主权项 |
1. A method, comprising:
establishing a wireless connection between a wearable computing device and a second computing device, wherein the wearable computing device has sensitive data, and wherein the second computing device has at least a first software application and a second software application; receiving, at the wearable computing device, a first request for a first portion of the sensitive data from the first application via the wireless connection; sending, from the wearable computing device, a response denying the first request to the first application; receiving, at the wearable computing device, a second request for a second portion of the sensitive data from the second application via the wireless connection; determining, at the wearable computing device, that the second request is authenticated as associated with the second application, wherein determining whether the second request is authenticated to be associated with the second application comprises: determining a public key of the second application at the wearable computing device; sending a first challenge from the wearable computing device to the second application; after sending the first challenge, receiving a digital signature from the second application at the wearable computing device; decrypting the digital signature at the wearable computing device to determine a decrypted challenge; and determining whether the first challenge is the same as the decrypted challenge; in response to determining that the second request is authenticated as associated with the second application, sending, from the wearable computing device, the second portion of the sensitive data to the second application; receiving, at the wearable computing device, a third request for the first portion of the sensitive data from the first application via the wireless connection; determining, at the wearable computing device, that the third request is authenticated as associated with the first application; and in response to determining that the third request is authenticated as associated with the first application, sending, from the wearable computing device, the first portion of the sensitive data to the first application. |