This document proposes a protocol for authenticating wearable devices. It involves using imprinting to securely associate a wearable device with an intermediate device like a mobile phone. The wearable would then authenticate to a remote server through the intermediate device using an authentication method based on digital signatures. The protocol is designed to provide different security levels depending on the sensitivity of the information and fits within the limited capabilities of wearable devices.