(19)
(11) EP 2 804 401 B1

(12) EUROPEAN PATENT SPECIFICATION

(45) Mention of the grant of the patent:
21.11.2018 Bulletin 2018/47

(21) Application number: 13167842.7

(22) Date of filing: 15.05.2013
(51) International Patent Classification (IPC): 
H04R 25/00(2006.01)

(54)

Hearing instrument with an authentication protocol

Hörgerät mit einem Authentifizierungsprotokoll

Instrument auditif avec un protocole d'authentification


(84) Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(43) Date of publication of application:
19.11.2014 Bulletin 2014/47

(73) Proprietor: GN Hearing A/S
2750 Ballerup (DK)

(72) Inventors:
  • Pedersen, Brian Dam
    DK-4100 Ringsted (DK)
  • Siegumfeldt, Peter
    2000 Frederiksberg (DK)
  • Bjørstrup, Hans Henrik
    DK-3500 Værløse (DK)

(74) Representative: Guardian IP Consulting I/S 
Diplomvej, Building 381
2800 Kgs. Lyngby
2800 Kgs. Lyngby (DK)


(56) References cited: : 
EP-A1- 2 337 377
US-A1- 2006 274 747
EP-A1- 2 528 358
   
       
    Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


    Description

    FIELD OF TECHNOLOGY



    [0001] A new hearing instrument is provided with a receiver configured for reception of a broadcasted message and an authenticator configured for authentication of the transmitter of the broadcasted message, and wherein the new hearing instrument is further configured for converting the broadcasted message into an acoustic signal for transmission towards an eardrum of a user of the new hearing instrument upon successful authentication of the transmitter of the broadcasted message.

    BACKGROUND



    [0002] Recently hearing aids have emerged that are capable of presenting sound received from various sources to a user of the hearing aid. Examples of sources include mobile phones, radios, media players, companion microphones, broadcasting systems, e.g. used in a public place, e.g. in a church, an auditorium, a theatre, a cinema, etc., public address systems, e.g. used in a railway station, an airport, a shopping mall, etc., etc.

    [0003] For example, it is well known to use a telecoil to magnetically pick up audio signals generated, e.g., by telephones, FM systems (with neck loops), and induction loop systems (also called "hearing loops"), whereby sound may be transmitted to hearing aids with a high signal to noise ratio. More recently, hearing aids have been equipped with radio circuits for reception of radio signals, e.g. replacing or supplementing telecoils, for reception of streamed audio in general, such as streamed music and speech from media players, such as MP3-players, TV-sets, etc. Hearing aids have also emerged that connect with various sources of audio signals through a short-range network, e.g. including Bluetooth technology, e.g. to interconnect the hearing aid with cellular phones, audio headsets, computer laptops, personal digital assistants, digital cameras, etc. Other radio networks have also been suggested, namely HomeRF, DECT, PHS, Wireless LAN (WLAN), or other proprietary networks.

    [0004] EP2337377 discloses an assistive listening system suitable for servicing a multitude of body worn listening devices in a wireless environment.

    SUMMARY



    [0005] In some situations, for example in a public place, it is desirable for a user wearing a hearing instrument to be able to listen to broadcasted messages, such as public announcements, e.g. train, ship or flight departures or delays, with certainty that the transmitter of the broadcasted messages is authentic.

    [0006] Thus, there is a need for a hearing instrument capable of authentication of a transmitter of broadcasted messages.

    [0007] Accordingly, a new hearing instrument, according to the subject-matter of claim 1, is provided.

    [0008] A method of authenticating broadcasted messages, according to the subject-matter of claim 13, is also provided.

    [0009] Further, a broadcasting system, according to the subject-matter of claim 15, is provided.

    [0010] The hearing instrument may be a hearing aid, such as a BTE, RIE, ITE, ITC, CIC, etc, a binaural hearing aid; an Ear-Hook, In-Ear, On-Ear, Over-the-Ear, Behind-the-Neck, Helmet, Headguard, etc, headset, headphone, earphone, ear defender, earmuff, etc. The broadcasted message may be a text message that is converted into speech in the hearing instrument. Preferably, the broadcasted message is a spoken message. Throughout the present disclosure a broadcasted message is a message that can be received by a plurality of receivers in any form it may take from generation of the message, e.g. the acoustic output from a human making an announcement, to transmission towards an eardrum of a user of the hearing, including the digitized message in a form suitable for wireless transmission and in a form suitable for signal processing in the hearing instrument. The hearing instrument may be configured for muting at least one other signal received by the hearing instrument, for example the signal from the microphone(s) of the hearing instrument, during transmission of the broadcasted message towards the eardrum of the user of the hearing instrument, upon successful authentication of the transmitter of the broadcasted message. In this way, the user is allowed to concentrate on announcements while possible distractions are reduced.

    [0011] The hearing instrument may be configured for ignoring the broadcasted message upon failed authentication of the transmitter of the broadcasted message, so that the hearing instrument user will not be bothered with messages from unauthorized transmitters.

    [0012] The hearing instrument may have a mixer with an input connected to an output of the radio receiving the broadcasted message and other inputs connected to other transmitters of audio signals, such as microphone(s) of the hearing instrument, and an output providing an audio signal that is a weighted combination of the audio signals input to the mixer.

    [0013] In the mixer, muting may be performed by setting the weights of other signals than the broadcasted message to zero.

    [0014] In the mixer, ignoring messages from unauthorized transmitters may be performed by setting the weight of the broadcasted message to zero.

    [0015] In the event that the authenticator does successfully authenticate the transmitter of the broadcasted message, the hearing instrument may be configured to adjust the weights of the mixer so that other signals currently transmitted to the user are attenuated during transmission of the broadcasted message to the user so that the broadcasted message can be clearly heard by the user without the user simultaneously loosing connection with other signals received by the hearing instrument. For example, attenuation of acoustic signals from the surroundings of the user received by a microphone of the hearing instrument during transmission of the broadcasted message, allows the user to stay connected with the surroundings while simultaneously listening to the broadcasted message.

    [0016] The hearing instrument may simultaneously receive more than one authenticated broadcasted message; i.e. one or more broadcasted messages may be received during ongoing reception of a previous broadcasted message, whereby more than one authenticated broadcasted message may overlap fully or partly in time.

    [0017] Such a situation may be handled in various ways. For example, broadcasted messages may have assigned priorities and may be transmitted together with information on the priority, e.g. an integer, e.g. larger than or equal to 1, e.g. the lower the integer, the higher the priority. Alarm messages may for example have the highest priority, while traffic announcements may have the second highest priority, and possible commercials may have the lowest priority.

    [0018] Successfully authenticated broadcasted messages may be presented to the hearing instrument user one at the time in their order of priority, e.g. an authenticated broadcasted message of highest priority may be transmitted to the hearing instrument user without delay, while other broadcasted messages are stored intermediately for subsequent presentation to the hearing instrument user in their order of priority.

    [0019] Alternatively, successfully authenticated broadcasted messages may be presented to the hearing instrument user one at the time in the same order in which they have been received by the hearing instrument.

    [0020] Alternatively, successfully authenticated broadcasted messages may be transmitted to the user of the hearing instrument with substantially unchanged timing with relation to each other. The mixer may treat each individual successfully authenticated broadcasted message as a separate input to the mixer similar to other audio transmitters input to the mixer as explained above. The individual successfully authenticated broadcasted messages may be weighted in the mixer, e.g. according to their priority.

    [0021] The hearing instrument may be configured to always mute one or more other signals received by the hearing instrument during transmission of a broadcasted message of highest priority towards the eardrum of the user of the hearing instrument.

    [0022] The hearing instrument may have a user interface, e.g. a push button, a remote control, etc. so that the user can switch muting of other signals on and off as desired in order to be able to or not be able to, respectively, continue to listen to other sound signals while receiving a broadcast, as desired.

    [0023] The user interface may further include means for user adjustment of the weights of the combination of the input audio signals, such as a dial, or a push button for incremental adjustment.

    [0024] In order for the hearing instrument to be able to authenticate the transmitter of a broadcasted message, an electronic signature uniquely identifying the transmitter of the broadcasted message may be included in the broadcasted message.

    [0025] Preferably, the electronic signature is encrypted for secure authentication of the transmitter of the broadcasted message.

    [0026] The electronic signature may include a digital certificate issued by a certificate authority.

    [0027] The electronic signature may include a hash code, such as a message authentication code, in order for the hearing instrument to be able to authenticate the transmitter of the broadcasted message in a cryptographically simple way.

    [0028] Signal processing in the new hearing instrument may be performed by dedicated hardware or may be performed in one or more signal processors, or performed in a combination of dedicated hardware and one or more signal processors.

    [0029] As used herein, the terms "processor", "signal processor", etc., are intended to refer to CPU-related entities, either hardware, a combination of hardware and software, software, or software in execution.

    [0030] For example, a "processor", "signal processor", etc., may be, but is not limited to being, a process running on a processor, a processor, an object, an executable file, a thread of execution, and/or a program.

    [0031] By way of illustration, the terms "processor", "signal processor", etc., designate both an application running on a processor and a hardware processor. One or more "processors", "signal processors", and the like, or any combination hereof, may reside within a process and/or thread of execution, and one or more "processors", "signal processors", etc., or any combination hereof, may be localized on one hardware processor, possibly in combination with other hardware circuitry, and/or distributed between two or more hardware processors, possibly in combination with other hardware circuitry.

    BRIEF DESCRIPTION OF THE DRAWINGS



    [0032] In the following, preferred embodiments of the new hearing instrument are explained in more detail with reference to the drawing, wherein:

    Fig. 1 schematically illustrates electronic circuitry of the new hearing instrument,

    Fig. 2 schematically illustrates operation of the authenticator utilizing message authentication codes, and

    Fig. 3 schematically illustrates operation of the authenticator utilizing digital certificates.


    DETAILED DESCRIPTION OF THE DRAWINGS



    [0033] The new method and hearing instrument will now be described more fully hereinafter with reference to the accompanying drawings, in which various examples of the new method and hearing instrument are illustrated. The new method and hearing instrument according to the appended claims may, however, be embodied in different forms and should not be construed as limited to the examples set forth herein. Rather, these examples are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the appended claims to those skilled in the art.

    [0034] It should be noted that the accompanying drawings are schematic and simplified for clarity, and they merely show details which are essential to the understanding of the new method and hearing instrument, while other details have been left out.

    [0035] Like reference numerals refer to like elements throughout. Like elements will, thus, not be described in detail with respect to the description of each figure.

    [0036] Fig. 1 schematically illustrates exemplary hearing instrument circuitry 10 of the new hearing instrument. The illustrated new hearing instrument is a hearing aid that may be of any suitable mechanical design, e.g. to be worn in the ear canal, or partly in the ear canal, behind the ear or in the concha, such as the well-known types: BTE, ITE, ITC, CIC, etc.

    [0037] The illustrated hearing instrument circuitry 10 comprises a front microphone 12 and a rear microphone 14 for conversion of an acoustic sound signal from the surroundings into corresponding microphone audio signals 16, 18 output by the microphones 14, 16. The microphone audio signals 16, 18 are digitized in respective A/D converters 20, 22 for conversion of the respective microphone audio signals 16, 18 into respective digital microphone audio signals 24, 26 that are optionally pre-filtered (pre-filters not shown) and combined in signal combiner 28, for example for formation of a digital microphone audio signal 30 with directionality as is well-known in the art of hearing instruments. The digital microphone audio signal 30 is input to the mixer 32 configured to output a weighted sum 34 of signals input to the mixer 32. The mixer output 34 is input to a hearing loss processor 36 configured to generate a hearing loss compensated output signal 38 based on the mixer output 34. The hearing loss compensated output signal 38 is input to a receiver 40 for conversion into acoustic sound for transmission towards an eardrum (not shown) of a user of the hearing instrument.

    [0038] The illustrated hearing instrument circuitry 10 is further configured to receive digital audio from various transmitters, such as mobile phones, radios, media players, companion microphones, broadcasting systems, such as in a public place, e.g. in a church, an auditorium, a theatre, a cinema, etc., public address systems, such as in a railway station, an airport, a shopping mall, etc., etc.

    [0039] In the illustrated example, digital audio, including broadcasted spoken messages, is transmitted wirelessly to the hearing instrument and received by the hearing instrument antenna 42 connected to a radio receiver 44. The radio receiver retrieves the digital data 46 from the received radio signal, including the digital audio, possible transmitter identifiers, possible network control signals, etc. Signal extractor 48 extracts the digital audio 50 from the received digital data 46 and forwards the digital audio 50 to the mixer 32. The digital audio 50 may include audio from a plurality of sources and thus, the digital audio 50 may form a plurality of input signals for the mixer 32, one input signal for each source of audio.

    [0040] As further explained below, digital data of the broadcasted message also contains data 52 relating to the identity of the transmitter of the broadcasted message. The signal extractor 48 extracts these data 52 from the digital data and forwards them to authenticator 54 that is configured to authenticate the transmitter of the broadcasted message as will be further explained below. Output authentication signal 56 forms a control input to the mixer 32 for control of the weights of the sum of mixer input signals.

    [0041] In the event that the transmitter of the broadcasted message cannot be authenticated, the corresponding weight is set to zero in the mixer 32 so that the broadcasted message 62 is not transmitted to the user; rather the broadcasted message 62 is ignored.

    [0042] In the event that the transmitter of the broadcasted message is authenticated, the broadcasted message is transmitted to the user while the other signals are attenuated during transmission of the broadcasted message. The other signals may also be muted. The user may enter a command through a user interface of the hearing instrument of a type well-known in the art, controlling whether the other signals are muted or attenuated.

    [0043] The hearing instrument may simultaneously receive more than one authenticated broadcasted message; i.e. one or more broadcasted messages may be received during ongoing reception of a previous broadcasted message, whereby more than one authenticated broadcasted message may overlap fully or partly in time.

    [0044] Such a situation may be handled in various ways. For example, broadcasted messages may have assigned priorities and may be transmitted together with information on the priority, e.g. an integer, e.g. larger than or equal to 1, e.g. the lower the integer, the higher the priority. Alarm messages may for example have the highest priority, while traffic announcements may have the second highest priority, and possible commercials may have the lowest priority.

    [0045] Successfully authenticated broadcasted messages may be handled by the mixer 32 as separate inputs like the other inputs to the mixer, whereby the mixer includes the individual broadcasted messages in the weighted sum of inputs output to the processor 36, whereby the broadcasted messages are transmitted to the user with substantially unchanged timing with relation to each other.

    [0046] Alternatively, successfully authenticated broadcasted messages may be transmitted to the hearing instrument user one at the time.

    [0047] The mixer 32 may have memories for storage of broadcasted messages received during ongoing reception of a previous broadcasted message. Stored broadcasted messages may then be input to the mixer subsequent to finalized output of the previous broadcasted message of the mixer 32 in the same order in which they have been received by the hearing instrument; or, in order of priority, for inclusion in the output of the mixer 32 provided that the broadcasted message in question is successfully authenticated.

    [0048] The hearing instrument may be configured to always mute one or more other signals received by the hearing instrument during transmission of a broadcasted message of highest priority towards the eardrum of the user of the hearing instrument.

    [0049] Fig. 2 illustrates exemplary principles of operation of the authenticator 54 shown in Fig. 1. The transmitter 60 of broadcasted messages 62 may emit aural messages, such as departure announcements in an airport. The broadcasted message 62 is transmitted wirelessly and in digital form to a plurality of receivers. The message 62 is illustrated in digital form in Fig. 2. A message authentication algorithm 64 is used to calculate a message authentication code (MAC) 66 from the digitized message 62 in order to authenticate the transmitter 60 of the message 62 and thereby reduce the risk of spoofing. The MAC algorithm 64 implements a cryptographic hash function having a private key as one input and a message of arbitrary length as another input. The MAC algorithm 64 outputs a MAC 66, for example as specified in the various existing standards, such as ISO/IEC 9797-1 and -2 that define MAC algorithms.

    [0050] The message 62 and the MAC 66 are then transmitted together wirelessly as indicated at 68 to various receivers, one of which resides in one of the new hearing instruments. As illustrated by process 70, the authenticator 54 of the new hearing instrument inputs the received message 62 to the same MAC algorithm 64 as used by the transmitter 60 and uses the same private key to calculate a MAC 72 in the authenticator 54. The authenticator 54 then compares the transmitted MAC 66 to the MAC 72 calculated in the authenticator 54, and If the two MACs are identical, the transmitter 60 of the broadcasted message 62 is authenticated, and so is the message 62, since the private keys and the messages input to the MAC algorithms 64, respectively, have to be identical in order to generate identical MAC codes 66, 72.

    [0051] The output 56 of the authenticator 54 is used to control the weights of the mixer 32 in response to the result of the authentication process as already explained with reference to Fig. 1.

    [0052] The authentication process illustrated in principle in Fig. 2 is relatively simple and suitable for implementation in a hearing instrument. The private key has to be distributed to all possible receivers of broadcasted messages from the transmitter in question. Obviously, the distribution of the private key has to be performed with care, since anyone in possession of the private key will be able to generate messages that will be successfully authenticated in the new hearing instruments.

    [0053] Fig. 3 illustrates another exemplary principle of operation of the authenticator 54 shown in Fig. 1 in which the private key is only in possession of the authentic transmitter.

    [0054] As in Fig. 2, the transmitter 80 of broadcasted messages 82 may emit aural messages, such as departure announcements in an airport. The broadcasted message 82 is transmitted wirelessly and in digital form to a plurality of receivers. The message 82 is illustrated in digital form in Fig. 3.

    [0055] In Fig. 3, the message 82 is authenticated using an asymmetric encryption scheme, e.g. a digital signature scheme, with a key pair in which one key is the private key that is in possession of the transmitter 80 to be authenticated. The private key is used to encrypt the message 82 into a digital signature 88. The other key is a public key that is distributed to the intended receivers of messages broadcasted by the transmitter 80 and used to decrypt the digital signature for authentication.

    [0056] A hashing algorithm 84 calculates a hash code from the digital message 82 and outputs the hash code to an encryption algorithm 86 that uses the private key to encrypt the hash code into a digital signature 88 in order to authenticate the transmitter 80 of the message 82 and thereby reduce the risk of spoofing.

    [0057] The message 82 and the digital signature 88 are then transmitted together wirelessly as indicated at 90 to various receivers, one of which resides in one of the new hearing instruments. As illustrated by process 92, the authenticator 54 of the new hearing instrument inputs the received message 82 to the same hashing function 84 as used by the transmitter 80 to calculate a hash code 94 in the authenticator 54. Further, the authenticator 54 uses decryption algorithm 96 with the public key to decrypt the digital signature 88 into the hash code 98. The authenticator 54 then compares the hash code 94 with the hash code 98, and if the hash codes 94, 98 are identical, the transmitter 80 of the broadcasted message 82 is authenticated, and so is the message 82, since the private key has to be used in order for the public key to decrypt the digital signature 88 into the correct hash code 98, and the received and transmitted messages have to be identical for the hashing algorithm 84 to output the same hash code. The output 56 of the authenticator 54 is used to control the weights of the mixer 32 in response to the result of the authentication process as already explained with reference to Fig. 1.

    [0058] The authentication scheme of Fig. 3 is somewhat more complex than the authentication scheme of Fig. 2; however the authentication scheme of Fig. 3 does not require distribution of a private key.


    Claims

    1. A hearing instrument (10) comprising a radio (44) for reception of a broadcasted message (82) together with a signature (88), an authenticator (54) configured for authentication of a transmitter (80) of the broadcasted message based on the signature, and wherein
    the hearing instrument is further configured for converting the broadcasted message into an acoustic signal for transmission towards an eardrum of a user of the hearing instrument upon successful authentication of the transmitter of the broadcasted message.
     
    2. A hearing instrument according to claim 1, wherein the hearing instrument is further configured for muting at least one other signal received by the hearing instrument upon successful authentication of the transmitter of the broadcasted message
     
    3. A hearing instrument according to claim 1, wherein the hearing instrument is further configured for mixing the broadcasted message with at least one other signal received by the hearing instrument upon successful authentication of the transmitter of the broadcasted message, and for converting the mixed output into the acoustic signal for transmission towards the eardrum of the user of the hearing instrument.
     
    4. A hearing instrument according to any of the preceding claims, wherein the hearing instrument is further configured for ignoring the broadcasted message upon failed authentication of the transmitter of the broadcasted message.
     
    5. A hearing instrument according to any of the preceding claims, wherein the hearing instrument is further configured for mixing a plurality of broadcasted messages, parts of which are received simultaneously by the hearing instrument,
    upon successful authentication of the respective transmitters of the plurality of broadcasted messages, and for converting a mixed output into the acoustic signal
    for transmission towards the eardrum of the user of the hearing instrument.
     
    6. A hearing instrument according to any of claims 1 - 4, wherein the hearing instrument is further configured for storing a first broadcasted message that is received during transmission of a second broadcasted message towards the eardrum of the user of the hearing instrument.
     
    7. A hearing instrument according to claim 6, wherein the hearing instrument is further configured for converting the stored first broadcasted message into the acoustic signal for transmission towards the eardrum of the user of the hearing instrument.
     
    8. A hearing instrument according to claim 7, wherein stored first broadcasted messages are converted into the acoustic signal for transmission towards the eardrum of the user of the hearing instrument in the order in which they are received by the hearing instrument.
     
    9. A hearing instrument according to claim 6 or 7, wherein stored first broadcasted messages are converted into the acoustic signal for transmission towards the eardrum of the user of the hearing instrument in an order of priority.
     
    10. A hearing instrument according to any of the preceding claims, wherein the signature includes at least one of a digital certificate issued by a certificate authority and a hash code.
     
    11. A hearing instrument according to any of the preceding claims, wherein the authenticator is further configured for decrypting an encrypted message included in the broadcasted message for authentication of the transmitter of the broadcasted message.
     
    12. A hearing instrument according to any of claims 1 - 10, wherein the authenticator is further configured for decoding a hash code included in the broadcasted message for authentication of the transmitter of the broadcasted message.
     
    13. A method of authenticating broadcasted messages, comprising the steps of:

    generating a signature (88) identifying a transmitter (80) of a broadcasted message (82) to be

    broadcasted by the transmitter,

    broadcasting the signature together with the broadcasted message,

    in a hearing instrument (10) receiving the broadcasted message; authenticating the

    transmitter of the broadcasted message based on the broadcasted signature,

    converting the broadcasted message into an acoustic signal for transmission towards an eardrum of a user of the hearing instrument upon successful authentication of the transmitter of the broadcasted message.


     
    14. A method according to claim 13, wherein the step of generating includes the step of:

    encrypting the signature, and wherein

    the step of authenticating includes the steps of:
    decrypting the encrypted signature included in the broadcasted message for authentication of the transmitter of the broadcasted message.


     
    15. A broadcasting system comprising
    a transmitter (80) configured for broadcasting a broadcasted message (82) to a plurality of hearing instruments (10), comprising an encoder (86) configured for encoding a signature (88) identifying the transmitter for broadcasting together with broadcasted messages to be broadcasted, and
    a hearing instrument comprising
    a radio (44) for reception of the broadcasted message together with the signature, an authenticator (54) configured for authentication of the transmitter of the broadcasted message based on the signature, and wherein
    the hearing instrument is further configured for converting the broadcasted message into an acoustic signal for transmission towards an eardrum of a user of
    the hearing instrument upon successful authentication of the transmitter of the broadcasted message.
     


    Ansprüche

    1. Hörgerät (10), umfassend
    ein Funkgerät (44) zum Empfang einer gesendeten Nachricht (82) zusammen mit einer Signatur (88),
    einen Authentifikator (54), der so konfiguriert ist, dass er einen Sender (80) der gesendeten Nachricht anhand der Signatur authentifiziert, und wobei
    das Hörgerät weiter so konfiguriert ist, dass es nach erfolgreicher Authentifizierung des Senders der gesendeten Nachricht die gesendete Nachricht in ein akustisches Signal zur Übertragung an ein Trommelfell eines Benutzers des Hörgeräts umwandelt.
     
    2. Hörgerät nach Anspruch 1, wobei das Hörgerät weiter so konfiguriert ist, dass es nach erfolgreicher Authentifizierung des Senders der gesendeten Nachricht mindestens ein weiteres vom Hörgerät empfangenes Signal stummschaltet
     
    3. Hörgerät nach Anspruch 1, wobei das Hörgerät weiter so konfiguriert ist, dass es nach erfolgreicher Authentifizierung des Senders der gesendeten Nachricht die gesendete Nachricht mit mindestens einem anderen Signal, das von dem Hörgerät empfangen wird, mischt und das gemischte Ausgangssignal in das akustische Signal zur Übertragung an das Trommelfell des Benutzers des Hörgeräts umwandelt.
     
    4. Hörgerät nach einem der vorstehenden Ansprüche, wobei das Hörgerät weiter so konfiguriert ist, dass es die gesendete Nachricht bei fehlgeschlagener Authentifizierung des Senders der gesendeten Nachricht ignoriert.
     
    5. Hörgerät nach einem der vorstehenden Ansprüche, wobei das Hörgerät weiter so konfiguriert ist, dass es eine Vielzahl gesendeter Nachrichten mischt, von denen einige gleichzeitig von dem Hörgerät empfangen werden, nachdem die jeweiligen Sender der Vielzahl gesendeter Nachrichten erfolgreich authentifiziert wurden, und ein gemischtes Ausgangssignal in das akustische Signal zur Übertragung an das Trommelfell des Benutzers des Hörgeräts umwandelt.
     
    6. Hörgerät nach einem der Ansprüche 1 - 4, wobei das Hörgerät weiter so konfiguriert ist, dass es eine erste gesendete Nachricht speichert, die während der Übertragung einer zweiten gesendeten Nachricht an das Trommelfell des Benutzers des Hörgeräts empfangen wird.
     
    7. Hörgerät nach Anspruch 6, wobei das Hörgerät weiter so konfiguriert ist, dass es die gespeicherte erste gesendete Nachricht in das akustische Signal zur Übertragung an das Trommelfell des Benutzers des Hörgeräts umwandelt.
     
    8. Hörgerät nach Anspruch 7, wobei gespeicherte erste gesendete Nachrichten in das akustische Signal zur Übertragung an das Trommelfell des Benutzers des Hörgeräts in der Reihenfolge umgewandelt werden, in der sie vom Hörgerät empfangen werden.
     
    9. Hörgerät nach Anspruch 6 oder 7, wobei gespeicherte erste gesendete Nachrichten in das akustische Signal zur Übertragung an das Trommelfell des Benutzers des Hörgerätes in einer Reihenfolge der Priorität umgewandelt werden.
     
    10. Hörgerät nach einem der vorstehenden Ansprüche, wobei die Signatur mindestens ein von einer Zertifizierungsstelle ausgestelltes digitales Zertifikat und einen Hash-Code enthält.
     
    11. Hörgerät nach einem der vorstehenden Ansprüche, wobei der Authentifikator weiter so konfiguriert ist, dass er eine verschlüsselte Nachricht entschlüsselt, die zur Authentifizierung des Senders der gesendeten Nachricht in der gesendeten Nachricht enthalten ist.
     
    12. Hörgerät nach einem der Ansprüche 1 - 10, wobei der Authentifikator weiter so konfiguriert ist, dass er einen Hash-Code entschlüsselt, der zur Authentifizierung des Senders der gesendeten Nachricht in der gesendeten Nachricht enthalten ist.
     
    13. Verfahren zum Authentifizieren von gesendeten Nachrichten, wobei das Verfahren die folgenden Schritte umfasst:

    Erzeugen einer Signatur (88), die einen Sender (80) einer gesendeten Nachricht (82) identifiziert, die vom Sender zu versenden ist,

    Senden der Signatur zusammen mit der gesendeten Nachricht,

    Empfang der gesendeten Nachricht in einem Hörgerät (10); Authentifizierung des Senders der gesendeten Nachricht anhand der gesendeten Signatur,

    Umwandeln der gesendeten Nachricht in ein akustisches Signal zur Übertragung an ein Trommelfell eines Benutzers des Hörgeräts, nachdem der Sender der gesendeten Nachricht erfolgreich authentifiziert wurde.


     
    14. Verfahren nach Anspruch 13, wobei der Schritt des Erzeugens den folgenden Schritt umfasst:

    Verschlüsseln der Signatur, und wobei

    der Schritt der Authentifizierung den folgenden Schritt umfasst:
    Entschlüsselung der in der gesendeten Nachricht enthaltenen verschlüsselten Signatur zur Authentifizierung des Senders der gesendeten Nachricht.


     
    15. Übertragungssystem, umfassend
    einen Sender (80), der so konfiguriert ist, dass er eine gesendete Nachricht (82) an eine Vielzahl von Hörgeräten (10) sendet, umfassend
    einen Codierer (86), der so konfiguriert ist, dass er eine den Sender identifizierende Signatur (88) verschlüsselt, die zusammen mit gesendeten Nachrichten zu versenden ist, und einem Hörgerät, umfassend
    ein Funkgerät (44) zum Empfang der gesendeten Nachricht zusammen mit einer Signatur,
    einen Authentifikator (54), der so konfiguriert ist, dass er den Sender der gesendeten Nachricht anhand der Signatur authentifiziert, und wobei
    das Hörgerät weiter so konfiguriert ist, dass es nach erfolgreicher Authentifizierung des Senders der gesendeten Nachricht die gesendete Nachricht in ein akustisches Signal zur Übertragung an ein Trommelfell eines Benutzers des Hörgeräts umwandelt.
     


    Revendications

    1. Instrument auditif (10) comprenant une radio (44) pour la réception d'un message radiodiffusé (82) conjointement à une signature (88), un dispositif d'authentification (54) configuré pour l'authentification d'un émetteur (80) du message radiodiffusé sur la base de la signature, et dans lequel
    l'instrument auditif est configuré en outre pour convertir le message radiodiffusé en un signal acoustique pour la transmission vers un tympan d'un utilisateur de l'instrument auditif lors de l'authentification réussie de l'émetteur du message radiodiffusé.
     
    2. Instrument auditif selon la revendication 1, dans lequel l'instrument auditif est configuré en outre pour mettre en sourdine au moins un autre signal reçu par l'instrument auditif lors de l'authentification réussie de l'émetteur du message radiodiffusé.
     
    3. Instrument auditif selon la revendication 1, dans lequel l'instrument auditif est configuré en outre pour mélanger le message radiodiffusé avec au moins un autre signal reçu par l'instrument auditif lors de l'authentification réussie de l'émetteur du message radiodiffusé, et pour convertir la sortie mélangée dans le signal acoustique pour la transmission vers le tympan de l'utilisateur de l'instrument auditif.
     
    4. Instrument auditif selon l'une quelconque des revendications précédentes, dans lequel l'instrument auditif est configuré en outre pour ignorer le message radiodiffusé lors d'un échec d'authentification de l'émetteur du message radiodiffusé.
     
    5. Instrument auditif selon l'une quelconque des revendications précédentes, dans lequel l'instrument auditif est configuré en outre pour mélanger une pluralité de messages radiodiffusés, dont des parties sont reçues simultanément par l'instrument auditif, lors de l'authentification réussie des émetteurs respectifs de la pluralité de messages radiodiffusés, et pour convertir une sortie mélangée dans le signal acoustique pour la transmission vers le tympan de l'utilisateur de l'instrument auditif.
     
    6. Instrument auditif selon l'une quelconque des revendications 1 à 4, dans lequel l'instrument auditif est configuré en outre pour stocker un premier message radiodiffusé qui est reçu durant la transmission d'un deuxième message radiodiffusé vers le tympan de l'utilisateur de l'instrument auditif.
     
    7. Instrument auditif selon la revendication 6, dans lequel l'instrument auditif est configuré en outre pour convertir les premiers messages radiodiffusés stockés dans le signal acoustique pour la transmission vers le tympan de l'utilisateur de l'instrument auditif.
     
    8. Instrument auditif selon la revendication 7, dans lequel des premiers messages radiodiffusés stockés sont convertis dans le signal acoustique pour la transmission vers le tympan de l'utilisateur de l'instrument auditif dans l'ordre dans lequel ils sont reçus par l'instrument auditif.
     
    9. Instrument auditif selon la revendication 6 ou 7, dans lequel des premiers messages radiodiffusés stockés sont convertis dans le signal acoustique pour la transmission vers le tympan de l'utilisateur de l'instrument auditif dans un ordre de priorité.
     
    10. Instrument auditif selon l'une quelconque des revendications précédentes, dans lequel la signature comprend au moins un parmi un certificat numérique émis par une autorité de certificat et un code de hachage.
     
    11. Instrument auditif selon l'une quelconque des revendications précédentes, dans lequel le dispositif d'authentification est configuré en outre pour décrypter un message crypté inclus dans le message radiodiffusé pour l'authentification de l'émetteur du message radiodiffusé.
     
    12. Instrument auditif selon l'une quelconque des revendications 1 à 10, dans lequel le dispositif d'authentification est configuré en outre pour décoder un code de hachage inclus dans le message radiodiffusé pour l'authentification de l'émetteur du message radiodiffusé.
     
    13. Procédé d'authentification de messages radiodiffusés comprenant les étapes suivantes :

    la génération d'une signature (88) identifiant un émetteur (80) d'un message radiodiffusé (82) destiné à être radiodiffusé par l'émetteur,

    la radiodiffusion de la signature conjointement au message radiodiffusé,

    dans un instrument auditif (10), la réception du message radiodiffusé; l'authentification de l'émetteur du message radiodiffusé sur la base de la signature radiodiffusée,

    la conversion du message radiodiffusé en un signal acoustique pour la transmission vers un tympan d'un utilisateur de l'instrument auditif lors de l'authentification réussie de l'émetteur du message radiodiffusé.


     
    14. Procédé selon la revendication 13, dans lequel l'étape de génération comprend l'étape suivante :

    le cryptage de la signature, et dans lequel

    l'étape d'authentification comprend les étapes suivantes :
    le décryptage de la signature cryptée incluse dans le message radiodiffusé pour l'authentification de l'émetteur du message radiodiffusé.


     
    15. Système de radiodiffusion comprenant
    un émetteur (80) configuré pour radiodiffuser un message radiodiffusé (82) à une pluralité d'instruments auditifs (10), comprenant
    un codeur (86) configuré pour coder une signature (88) identifiant l'émetteur pour la radiodiffusion conjointement aux messages radiodiffusés destinés à être radiodiffusés, et
    un instrument auditif comprenant
    une radio (44) pour la réception du message radiodiffusé conjointement à la signature,
    un dispositif d'authentification (54) configuré pour l'authentification de l'émetteur du message radiodiffusé sur la base de la signature, et dans lequel
    l'instrument auditif est configuré en outre pour convertir le message radiodiffusé en un signal acoustique pour la transmission vers un tympan d'un utilisateur de l'instrument auditif lors de l'authentification réussie de l'émetteur du message radiodiffusé.
     




    Drawing














    Cited references

    REFERENCES CITED IN THE DESCRIPTION



    This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

    Patent documents cited in the description