发明名称 Application-level wireless security for wearable devices
摘要 Methods and devices for communicating sensitive data to applications are provided. A wearable device can wirelessly connect with a second computing device. The wearable device can be configured to obtain sensitive data. The second computing device can provide a first software application and a second software application. The wearable device can wirelessly receive a first request for the sensitive data from the first application. The wearable device can send a response denying the first request to the first application. The wearable device can wirelessly receive a second request for the sensitive data from the second application. The wearable device can determine whether the second request is authenticated to be associated with the second application. After determining that the second request is authenticated to be associated with the second application, the wearable device can wirelessly send the sensitive data to the second application.
申请公布号 US9600676(B1) 申请公布日期 2017.03.21
申请号 US201414306192 申请日期 2014.06.16
申请人 Verily Life Sciences LLC 发明人 Farmer Shane Alexander;Tsai Robert Lieh-Yuan
分类号 G06F21/62;H04W12/06;H04L9/32 主分类号 G06F21/62
代理机构 McDonnell Boehnen Hulbert & Berghoff LLP 代理人 McDonnell Boehnen Hulbert & Berghoff LLP
主权项 1. A method, comprising: establishing a wireless connection between a wearable computing device and a second computing device, wherein the wearable computing device has sensitive data, and wherein the second computing device has at least a first software application and a second software application; receiving, at the wearable computing device, a first request for a first portion of the sensitive data from the first application via the wireless connection; sending, from the wearable computing device, a response denying the first request to the first application; receiving, at the wearable computing device, a second request for a second portion of the sensitive data from the second application via the wireless connection; determining, at the wearable computing device, that the second request is authenticated as associated with the second application, wherein determining whether the second request is authenticated to be associated with the second application comprises: determining a public key of the second application at the wearable computing device; sending a first challenge from the wearable computing device to the second application; after sending the first challenge, receiving a digital signature from the second application at the wearable computing device; decrypting the digital signature at the wearable computing device to determine a decrypted challenge; and determining whether the first challenge is the same as the decrypted challenge; in response to determining that the second request is authenticated as associated with the second application, sending, from the wearable computing device, the second portion of the sensitive data to the second application; receiving, at the wearable computing device, a third request for the first portion of the sensitive data from the first application via the wireless connection; determining, at the wearable computing device, that the third request is authenticated as associated with the first application; and in response to determining that the third request is authenticated as associated with the first application, sending, from the wearable computing device, the first portion of the sensitive data to the first application.
地址 Mountain View CA US