Google has purchased Israeli company SlickLogin, a start-up that enables users to verify their identity on websites through the use of soundwaves.
The technology uses a mobile application and a sound generated via computer speakers to confirm that the user is indeed the right person, then logs them into the website accordingly. SlickLogin can be used to log-in to websites in its own right, or as an extra layer of security on users' computers.
SlickLogin was founded by Or Zelig, Eran Galili and Ori Kabeli, who describe themselves as "recent graduates of the Israeli Defence Force's elite cyber security unit", who've "spent over six years working on the cutting edge of information security projects".
The trio founded SlickLogin "because security measures had become overly complicated and annoying", according to a post about the Google deal on the SlickLogin website.
"Our friends thought we were insane, but we knew we could do better. So we set out to improve security while still making it simple for people to log in," it continued.
The post said that SlickLogin opted for takeover by Google because the internet giant shared the Tel-Aviv based company's "core belief" that the process of logging into a website should be as simple as possible for the user.
"Today we're announcing that the SlickLogin team is joining Google, a company that shares our core beliefs that logging in should be easy instead of frustrating, and authentication should be effective without getting in the way," said SlickLogin.
"Google was the first company to offer two-step verification to everyone, for free - and they're working on some great ideas that will make the internet safer for everyone. We couldn`t be more excited to join their efforts," the post concluded.
Financial details and terms of Google's acquisition of SlickLogin have not been revealed, but it marks the latest in a line of acquisitions by the US company, which last month bought thermostat and smoke alarm maker Nest Labs for $3.2bn (£1.95bn).
There is a lot of attention being paid to how business leaders can use the mobile computing preferences of employees and customers to be more responsive, efficient and successful. This white paper runs through five security considerations for the mobile age.
This Dummies white paper will help you better understand business process management (BPM)