Multi-factor authentication (MFA), and its subset, two-factor authentication (2FA), are becoming a best security practice to protect access to user accounts. The most secure state-of-the art method for MFA are hardware tokens/authenticators.
Similarly, there is a strong push in the industry towards getting rid of passwords, which also requires authenticators.
An authenticator, in a broad sense, is a cryptographic entity, usually in the form of a hardware token, that can register a user with a given application (relying party) and later assert possession of the registered key credential, when requested by the relying party. Authenticators normally would report their type and security characteristics via attestation, and hence a wide spectrum of such devices, with varying capabilities, exist.
While hardware tokens are preferable in terms of security, they also have some disadvantages: One needs to have the hardware token at hand whenever one wants to get access to one's accounts. Further, the hardware token can get lost or stolen and misused, without the user typically noticing this at least for a while. Also, hardware tokens often have a limited user interface, e.g., to confirm identity/presence of user, enter/display codes, etc. Other drawbacks of dedicated devices like a hardware token are that they normally have to be bought so they present an additional cost for the user and that the dedicated device generates additional environmental impact and waste.
EP 3 236 674 A1 relates to a hearing device employing a Trusted Platform Module (TPM) which allows the hearing device to be used for cryptographic signatures based on a private key or a symmetric key kept on the hearing device, wherein the manufacturer of the hearing device may act as a certification instance. The hearing device may be part of binaural system. It is mentioned that the security function components may be distributed onto both hearing devices of a binaural system. The user of the hearing device may be authenticated to the hearing device by biometric features of the user or by the user's physical proximity to the hearing device. It is also mentioned that the hearing device may serve to replace security token devices.
US 2012/0282877 A1 relates to a method wherein a communication device is unlocked by a separate key device connected to the communication device. The key device may be a smart hearing aid device placed into a user's ear canal.
EP 3 709 115 A1 relates to a binaural hearing system wherein an identification of a user wearing the binaural hearing system may be based on a binaural decision based on user identification signals from hearing devices located at left and right ears of the user or based on voice characteristics and/or acoustic system characteristics from hearing devices at both ears.
US 2018/0113673 A1 relates to a method of in-ear control of remote devices by receiving, by a microphone of an in-ear device, audio signals from an audio source, the in-ear device inserted into a wearer's ear; determining a command based on the audio signals using a speech recognition technique; performing a voice recognition technique to determine an identity of the audio source; authenticating the command based on the identity of the audio source; and transmitting a signal to a remote electronic device, the signal configured to cause the remote electronic device to execute the command.
EP 3 334 186 A1 relates to a method of retrieving data from a hearing device by a user application on a server device in a secure session, such as an integrity-protected, encrypted, authenticated and/or mutually authenticated session.
WO 2014/191040 A1 relates to a method of unlocking a portable electronic device when a preregistered hearing device is detected as being in wireless communication range of the portable electronic device.
US 2021/0393168 A1 relates to a method of user authentication via in-ear acoustic measurements including detecting an otic response to an acoustic signal emitted by the in-ear device.
Hereinafter, examples of the invention will be illustrated by reference to the attached drawings, wherein:
Described herein are methods and systems for authenticating a user of a binaural hearing system. The methods and systems may allow authenticating a user of a binaural hearing system in a convenient and secure way.
The methods and systems described herein are beneficial in that, by utilizing a binaural hearing system as a single authenticator, the user does not need to remember to carry along the authenticator since the hearing system usually anyway will be worn by the user and the authenticator cannot be easily lost or stolen and a loss would be noticed immediately; further, a binaural hearing system provides an acoustic user interface (microphone and loudspeaker) which allows for concealed user interaction and allows for biometric identification via its direct and seamless biometric body access via the ear canal. One solution described herein provides in a convenient way for a backup token via the other hearing device if one of the two hearing devices is lost or defective. Another solution described herein provides for improved security by requiring utilization of both hearing devices for authentication.
A first aspect relates to a method for authenticating a user of a binaural hearing system comprising two hearing devices, the method comprising: registering the binaural hearing system with a relying party (16) as a single authenticator for authenticating the user, thereby generating authentication data; synchronizing the two hearing devices regarding the authentication data; and using either one of the two hearing devices as the single authenticator by utilizing the authentication data to authenticate the user to the relying party in response to a request by the relying party.
According to one example, only one or both of the hearing devices is/are involved in said registering of the binaural hearing system.
The registering of the binaural hearing system may include a verification that the user presently has physical access to the hearing device(s) involved in said registering.
According to one example, the using either one of the hearing devices as the single authenticator includes a verification that the user presently has physical access to the hearing device that is used as the single authenticator.
For example, the verification that the user presently has physical access to the hearing device(s) includes a detection that the respective hearing device is worn in an ear and/or a biometric detection that the respective hearing device is worn in a predetermined ear.
Alternatively or in addition, the verification that the user presently has physical access to the hearing device(s) may include an action from the user on the respective hearing device, such as a button press, in response to a notification to the user.
According to one example, the synchronizing of the two hearing devices regarding the authentication data occurs via direct communication between the two hearing devices.
According to another example, the synchronizing of the two hearing devices regarding the authentication data occurs via a client communicating with each of the two hearing devices and with the relying party.
According to still another example, the synchronizing of the two hearing devices regarding the authentication data occurs via a cloud service.
According to one example, the authentication data includes an authentication key which is used to sign data transmitted from the hearing devices to the relying party. In particular, the authentication key may be the private key of a public-private key pair generated by one of the hearing devices (10A, 10B) during said registering.
According to one example, the authentication key is stored on both hearing devices.
According to another example, the authentication key is encrypted by one of the hearing devices and then stored on a client or in a cloud.
A second aspect described herein relates to a method for authenticating a user of a binaural hearing system comprising two hearing devices, the method comprising: registering the binaural hearing system with a relying party as a single authenticator for authenticating the user, thereby generating authentication data; using both hearing devices as the single authenticator by utilizing the authentication data to authenticate the user to the relying party in response to a request by the relying party, wherein said using both hearing devices as the single authenticator includes detecting a physical proximity of the two hearing devices.
According to one example, the registering of the binaural hearing system includes a verification that the user presently has physical access to both hearing devices.
According to one example, the using both hearing devices as the single authenticator includes a verification that the user presently has physical access to both hearing devices.
According to one example, verification that the user presently has physical access to both hearing devices includes at least one of:
According to one example, the detecting a physical proximity of the two hearing devices includes at least one of:
According to one example, the authentication data includes an authentication key which is used to sign data transmitted from the hearing devices to the relying party. In particular, the authentication key may be the private key of a public-private key pair generated by one of the hearing devices during said registering.
According to one example, the authentication key is stored on that one of the hearing devices which generates the key.
According to another example, the authentication key is encrypted by that one of the hearing devices which generates the key and then is transmitted to the other one of the hearing devices where it is stored.
According to one example, the public-private key pair is generated based on first key material data stored on one of the hearing devices and on second key material data stored on the other one of the hearing devices.
The following examples apply to both aspects.
According to one example, communication between the hearing devices and the relying party occurs via a client. In particular, the client may be implemented as an app on a smartphone or on a personal computer.
According to one example, the relying party is implemented as part of a user account offered by the manufacturer of the hearing system.
According to one example, the method utilizes a standard web-based authenticator protocol, such as WebAuthn.
A “hearing device” as used hereinafter is any ear level element suitable for reproducing sound by stimulating a user's hearing, such as an electroacoustic hearing aid, a bone conduction hearing aid, an active hearing protection device, a hearing prostheses element such as a cochlear implant, a wireless headset, an earbud, an earplug, an earphone, etc.
A “binaural hearing system” comprises a hearing device for each ear, wherein the hearing devices are able to communicate with each other, e.g., via a wireless link.
“Authentication data” as used hereinafter include data required for utilizing a hearing device as an authenticator for a relying party, such as a key, in particular a private key and a public key of a public-private key pair, user information, relying party information, etc., in particular cryptographic secrets, such as secret keys, private keys, tokens, etc.
The present embodiments suggest to register a binaural hearing system as a single authenticator (for the user of the hearing system) with the relying party.
According to a first aspect, either one of the hearing devices of the binaural hearing system may be used in response to an authentication request by the relying party, wherein authentication data generated by the registration are utilized. In this case, the hearing devices are synchronized regarding the authentication data so that either one of the hearing devices possesses all information required for authentication.
The registering of the binaural hearing system with the relying party may include a verification that the user presently uses, i.e., has physical access to, the hearing device(s) involved in the registering. In particular, only one of the two hearing devices may be involved in registering.
Also the subsequent use of one of the two hearing devices as the single authenticator in response to a request by the relying party may include a verification that the user presently uses, i.e., has physical access to, that hearing device. In particular, such verification may include a detection that the hearing device is worn in an ear and/or a biometric detection that the hearing device is worn in a predetermined ear.
The synchronizing of the two hearing devices regarding the authentication data may occur via direct communication between the two hearing devices. Alternatively, the synchronizing of the two hearing devices regarding the authentication data may occur via a client communicating with each of the two hearing devices and with the relying party. According to a further alternative, the synchronizing of the two hearing devices regarding the authentication data occurs via a cloud service.
The authentication data may include an authentication key which is used to sign data transmitted from the hearing devices to the relying party. In particular, the authentication key may be the private key of a public-private key pair generated by one of the hearing devices during said registering, with the public key being transmitted to the relying party. According to one example, the authentication key may be stored on both hearing devices. According to an alternative, the authentication key may be encrypted by one of the hearing devices and then stored on a client or in the cloud.
According to a second aspect, both hearing devices of the binaural hearing system may be used as the single authenticator in response to an authentication request by the relying party, wherein authentication data generated by the registration are utilized. In this case, physical proximity of the two hearing devices is detected.
The registering of the binaural hearing system may include a verification that the user presently uses, i.e., has physical access to, both hearing devices. Also the subsequent use of both hearing devices as the single authenticator in response to a request by the relying party may include a verification that the user presently uses, i.e., has physical access to, both hearing devices. In both cases, such verification that the user presently uses both hearing devices may include at least one of: a detection that each hearing device is worn in an ear; a biometric detection that each hearing device is worn in a predetermined ear; and a detection that a sensor signal detected by each of the hearing devices, such as a heartbeat detected by a PPG sensor and/or a motion detected by an accelerometer, is correlated or synchronous.
The detecting of physical proximity of the two hearing devices may include at least one of: detecting wireless connectivity between the hearing devices; measuring a distance between the two hearing devices, such as via GPS or via a distance bounding protocol of a wireless connection between the hearing devices, and detecting that the measured distance is below a distance threshold; detecting that the two hearing devices are connected to the same charging device; and detecting that the two hearing devices listen to the same ambient sound.
As for the first aspect discussed above, the authentication data may include an authentication key which is used to sign data transmitted from the hearing devices to the relying party; in particular, the authentication key may be the private key of a public-private key pair generated by one of the hearing devices during said registering, with the public key being transmitted to the relying party. The authentication key may be stored on that one of the hearing devices which generates the key. Alternatively, the authentication key may be encrypted by that one of the hearing devices which generates the key and then is transmitted to the other one of the hearing devices where it is stored. According to a further alternative, the public-private key pair may be generated based on first key material data stored on one of the hearing devices and on second key material data stored on the other one of the hearing devices.
For both the first and second aspect, the communication between the hearing devices and the relying party may occur via a client. In particular, the client may be implemented as an app on a smartphone. Further, the relying party is implemented in an account of the manufacturer of the hearing system. As illustrated in the examples shown in
The authentication procedure may utilize a standard authenticator protocol like WebAuthn which is a web-based API and which forms part, for example, of the FIDO2 specifications. The examples shown in
In the example of
The process of
After registration, the user 12 is enabled by the process of
Various examples of authentication processes using a binaural hearing system as a single authenticator are illustrated by the message sequence charts of
In the example of
The registering of the binaural hearing system 10 with the relying party 16 as illustrated in the upper part of
The lower part of
In the example of
Pairing between the hearing devices 10A and 10B precedes the registration procedure in an initialization procedure, so as to establish a credential encryption key shared by the hearing devices 10A, 10B for later encrypting the authentication data (here: the private key and the authenticator data) by the hearing device 10A after the public-private key pair has been generated by the hearing device 10A and the attestation object has been generated by the hearing device 10A and sent to the client 18. The encrypted private key and authenticator data is sent to and stored on the client 18.
As in the example of
The example of
In the example of
Also in the example of
Number | Date | Country | Kind |
---|---|---|---|
23190829.4 | Aug 2023 | EP | regional |
The present application claims priority to EP patent application Ser. No. 23/190,829.4, filed Aug. 10, 2023, which is hereby incorporated by reference in its entirety.