Alarm messages may for example have the highest priority,
while traffic announcements may have the second highest priority, and possible commercials
may have the lowest priority.
[0045] Successfully authenticated broadcasted messages may be handled by the mixer 32 as
separate inputs like the other inputs to the mixer, whereby the mixer includes the
individual broadcasted messages in the weighted sum of inputs output to the processor
36, whereby the broadcasted messages are transmitted to the user with substantially
unchanged timing with relation to each other.
[0046] Alternatively, successfully authenticated broadcasted messages may be transmitted
to the hearing instrument user one at the time.
[0047] The mixer 32 may have memories for storage of broadcasted messages received during
ongoing reception of a previous broadcasted message. Stored broadcasted messages may
then be input to the mixer subsequent to finalized output of the previous broadcasted
message of the mixer 32 in the same order in which they have been received by the
hearing instrument; or, in order of priority, for inclusion in the output of the mixer
32 provided that the broadcasted message in question is successfully authenticated.
[0048] The hearing instrument may be configured to always mute one or more other signals
received by the hearing instrument during transmission of a broadcasted message of
highest priority towards the eardrum of the user of the hearing instrument.
[0049] Fig. 2 illustrates exemplary principles of operation of the authenticator 54 shown
in Fig. 1. The transmitter 60 of broadcasted messages 62 may emit aural messages,
such as departure announcements in an airport. The broadcasted message 62 is transmitted
wirelessly and in digital form to a plurality of receivers. The message 62 is illustrated
in digital form in Fig. 2. A message authentication algorithm 64 is used to calculate
a message authentication code (MAC) 66 from the digitized message 62 in order to authenticate
the transmitter 60 of the message 62 and thereby reduce the risk of spoofing. The
MAC algorithm 64 implements a cryptographic hash function having a private key as
one input and a message of arbitrary length as another input. The MAC algorithm 64
outputs a MAC 66, for example as specified in the various existing standards, such
as ISO/IEC 9797-1 and -2 that define MAC algorithms.
[0050] The message 62 and the MAC 66 are then transmitted together wirelessly as indicated
at 68 to various receivers, one of which resides in one of the new hearing instruments.
As illustrated by process 70, the authenticator 54 of the new hearing instrument inputs
the received message 62 to the same MAC algorithm 64 as used by the transmitter 60
and uses the same private key to calculate a MAC 72 in the authenticator 54. The authenticator
54 then compares the transmitted MAC 66 to the MAC 72 calculated in the authenticator
54, and If the two MACs are identical, the transmitter 60 of the broadcasted message
62 is authenticated, and so is the message 62, since the private keys and the messages
input to the MAC algorithms 64, respectively, have to be identical in order to generate
identical MAC codes 66, 72.
[0051] The output 56 of the authenticator 54 is used to control the weights of the mixer
32 in response to the result of the authentication process as already explained with
reference to Fig. 1.
[0052] The authentication process illustrated in principle in Fig. 2 is relatively simple
and suitable for implementation in a hearing instrument. The private key has to be
distributed to all possible receivers of broadcasted messages from the transmitter
in question. Obviously, the distribution of the private key has to be performed with
care, since anyone in possession of the private key will be able to generate messages
that will be successfully authenticated in the new hearing instruments.
[0053] Fig. 3 illustrates another exemplary principle of operation of the authenticator
54 shown in Fig. 1 in which the private key is only in possession of the authentic
transmitter.
[0054] As in Fig. 2, the transmitter 80 of broadcasted messages 82 may emit aural messages,
such as departure announcements in an airport. The broadcasted message 82 is transmitted
wirelessly and in digital form to a plurality of receivers. The message 82 is illustrated
in digital form in Fig. 3.
[0055] In Fig. 3, the message 82 is authenticated using an asymmetric encryption scheme,
e.g. a digital signature scheme, with a key pair in which one key is the private key
that is in possession of the transmitter 80 to be authenticated. The private key is
used to encrypt the message 82 into a digital signature 88. The other key is a public
key that is distributed to the intended receivers of messages broadcasted by the transmitter
80 and used to decrypt the digital signature for authentication.
[0056] A hashing algorithm 84 calculates a hash code from the digital message 82 and outputs
the hash code to an encryption algorithm 86 that uses the private key to encrypt the
hash code into a digital signature 88 in order to authenticate the transmitter 80
of the message 82 and thereby reduce the risk of spoofing.
[0057] The message 82 and the digital signature 88 are then transmitted together wirelessly
as indicated at 90 to various receivers, one of which resides in one of the new hearing
instruments. As illustrated by process 92, the authenticator 54 of the new hearing
instrument inputs the received message 82 to the same hashing function 84 as used
by the transmitter 80 to calculate a hash code 94 in the authenticator 54. Further,
the authenticator 54 uses decryption algorithm 96 with the public key to decrypt the
digital signature 88 into the hash code 98. The authenticator 54 then compares the
hash code 94 with the hash code 98, and if the hash codes 94, 98 are identical, the
transmitter 80 of the broadcasted message 82 is authenticated, and so is the message
82, since the private key has to be used in order for the public key to decrypt the
digital signature 88 into the correct hash code 98, and the received and transmitted
messages have to be identical for the hashing algorithm 84 to output the same hash
code. The output 56 of the authenticator 54 is used to control the weights of the
mixer 32 in response to the result of the authentication process as already explained
with reference to Fig. 1.
[0058] The authentication scheme of Fig. 3 is somewhat more complex than the authentication
scheme of Fig. 2; however the authentication scheme of Fig. 3 does not require distribution
of a private key.
1. A hearing instrument (10) comprising a radio (44) for reception of a broadcasted message
(82) together with a signature (88), an authenticator (54) configured for authentication
of a transmitter (80) of the broadcasted message based on the signature, and wherein
the hearing instrument is further configured for converting the broadcasted message
into an acoustic signal for transmission towards an eardrum of a user of the hearing
instrument upon successful authentication of the transmitter of the broadcasted message.
2. A hearing instrument according to claim 1, wherein the hearing instrument is further
configured for muting at least one other signal received by the hearing instrument
upon successful authentication of the transmitter of the broadcasted message
3. A hearing instrument according to claim 1, wherein the hearing instrument is further
configured for mixing the broadcasted message with at least one other signal received
by the hearing instrument upon successful authentication of the transmitter of the
broadcasted message, and for converting the mixed output into the acoustic signal
for transmission towards the eardrum of the user of the hearing instrument.
4. A hearing instrument according to any of the preceding claims, wherein the hearing
instrument is further configured for ignoring the broadcasted message upon failed
authentication of the transmitter of the broadcasted message.
5. A hearing instrument according to any of the preceding claims, wherein the hearing
instrument is further configured for mixing a plurality of broadcasted messages, parts
of which are received simultaneously by the hearing instrument,
upon successful authentication of the respective transmitters of the plurality of
broadcasted messages, and for converting a mixed output into the acoustic signal
for transmission towards the eardrum of the user of the hearing instrument.
6. A hearing instrument according to any of claims 1 - 4, wherein the hearing instrument
is further configured for storing a first broadcasted message that is received during
transmission of a second broadcasted message towards the eardrum of the user of the
hearing instrument.
7. A hearing instrument according to claim 6, wherein the hearing instrument is further
configured for converting the stored first broadcasted message into the acoustic signal
for transmission towards the eardrum of the user of the hearing instrument.
8. A hearing instrument according to claim 7, wherein stored first broadcasted messages
are converted into the acoustic signal for transmission towards the eardrum of the
user of the hearing instrument in the order in which they are received by the hearing
instrument.
9. A hearing instrument according to claim 6 or 7, wherein stored first broadcasted messages
are converted into the acoustic signal for transmission towards the eardrum of the
user of the hearing instrument in an order of priority.
10. A hearing instrument according to any of the preceding claims, wherein the signature
includes at least one of a digital certificate issued by a certificate authority and
a hash code.
11. A hearing instrument according to any of the preceding claims, wherein the authenticator
is further configured for decrypting an encrypted message included in the broadcasted
message for authentication of the transmitter of the broadcasted message.
12. A hearing instrument according to any of claims 1 - 10, wherein the authenticator
is further configured for decoding a hash code included in the broadcasted message
for authentication of the transmitter of the broadcasted message.
13. A method of authenticating broadcasted messages, comprising the steps of:
generating a signature (88) identifying a transmitter (80) of a broadcasted message
(82) to be
broadcasted by the transmitter,
broadcasting the signature together with the broadcasted message,
in a hearing instrument (10) receiving the broadcasted message; authenticating the
transmitter of the broadcasted message based on the broadcasted signature,
converting the broadcasted message into an acoustic signal for transmission towards
an eardrum of a user of the hearing instrument upon successful authentication of the
transmitter of the broadcasted message.
14. A method according to claim 13, wherein the step of generating includes the step of:
encrypting the signature, and wherein
the step of authenticating includes the steps of:
decrypting the encrypted signature included in the broadcasted message for authentication
of the transmitter of the broadcasted message.
15. A broadcasting system comprising
a transmitter (80) configured for broadcasting a broadcasted message (82) to a plurality
of hearing instruments (10), comprising an encoder (86) configured for encoding a
signature (88) identifying the transmitter for broadcasting together with broadcasted
messages to be broadcasted, and
a hearing instrument comprising
a radio (44) for reception of the broadcasted message together with the signature,
an authenticator (54) configured for authentication of the transmitter of the broadcasted
message based on the signature, and wherein
the hearing instrument is further configured for converting the broadcasted message
into an acoustic signal for transmission towards an eardrum of a user of
the hearing instrument upon successful authentication of the transmitter of the broadcasted
message.
1. Hörgerät (10), umfassend
ein Funkgerät (44) zum Empfang einer gesendeten Nachricht (82) zusammen mit einer
Signatur (88),
einen Authentifikator (54), der so konfiguriert ist, dass er einen Sender (80) der
gesendeten Nachricht anhand der Signatur authentifiziert, und wobei
das Hörgerät weiter so konfiguriert ist, dass es nach erfolgreicher Authentifizierung
des Senders der gesendeten Nachricht die gesendete Nachricht in ein akustisches Signal
zur Übertragung an ein Trommelfell eines Benutzers des Hörgeräts umwandelt.
2. Hörgerät nach Anspruch 1, wobei das Hörgerät weiter so konfiguriert ist, dass es nach
erfolgreicher Authentifizierung des Senders der gesendeten Nachricht mindestens ein
weiteres vom Hörgerät empfangenes Signal stummschaltet
3. Hörgerät nach Anspruch 1, wobei das Hörgerät weiter so konfiguriert ist, dass es nach
erfolgreicher Authentifizierung des Senders der gesendeten Nachricht die gesendete
Nachricht mit mindestens einem anderen Signal, das von dem Hörgerät empfangen wird,
mischt und das gemischte Ausgangssignal in das akustische Signal zur Übertragung an
das Trommelfell des Benutzers des Hörgeräts umwandelt.
4. Hörgerät nach einem der vorstehenden Ansprüche, wobei das Hörgerät weiter so konfiguriert
ist, dass es die gesendete Nachricht bei fehlgeschlagener Authentifizierung des Senders
der gesendeten Nachricht ignoriert.
5. Hörgerät nach einem der vorstehenden Ansprüche, wobei das Hörgerät weiter so konfiguriert
ist, dass es eine Vielzahl gesendeter Nachrichten mischt, von denen einige gleichzeitig
von dem Hörgerät empfangen werden, nachdem die jeweiligen Sender der Vielzahl gesendeter
Nachrichten erfolgreich authentifiziert wurden, und ein gemischtes Ausgangssignal
in das akustische Signal zur Übertragung an das Trommelfell des Benutzers des Hörgeräts
umwandelt.
6. Hörgerät nach einem der Ansprüche 1 - 4, wobei das Hörgerät weiter so konfiguriert
ist, dass es eine erste gesendete Nachricht speichert, die während der Übertragung
einer zweiten gesendeten Nachricht an das Trommelfell des Benutzers des Hörgeräts
empfangen wird.
7. Hörgerät nach Anspruch 6, wobei das Hörgerät weiter so konfiguriert ist, dass es die
gespeicherte erste gesendete Nachricht in das akustische Signal zur Übertragung an
das Trommelfell des Benutzers des Hörgeräts umwandelt.
8. Hörgerät nach Anspruch 7, wobei gespeicherte erste gesendete Nachrichten in das akustische
Signal zur Übertragung an das Trommelfell des Benutzers des Hörgeräts in der Reihenfolge
umgewandelt werden, in der sie vom Hörgerät empfangen werden.
9. Hörgerät nach Anspruch 6 oder 7, wobei gespeicherte erste gesendete Nachrichten in
das akustische Signal zur Übertragung an das Trommelfell des Benutzers des Hörgerätes
in einer Reihenfolge der Priorität umgewandelt werden.
10. Hörgerät nach einem der vorstehenden Ansprüche, wobei die Signatur mindestens ein
von einer Zertifizierungsstelle ausgestelltes digitales Zertifikat und einen Hash-Code
enthält.
11. Hörgerät nach einem der vorstehenden Ansprüche, wobei der Authentifikator weiter so
konfiguriert ist, dass er eine verschlüsselte Nachricht entschlüsselt, die zur Authentifizierung
des Senders der gesendeten Nachricht in der gesendeten Nachricht enthalten ist.
12. Hörgerät nach einem der Ansprüche 1 - 10, wobei der Authentifikator weiter so konfiguriert
ist, dass er einen Hash-Code entschlüsselt, der zur Authentifizierung des Senders
der gesendeten Nachricht in der gesendeten Nachricht enthalten ist.
13. Verfahren zum Authentifizieren von gesendeten Nachrichten, wobei das Verfahren die
folgenden Schritte umfasst:
Erzeugen einer Signatur (88), die einen Sender (80) einer gesendeten Nachricht (82)
identifiziert, die vom Sender zu versenden ist,
Senden der Signatur zusammen mit der gesendeten Nachricht,
Empfang der gesendeten Nachricht in einem Hörgerät (10); Authentifizierung des Senders
der gesendeten Nachricht anhand der gesendeten Signatur,
Umwandeln der gesendeten Nachricht in ein akustisches Signal zur Übertragung an ein
Trommelfell eines Benutzers des Hörgeräts, nachdem der Sender der gesendeten Nachricht
erfolgreich authentifiziert wurde.
14. Verfahren nach Anspruch 13, wobei der Schritt des Erzeugens den folgenden Schritt
umfasst:
Verschlüsseln der Signatur, und wobei
der Schritt der Authentifizierung den folgenden Schritt umfasst:
Entschlüsselung der in der gesendeten Nachricht enthaltenen verschlüsselten Signatur
zur Authentifizierung des Senders der gesendeten Nachricht.
15. Übertragungssystem, umfassend
einen Sender (80), der so konfiguriert ist, dass er eine gesendete Nachricht (82)
an eine Vielzahl von Hörgeräten (10) sendet, umfassend
einen Codierer (86), der so konfiguriert ist, dass er eine den Sender identifizierende
Signatur (88) verschlüsselt, die zusammen mit gesendeten Nachrichten zu versenden
ist, und einem Hörgerät, umfassend
ein Funkgerät (44) zum Empfang der gesendeten Nachricht zusammen mit einer Signatur,
einen Authentifikator (54), der so konfiguriert ist, dass er den Sender der gesendeten
Nachricht anhand der Signatur authentifiziert, und wobei
das Hörgerät weiter so konfiguriert ist, dass es nach erfolgreicher Authentifizierung
des Senders der gesendeten Nachricht die gesendete Nachricht in ein akustisches Signal
zur Übertragung an ein Trommelfell eines Benutzers des Hörgeräts umwandelt.
1. Instrument auditif (10) comprenant une radio (44) pour la réception d'un message radiodiffusé
(82) conjointement à une signature (88), un dispositif d'authentification (54) configuré
pour l'authentification d'un émetteur (80) du message radiodiffusé sur la base de
la signature, et dans lequel
l'instrument auditif est configuré en outre pour convertir le message radiodiffusé
en un signal acoustique pour la transmission vers un tympan d'un utilisateur de l'instrument
auditif lors de l'authentification réussie de l'émetteur du message radiodiffusé.
2. Instrument auditif selon la revendication 1, dans lequel l'instrument auditif est
configuré en outre pour mettre en sourdine au moins un autre signal reçu par l'instrument
auditif lors de l'authentification réussie de l'émetteur du message radiodiffusé.
3. Instrument auditif selon la revendication 1, dans lequel l'instrument auditif est
configuré en outre pour mélanger le message radiodiffusé avec au moins un autre signal
reçu par l'instrument auditif lors de l'authentification réussie de l'émetteur du
message radiodiffusé, et pour convertir la sortie mélangée dans le signal acoustique
pour la transmission vers le tympan de l'utilisateur de l'instrument auditif.
4. Instrument auditif selon l'une quelconque des revendications précédentes, dans lequel
l'instrument auditif est configuré en outre pour ignorer le message radiodiffusé lors
d'un échec d'authentification de l'émetteur du message radiodiffusé.
5. Instrument auditif selon l'une quelconque des revendications précédentes, dans lequel
l'instrument auditif est configuré en outre pour mélanger une pluralité de messages
radiodiffusés, dont des parties sont reçues simultanément par l'instrument auditif,
lors de l'authentification réussie des émetteurs respectifs de la pluralité de messages
radiodiffusés, et pour convertir une sortie mélangée dans le signal acoustique pour
la transmission vers le tympan de l'utilisateur de l'instrument auditif.
6. Instrument auditif selon l'une quelconque des revendications 1 à 4, dans lequel l'instrument
auditif est configuré en outre pour stocker un premier message radiodiffusé qui est
reçu durant la transmission d'un deuxième message radiodiffusé vers le tympan de l'utilisateur
de l'instrument auditif.
7. Instrument auditif selon la revendication 6, dans lequel l'instrument auditif est
configuré en outre pour convertir les premiers messages radiodiffusés stockés dans
le signal acoustique pour la transmission vers le tympan de l'utilisateur de l'instrument
auditif.
8. Instrument auditif selon la revendication 7, dans lequel des premiers messages radiodiffusés
stockés sont convertis dans le signal acoustique pour la transmission vers le tympan
de l'utilisateur de l'instrument auditif dans l'ordre dans lequel ils sont reçus par
l'instrument auditif.
9. Instrument auditif selon la revendication 6 ou 7, dans lequel des premiers messages
radiodiffusés stockés sont convertis dans le signal acoustique pour la transmission
vers le tympan de l'utilisateur de l'instrument auditif dans un ordre de priorité.
10. Instrument auditif selon l'une quelconque des revendications précédentes, dans lequel
la signature comprend au moins un parmi un certificat numérique émis par une autorité
de certificat et un code de hachage.
11. Instrument auditif selon l'une quelconque des revendications précédentes, dans lequel
le dispositif d'authentification est configuré en outre pour décrypter un message
crypté inclus dans le message radiodiffusé pour l'authentification de l'émetteur du
message radiodiffusé.
12. Instrument auditif selon l'une quelconque des revendications 1 à 10, dans lequel le
dispositif d'authentification est configuré en outre pour décoder un code de hachage
inclus dans le message radiodiffusé pour l'authentification de l'émetteur du message
radiodiffusé.
13. Procédé d'authentification de messages radiodiffusés comprenant les étapes suivantes
:
la génération d'une signature (88) identifiant un émetteur (80) d'un message radiodiffusé
(82) destiné à être radiodiffusé par l'émetteur,
la radiodiffusion de la signature conjointement au message radiodiffusé,
dans un instrument auditif (10), la réception du message radiodiffusé; l'authentification
de l'émetteur du message radiodiffusé sur la base de la signature radiodiffusée,
la conversion du message radiodiffusé en un signal acoustique pour la transmission
vers un tympan d'un utilisateur de l'instrument auditif lors de l'authentification
réussie de l'émetteur du message radiodiffusé.
14. Procédé selon la revendication 13, dans lequel l'étape de génération comprend l'étape
suivante :
le cryptage de la signature, et dans lequel
l'étape d'authentification comprend les étapes suivantes :
le décryptage de la signature cryptée incluse dans le message radiodiffusé pour l'authentification
de l'émetteur du message radiodiffusé.
15. Système de radiodiffusion comprenant
un émetteur (80) configuré pour radiodiffuser un message radiodiffusé (82) à une pluralité
d'instruments auditifs (10), comprenant
un codeur (86) configuré pour coder une signature (88) identifiant l'émetteur pour
la radiodiffusion conjointement aux messages radiodiffusés destinés à être radiodiffusés,
et
un instrument auditif comprenant
une radio (44) pour la réception du message radiodiffusé conjointement à la signature,
un dispositif d'authentification (54) configuré pour l'authentification de l'émetteur
du message radiodiffusé sur la base de la signature, et dans lequel
l'instrument auditif est configuré en outre pour convertir le message radiodiffusé
en un signal acoustique pour la transmission vers un tympan d'un utilisateur de l'instrument
auditif lors de l'authentification réussie de l'émetteur du message radiodiffusé.