Google wants to replace your password with a 'trust score' on Android

Search engine giant is swapping passwords with facial recognition and location data

Google's plans to replace traditional passwords with 'trust scores' could reach Android developers by the end of the year, the company revealed at its I/O conference.

The tech giant has been working on switching from conventional passwords to its Trust API for around a year, and has now revealed it will roll out the tool to several banks starting from June.

Following this, Dan Kaufman, head of advanced technology and projects (ATAP) at Google, announced it could be available to Android developers around the world by the end of 2016. 

Kaufman said: "We have a phone, and these phones have all these sensors in them. Why couldn't it just know who I was, so I don't need a password? I should just be able to work."

Advertisement
Advertisement - Article continues below

Previously referred to as Project Abacus, the trust score will work by authenticating a user's identity based on data points such as location, facial recognition and walking or typing patterns. Apps will require a certain score in these tests depending on their sensitivity, with banking apps requiring a higher score than a social media app, for example.

Conventional passwords are notoriously insecure, with IT professionals recently revealed to change their administrative credentials less regularly than they ask users to switch passwords. Furthermore, 10 per cent do not change their credentials at all.

Earlier this year Yahoo unveiled plans to kill the password for good, introducing the Yahoo Account Key, which sends an approval notification to a user's phone when they try to sign into their Yahoo account from a new desktop browser.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Recommended

Visit/cloud/354231/the-it-pro-podcast-is-the-future-multi-cloud
Cloud

The IT Pro Podcast: Is the future multi-cloud?

29 Nov 2019
Visit/business/business-strategy/354204/google-accused-of-union-busting
Business strategy

Google accused of ‘union busting’

26 Nov 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019
Visit/cloud/public-cloud/354159/vodafone-launches-neuron-platform-with-google-cloud
public cloud

Vodafone launches 'Neuron' platform with Google Cloud

20 Nov 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354232/raspberry-pi-4-owners-complain-of-broken-wi-fi-when-using-hdmi
Hardware

Raspberry Pi 4 owners complain of broken Wi-Fi when using HDMI

29 Nov 2019
Visit/mobile/mobile-phones/354222/samsung-sails-past-apples-market-share-despite-smartphone-market-slump
Mobile Phones

Samsung sails past Apple's market share despite smartphone market slump

28 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019