P130344NL00 Title: implantable medical device and control device therefor
TECHNICAL FIELD The various aspects and variations thereof relate to communication between an implantable medical device and a control device.
BACKGROUND Implantable medical devices may be controlled by means of a control device. Such may be a dedicated device or a generally available device, like a smartphone. The communication may take place using radiofrequency communication or ultrasonic communication. As hacking of devices, causing the implantable medical device to demonstrate unwanted or dangerous behaviour or to drain a battery of the implantable medical device, is possible without the appropriate measures, security measures are provided.
SUMMARY It is preferred to improve the currently available security measures. To that purpose, a first aspect provides, in an implantable medical device, a method of communicating with a control device. The method comprises receiving a first data message from the control device via a first physical communication channel, upon receiving the first message, activating a second physical communication channel different from the first physical communication channel and obtaining first authentication data of the control device, based on data provided in the first data message. The method further comprises receiving, via the second physical communication channel, a second message, verifying whether the second message originates from the control device, based on the obtained first authentication data and deactivating the second physical communication channel at the side of the implantable medical device if a result of the verifying is that the second message does not originate from the control device.
This method allows for secure coupling of the control device with the implantable medical device. A first connection is made using a first physical communication channel, for example ultrasound and via that connection, first security data is provided. The security data may be used to enable the control device to authenticate particular data sent to the implantable medical device. For the avoidance of doubt, to authenticate, within the context of this disclosure, is an equivalent of to certify, meaning to modify a message, by modifying data or by appending particular data, such that an origin of data may be verified, based on any action performed by an authentication step. Such action may be signing, encrypting, adding a certificate, other, or a combination thereof.
The data to be certified is certified and received by the implantable medical device. This enables the implantable medical device to verify that the message is received from the control device. This message, with the authenticated data to be verified, is sent via another physical communication channel. This allows for use of a further physical communication channel that may be, in physical nature, less secure as the ranger is wider, after more crucial and more basic security data has been exchanged over for example a physical communication channel that has a shorter range. The communication over the potentially less secure physical communication channel is at higher layers secured by, for example, cryptography, signing, certification, other means of authenticating data or a combination thereof. This allows for improved security and for flexibility of use of communication channels.
By shutting down the second physical communication channel upon any verification error, improved security is provided and any further energy consumption is prevented, reducing risks of battery depletion attacks on the implantable medical device.
The method may further comprise sending, upon receiving the first message, via the first physical communication channel, a third message to the control device, the third message comprising second authentication data, wherein the first authentication data is further based on the second authentication data. This may allow for symmetrical key generation, in which a generated key is based on data from the implantable medical device, as well as data from the control device.
The second authentication data may comprise at least one of a medical device identifier identifying the implantable medical device and random medical device data. By including the medical device identifier, fixed data related to the medical device may be used. Such data identifies the applicable device and the data is readily available. Use of random data reduces a risk of spoofing.
The first data message may comprise at least one of a control identifier identifying the control device and random control data and the first authentication data may further be based on at least one of the control identifier and the random control data. By including the medical device identifier, fixed data related to the medical device may be used. Such data identifies the applicable device and the data is readily available. Use of random data reduces a risk of spoofing.
Obtaining first authentication data may comprise generating, by the implantable medical device, a key based on data provided in the first data message. In such case, the key is comprised by the first authentication data. In this disclosure, a key may be a key as known in the narrow definition in encryption and signing, but also as any data in general to indicate authenticity of data or to certify a particular origin of data. An advantage is that such key may be used on a case by case communication, for example on a per-communication session basis.
The first physical communication channel may have a first signal attenuation factor in a gaseous medium and the second physical communication channel has a second signal attenuation factor in the gaseous medium, the first signal attenuation factor being higher than the second signal attenuation factor. This means that the first communications, with first security data, can only be done if the control device and the 1mplantable medical device are very close together. If the implantable medical device is implanted, this may even require contact between the control device and the implantable medical device. This means that data for verifying the authentication over the second physical communication channel may only be transmitted while being noticed by a person in whom the implantable medical device is implanted, reducing a risk of hacking.
The first physical communication channel may be an ultrasonic communication channel and the second physical communication channel may be an electromagnetic communication channel. Firstly, such communication techniques are well known and have been proven. Second, such communication techniques may also transmit power from the control device to the implantable medical device. This may reduce a risk of depletion of a battery of the implantable medical device by continuously hailing the implantable medical device. The energy provided in the signal carrying the first message may be used for processing data in the implantable medical device.
A second aspect provides, in a control device arranged to control an implantable medical device, a method of communicating with the implantable medical device. The method comprises sending a first data message to the implantable medical device over a first physical communication channel, obtaining first authentication data based on data provided in the first data message, generating second data message, authenticating the second data message using the first authentication data and sending the authenticated second data message to the implantable medical device over a second physical communication channel, the second physical communication channel being different from the first physical communication channel.
By requiring the control device to use the first authentication data received over the first physical communication channel for 5 communication on the second physical communication channel, security is improved, as two types of channels are required. Different physical communication channels are, in the context of this disclosure, to be understood as relying on different physical principles, like mechanical vibrations versus electromagnetic waves.
The method may further comprise receiving, from the implantable medical device, over the first physical communication channel, a third message, the third message comprising second authentication data, wherein the first authentication data may further be based on the second authentication data. In this case, security 1s further improved by requiring the control device to use also data from the implantable medical device for generating or otherwise obtaining the first authentication data.
The second authentication data may comprise at least one of a medical device identifier identifying the implantable medical device and random medical device data. Use of randomised data may reduce a risk of spoofing and the medical device identifier is readily available data.
The first data message may comprise at least one of a control identifier identifying the control device and random control data; and the first authentication data may further be based on at least one of the control identifier and the random control data. Use of randomised data may reduce a risk of spoofing and the medical device identifier 1s readily available data.
A third aspect provides an implantable medical device arranged for communicating with a control device. The implantable medical device comprises a first transceiver arranged to receive, via a first physical communication channel, a first message from a control device, a second transceiver arranged to receive, via a second physical communication channel, a second message and a processing unit. The processing unit is arranged to activate, upon receiving the first message, the second physical communication channel, by activating the second transceiver, obtain first authentication data of the control device, based on data provided in the first data message, verify whether the second message originates from the control device, based on the obtained first authentication data and deactivate the second physical communication channel at the side of the implantable medical device if a result of the verifying is that the second message does not originate from the control device.
A fourth aspect provides a control device arranged to control an implantable medical device. The control device comprises a first transceiver arranged to send, via a first physical communication channel, a first data message to the implantable medical device, a second transceiver arranged to send, via a second physical communication channel, a second data message to the implantable medical device, the second physical communication channel being different from the first physical communication channel and a processing unit. The processing unit is arranged to obtain first authentication data based on the first data message, generate the second data message, authenticate the second data message using the first authentication data and send the authenticated second data message to the implantable medical device by means of the second transceiver.
BRIEF DESCRIPTION OF THE DRAWINGS The various aspects and variations thereof will now be elucidated in further detail in conjunction with drawings. In the drawings: Figure 1 A: shows an implantable medical device; Figure 1 B: shows a control device; Figure 2 A: shows a first part of a flowchart; and Figure 2 B: shows a second part of a flowchart.
DETAILED DESCRIPTION Figure 1 A shows an implantable medical device 100. The implantable medical device 100 comprises a central processing unit 102, coupled to a memory module 104 as a data storage unit and to a communication processor 106. The memory module 104 may be volatile or non-volatile, magnetic, electronic, other, or a combination thereof. The memory module 104 is arranged to store data acquired by the implantable medical device 100, for example related to a body in which the implantable medical device 100 may be implanted.
Furthermore, the memory module 104 is arranged to store code readable and executable by the central processing unit 102, the communication processor 106 and other parts of the implantable medical device 100. With such code, the various part of the implantable medical device 100 may be programmed to execute methods described above and below.
The central processing unit 102 is further coupled to a sensor module 108 and an actuator module 110. The sensor module 108 may be an electrical sensor, capable of measuring at least one of voltages, currents and electrical power, a magnetic sensor, a mechanic sensor capable of measuring motion, acceleration, force, stress, other or a combination thereof. The actuator module 110 may be an electrical, mechanical, magnetic or other type of sensor or combination thereof. For example, the actuator module 110 may provide electrical pulses - currents, voltages or both - to muscles of a body, like a heart.
As shown by Figure 1A, the communication processor 106 is programmed, either hardwired or softwired by means of code, to comprise a random number unit 122 arranged to generate random numbers, a key generation unit 124 arranged to generate a key, an authentication unit 126 arranged to authenticate data, using for example a key and a verification unit 128 to verify an authentication for particular data.
A key may be understood as any type of data object that may be used to authenticate data and to verify the authentication.
Authentication may be any type of process to generate a data object, in conjunction with a key, which generated data may be used to verify an origin of the data to be authenticated.
Authentication may be executed by means of signing, encrypting, hashing, compressing, other, or a combination thereof.
Verification of data may be executed using data identical or similar to data used for authentication or other data, to verify that the authentication to be verified matches with a verification data object, like a key.
The communication processor 106 is connected to an RF module 112 as an RF transceiver that is in turn connected to an antenna 114. The RF module 112 is arranged to modulate a radio frequency electromagnetic signal with data provided by the communication processor 106. Furthermore, the RF module is arranged to demodulate a radio frequency electromagnetic signal received by means of the antenna 114 to obtain data.
Radio frequency may be between 100 kHz and 10 GHz; preferably, standardised spectra for near-field radio frequency data communication are used.
The communication processor 106 is further connected to an acoustic driver 116 as an ultrasonic transceiver that is in turn connected to an ultrasonic transducer 118. The acoustic driver 116 is arranged to modulate an ultrasonic signal with data provided by the communication processor and provide the modulated signal to the ultrasonic transducer 108 for generating a modulated acoustic signal.
Furthermore, the acoustic driver 116 is arranged to demodulate an ultrasonic signal received by means of the ultrasonic transducer 118 to obtain data.
Ultrasonic sound may be defined as sound - mechanical vibrations - having a frequency of at least 20 kHz, in particular at least 500 MHz, at least 1 MHz or at least 2 MHz.
Figure 1 B shows a control device 150 arranged to control the implantable medical device 100. The control device 150 comprise a central processing unit 152, coupled to a memory module 154 as a data storage unit and to a communication processor 156. The memory module 154 may be volatile or non-volatile, magnetic, electronic, other, or a combination thereof. The memory module 154 1s arranged to store data acquired by the implantable medical device 100, for example related to a body in which the implantable medical device 100 may be implanted.
Furthermore, the memory module 154 is arranged to store code readable and executable by the central processing unit 152, the communication processor 156 and other parts of the control device 150. With such code, the various part of the control device 150 may be programmed to execute methods described above and below.
The central processing unit 152 is further coupled to an input module 158 and an output module 160. The input module 158 may be a keyboard, a touchscreen, a mouse, a data network connector, a microphone, a touchpad, other or a combination thereof. The output module 160 may be an electronic display screen, a touchscreen, a speaker, a data network connector, an array of light sources, other, or combination thereof.
As shown by Figure 1 B, the communication processor 156 is programmed, either hardwired or softwired by means of code, to comprise a random number unit 172 arranged to generate random numbers, a key generation unit 174 arranged to generate a key, an authentication unit 176 arranged to authenticate data, using for example a key and a verification unit 178 to verify an authentication for particular data. A key may be understood as any type of data object that may be used to authenticate data.
Authentication may be any type of process to generate a data object, In conjunction with a key. Authentication may be executed by means of signing, encrypting, hashing, compressing, other, or a combination thereof. Verification of data may be executed using data identical or similar to data used for authentication or other data, to verify that the authentication to be verified matches with a verification data object, like a key.
The communication processor 156 1s connected to an RF module 162 as an RF transceiver that is in turn connected to an antenna 164. The RF module 162 is arranged to modulate a radio frequency electromagnetic signal with data provided by the communication processor 156. Furthermore, the RF module is arranged to demodulate a radio frequency electromagnetic signal received by means of the antenna 164 to obtain data. Radio frequency may be between 100 kHz and 10 GHz; preferably, standardised spectra for near-field radio frequency data communication are used.
The communication processor 156 is further connected to an acoustic driver 166 as an ultrasonic transceiver that is in turn connected to an ultrasonic transducer 168. The acoustic driver 166 is arranged to modulate an ultrasonic signal with data provided by the communication processor and provide the modulated signal to the ultrasonic transducer 158 for generating a modulated acoustic signal. Furthermore, the acoustic driver 166 is arranged to demodulate an ultrasonic signal received by means of the ultrasonic transducer 168 to obtain data. Ultrasonic sound may be defined as sound - mechanical vibrations - having a frequency of at least 20 kHz, in particular at least 500 MHz, at least 1 MHz or at least 2 MHz.
The various components of the two devices described above may be integrated in one or more semiconductor dies, provided with one or more discrete components, other, or a combination thereof. The various components may be powered by means of an internal or external battery.
The implantable medical device 100 may be controlled by means of the control device. A first flowchart 200 shown by Figure 2 A and a second flowchart 200' shown by Figure 2 B show a procedure for communication between the implantable medical device 100 and the control device 150.
Parts shown at the left may be executed by the control device 150 and parts on the right may be executed by the implantable medical device 100, unless indicated otherwise.
Below, a list is provided with brief summaries of the parts of the first flowchart 200 and the second flowchart 200". 202 start procedure 204 create control nonce 206 create control message 208 send message to medical device over acoustic 210 receive message over acoustic 212 create IMD nonce 214 obtain long term key 216 create IMD message 218 send IMD message over acoustic 220 receive IMD message over acoustic 222 get key 224 get nonces and identifiers 226 generate short-term key 228 activate RF 230 generate message 232 authenticate message with short term key 234 send message over RF 236 receive message over RF 238 verify authentication of message 240 verified? 242 generate message 244 authenticate message with short term key 246 send message over RF 248 receive message over RF 250 verify authentication of message 252 verified?
254 communicate between devices 256 communication ended 258 sleep 260 generate nonce 262 send continuation message over RF 264 receive continuation message over RF 266 wake up 268 generate nonce 270 send continuation confirmation over RF 272 receive continuation confirmation over RF 274 generate short term key 276 generate message 278 authenticate message 280 send continuation verification 282 receive continuation verification 284 verify continuation verification 286 verified? 288 send continuation verification return 290 receive continuation verification return 292 verify continuation verification return 294 verified? 296 deactivate RF 298 end The procedure starts in a terminator 202 and continues to step 204, in which the random number unit 172 of the control device 150 generates a control nonce as a random number.
In step 206, a control message 1s generated, comprising the nonce and an identifier of the control device 150. In step 208, the control message is sent by the control device 150 by means of the acoustic driver 166 and the ultrasonic transducer 168.
In step 210, the implantable medical device 100 receives the ultrasonic signal with the control message by means of the ultrasonic transducer 118 and the acoustic driver 116 of the implantable medical device 100. The demodulated data is provided to the communication processor 106 of the implantable medical device 100.
The energy in the signal received by means of the ultrasonic transducer 118 and the acoustic driver 116 may be stored in a battery or other energy storage module of the implantable medical device 100 and used for communication or other data processing by the implantable medical device.
Upon receiving the data in the control message, the communication processor 106 of the implantable medical device 100 and the random number unit 122 thereof creates a medical device nonce as a random number in step 212. In step 214, the communication processor 106 obtains a long-term key. The long-term key may be obtained from the memory module 106, may be generated by the central processing unit 102, may be generated by the communication processor 106 or may be obtained otherwise.
In step 216, a medical device message 15 generated comprising the medical device nonce, an identifier of the implantable medical device 100 and the obtained long-term key. The message is sent to the control device 150 in step 218, using the acoustic driver 116 and the ultrasonic transducer 118, analogous to the sending of the control message as discussed above. The medical device message is received by the control device 150 by means of the ultrasonic transducer 168 and the acoustic driver 166 analogous to the receiving of the control message as discussed above in step 220.
The key in the medical device message is obtained by the communication processor 156 of the control device 150 in step 222. In step 224, the key generation unit 174 of the control device 150 obtains at least one of the received long-term key, the control nonce, the medical device nonce, the identifier of the control device 150 and the identifier of the implantable medical device 100 and generates based thereon a short-term key in step 226 in accordance with a particular algorithm, which may be pre-determined.
Likewise, in step 224', the key generation unit 124 of the implantable medical device 100 obtains at least one of the received key, the control nonce, the medical device nonce, the identifier of the control device 150 and the identifier of the implantable medical device 150 and generates based thereon a short-term key in step 226' in accordance with a particular algorithm, which may be pre-determined and which may be the same as used in step 226. Hence, the key generated in step 226 may be the same as the key generated in step 226'. In step 228, the implantable medical device 100 activates the RF module 112 and opens a communication channel at a radio frequency.
Subsequently, the communication processor 256 of the control device 150 generates in step 230a data object which may be based on at least one of the control nonce, the medical device nonce, the identifier of the control device 150 and the identifier of the implantable medical device 100, other, or a combination thereof. In step 232, the authentication unit 126 authenticates the data object thus generated. The authenticated data object is sent as a message to the implantable medical device 100 by means of the RF module 162 and the antenna 164 of the control device 150 in step 234.
The message thus sent in step 236 1s received by the implantable medical device 100 by means of its antenna 114, its RF module 112 and its communication processor 106. In step 238, the verification unit 128 of the implantable medical device 100 verifies whether the data received is authenticated with an appropriate key. The energy in the RF signal received may be used for this processing or other processing and/or may be stored in a battery or another energy storage module comprised by the implantable medical device.
In step 238, the key generated in step 226' above may be used to this purpose. In step 240, the procedure branches to step 296 if the verification fails, in which step 296 the RF communication channel is closed by the communication processor 106 and the RF module 112 of the implantable medical device 100. Subsequently, the procedure ends in terminator 298.
If the verification in step 238 is successful, the procedure branches in step 240 to step 242 in which a data object is generated by the communication processor 106 of the implantable medical device based on at least one of the control nonce, the medical device nonce, the identifier of the control device 150 and the identifier of the implantable medical device 100. In step 244, the authentication unit 176 authenticates the data object thus generated. The authenticated data object is sent as a message to the control device 150 by means of the RF module 112 and the antenna 114 of the implantable medical device 100 in step 246.
The message thus sent is received by the control device 150 by means of its antenna 164, its RF module 162 and its communication processor 156 in step 248. In step 250, the verification unit 178 of the control device 150 verifies whether the data received is authenticated with an appropriate key. In step 250, the key generated in step 226 above may be used to this purpose. In step 252, the procedure branches to step 296 if the verification fails, in which step 296 the RF communication channel is closed by the communication processor 156 and the RF module 162 of the control device 150. Subsequently, the procedure ends in terminator 298.
If the verification in step 250 is successful, the procedure branches in step 252 to step 254 and step 254' in which the control device 150 and the implantable medical device 100 exchange data. Generally, the control device 150 will provide instruction to the implantable medical device 100 how the central processing unit 102 is to control the actuator module.
Additionally, or alternatively, instructions may be provided to provide the control device 150 with data acquired by means of the sensor module 108 and/or to acquire data using the sensor module 108.
In this regular data exchange as well , the messages may be encrypted in the form of “Authenticated Encryption”, in which both Encryption and Message Authentication Code (MAC) may be used in order to provide data confidentiality and authentication, respectively, for example, the standardized Galois Counter Mode (GCM) block-cipher mode of operation, Encrypt-then-MAC (EtM), other, or a combination thereof. A MAC code of every message sent during regular-data-exchange may be verified as discussed in conjunction with step 250. If any such verification check fails, the process branches to step 296 as well and the RF module 162 will be switched off. Additionally, or alternatively, an established pairing between the implantable medical device 100 and the control device may be reset.
During communication, both in step 256 and step 256', the control device 150 and the implantable medical device check whether the communication continues or has ended. The communication may be ended explicitly, by means of a termination instruction or implicitly, by not sending any data anymore. Upon any end of the communication, the procedure enters in waiting step 258. In the waiting step 258, both devices may be in a low-power state or sleeping state.
In step 260, the control device 150 is activated, for example following user input as discussed above. Following activation, with an instruction to be sent to the implantable medical device 100, a nonce is generated by the random number unit 172, which may be based on an instruction of the central processing unit 152. In step 262, the nonce thus generated 1s sent by the control device 150 as discussed above, via the RF module 162. The identifier of the control device 150 may be sent along, as well as a specific instruction to resume communication.
The data thus sent in step 262, 15 received in step 264 as a continuation message by means of the RF module 112 of the implantable medical device 100. In step 266, the implantable medical device 100 wakes up as a result of receiving the message. Energy in the received signal may be used for the waking up. In step 268, the random number unit 122 generates a nonce and in step 270, the nonce 1s sent to the control unit 150, which may be accompanied by an identifier of the implantable medical device 100. The data message thus generated and sent is received by the control device 150 in step 272.
In step 274, the key generation unit 172 of the control device 150 generates a short-term key, based on at least the long-term key, the control nonce, the medical device nonce, the identifier of the control device 150 and the identifier of the implantable medical device 100. Next, the communication processor 156 generates a data object based on at least one of the short-term key, the control nonce, the medical device nonce, the identifier of the control device 150 and the identifier of the implantable medical device 100 in step 276. In step 278, the authentication unit 176 authenticates the data object thus generated.
Likewise, in step 274’, the key generation unit 122 of the implantable medical device 100 generated a short-term key, based on at least the long-term key, the control nonce, the medical device nonce, the identifier of the control device 150 and the identifier of the implantable medical device 100. Next, the communication processor 106 generates a data object based on at least one of the short-term key, the control nonce, the medical device nonce, the identifier of the control device 150 and the identifier of the implantable medical device 100 in step 276'. In step 278', the authentication unit 126 authenticates the data object thus generated.
In step 280, the authenticated data object generated by the communication processor 156 of the control device as discussed above is sent to the implantable medical device 150 by means of the RF module 112 as a continuation confirmation message. The continuation confirmation message is received by the RF module 112 of the implantable medical device 100 in step 282 and the authentication is verified in step 284. The verification may be executed using the key generated in step 274. If the verification fails, the procedure branches to step 296 as discussed above. Additionally, the control device 150 may be unpaired with the implantable medical device 100, which means that for further contact between the two devices, the pairing using ultrasonic data communication may have to be executed again, as discussed above.
If the verification in step 284 is successful, the procedure continues to step 288 via branch 286, in which the data object generated in step 276' and authenticated in step 278' is sent to the control device as a continuation verification return message, via the RF module 112 and the communication processor 106. The continuation verification return message thus sent is received by the control device in step 290, by means of the RF module 162.
In step 292, the authentication of the continuation verification return message is verified in step 292, which may be executed by means of the key generated in step 274' discussed above. If the verification fails, the procedure branches to step 296 as discussed above via step 294. Additionally, the control device 150 may be unpaired with the implantable medical device 100, which means that for further contact between the two devices, the pairing using ultrasonic data communication may have to be executed again. If the verification is successful, the procedure branches back to step 254 and step 254, in which communication is resumed as discussed above.
The various aspects and variations thereof relate to the following numbered implementations:
1. In an implantable medical device, a method of communicating with a control device, the method comprising:
receiving a first data message from the control device via a first physical communication channel; upon receiving the first message, activating a second physical communication channel different from the first physical communication channel; obtaining first authentication data of the control device, based on data provided in the first data message; receiving, via the second physical communication channel, a second message; verifying whether the second message originates from the control device, based on the obtained first authentication data; deactivating the second physical communication channel at the side of the implantable medical device if a result of the verifying is that the second message does not originate from the control device.
2. The method according to implementation 1, further comprising sending, upon receiving the first message, via the first physical communication channel, a third message to the control device, the third message comprising second authentication data; wherein the first authentication data is further based on the second authentication data.
3. The method according to implementation 2, wherein the second authentication data comprises at least one of a medical device identifier identifying the implantable medical device and random medical device data.
4. The method according to any of the preceding implementations, wherein: the first data message comprises at least one of a control identifier identifying the control device and random control data; and the first authentication data is further based on at least one of the control identifier and the random control data.
5. Method according to any of the preceding implementations, wherein obtaining first authentication data comprises generating, by the implantable medical device, a key based on data provided in the first data message.
6. Method according to any of the preceding implementations, wherein the verifying comprises at least one of verifying a signature of the second message and subjecting at least part of the second message to a decryption operation.
7. The method according to any of the preceding implementations, wherein the first physical communication channel has a first signal attenuation factor in a gaseous medium and the second physical communication channel has a second signal attenuation factor in the gaseous medium, the first signal attenuation factor being higher than the second signal attenuation factor.
8. The method of any one of the preceding implementations, wherein the first physical communication channel is an ultrasonic communication channel and the second physical communication channel is an electromagnetic communication channel.
9. The method according to implementation 8, wherein the ultrasonic communication channel has a frequency higher than 500 kHz, preferably higher than 1 MHz.
10. The method according to implementation 8 or implementation 9, wherein the electromagnetic communication channel has a frequency between 100 kHz and 10 GHz.
11. In a control device arranged to control an implantable medical device, a method of communicating with the implantable medical device, the method comprising: sending a first data message to the implantable medical device over a first physical communication channel;
obtaining first authentication data based on data provided in the first data message; generating second data message; authenticating the second data message using the first authentication data; sending the authenticated second data message to the implantable medical device over a second physical communication channel, the second physical communication channel being different from the first physical communication channel.
12. The method according to implementation 11, further comprising receiving, from the implantable medical device, over the first physical communication channel, a third message, the third message comprising second authentication data; wherein the first authentication data is further based on the second authentication data.
13. The method according to implementation 12, wherein the second authentication data comprises at least one of a medical device identifier identifying the implantable medical device and random medical device data.
14. The method according to any of implementations 11 to 13, wherein: the first data message comprises at least one of a control identifier identifying the control device and random control data; and the first authentication data is further based on at least one of the control identifier and the random control data.
15. Method according to any one of the implementations 11 to 14, wherein obtaining first authentication data comprises generating, by the control device, a key based on data provided in the first data message.
16. Method according to any of the implementations 11 to 15, wherein the authenticating comprises at least one of adding signature to the second message and subjecting at least part of the second message to an encryption operation.
17. The method according to any of the implementations 9 to 16, wherein the first physical communication channel has a first signal attenuation factor in a gaseous medium and the second physical communication channel has a second signal attenuation factor in the gaseous medium, the first signal attenuation factor being higher than the second signal attenuation factor.
18. The method of any one of the implementations 11 to 17, wherein the first physical communication channel is an ultrasonic communication channel and the second physical communication channel is an electromagnetic communication channel.
19. The method according to implementation 18, wherein the ultrasonic communication channel has a frequency higher than 500 kHz, preferably higher than 1 MHz.
20. The method according to implementation 18 or implementation 19, wherein the electromagnetic communication channel has a frequency between 100 kHz and 10 GHz.
21. An implantable medical device arranged for communicating with a control device, the implantable medical device comprising: a first transceiver arranged to receive, via a first physical communication channel, a first message from a control device; a second transceiver arranged to receive, via a second physical communication channel, a second message; a processing unit arranged to: activate, upon receiving the first message, the second physical communication channel, by activating the second transceiver; obtain first authentication data of the control device, based on data provided in the first data message;
verify whether the second message originates from the control device, based on the obtained first authentication data; deactivate the second physical communication channel at the side of the implantable medical device if a result of the verifying is that the second message does not originate from the control device.
22. A control device arranged to control an implantable medical device, the control device comprising a first transceiver arranged to send, via a first physical communication channel, a first data message to the implantable medical device; a second transceiver arranged to send, via a second physical communication channel, a second data message to the implantable medical device, the second physical communication channel being different from the first physical communication channel; a processing unit arranged to: obtain first authentication data based on the first data message; generate the second data message; authenticate the second data message using the first authentication data; and send the authenticated second data message to the implantable medical device by means of the second transceiver.