Google wants to replace your password with a 'trust score' on Android
Search engine giant is swapping passwords with facial recognition and location data
Google's plans to replace traditional passwords with 'trust scores' could reach Android developers by the end of the year, the company revealed at its I/O conference.
The tech giant has been working on switching from conventional passwords to its Trust API for around a year, and has now revealed it will roll out the tool to several banks starting from June.
Following this, Dan Kaufman, head of advanced technology and projects (ATAP) at Google, announced it could be available to Android developers around the world by the end of 2016.
Kaufman said: "We have a phone, and these phones have all these sensors in them. Why couldn't it just know who I was, so I don't need a password? I should just be able to work."
Previously referred to as Project Abacus, the trust score will work by authenticating a user's identity based on data points such as location, facial recognition and walking or typing patterns. Apps will require a certain score in these tests depending on their sensitivity, with banking apps requiring a higher score than a social media app, for example.
Conventional passwords are notoriously insecure, with IT professionals recently revealed to change their administrative credentials less regularly than they ask users to switch passwords. Furthermore, 10 per cent do not change their credentials at all.
Earlier this year Yahoo unveiled plans to kill the password for good, introducing the Yahoo Account Key, which sends an approval notification to a user's phone when they try to sign into their Yahoo account from a new desktop browser.
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now