Google Acquires SlickLogin, a company provides sound based passwords for account logins

Google Acquires SlickLogin, a company provides sound based passwords for account logins


Mar 3, 2014
Google Acquires Slicklogin Don’t you feel the need of a secured gateway for your email accounts? Do you find the current verification process lesser with respect to security? Now there is no more worry about the security aspect. Google presents its users with a unique introduction of sound based passwords for logging their email accounts. Google is an internet giant search engine. Nothing can be hidden from Google. Google is one of the most desirable, innovative and creative companies that bring forward a different and novel technical offering for its users. Google understands the need of internet security for its users. The Google account asks for verification process prior to directing the user to the login page. Google has recently entered into a deal with a start-up company that utilizes Sounds in place of passwords. Who is this Start Up? Google has recently bought and acquired an Israel based start-up company named SlickLogin. The company deals into a very unique and novel service offering. SlickLogin provides password service in the form of sounds. The users can only login their accounts with the help of a unique sound that is generated by SlickLogin. It was started by three partners Or Zelig, Eran Gailili and Ori Kabeli. These three partners have dedicated their six years of study in the field of information security. After an in-depth study with respect to Internet Security, they had come up with SlickLogin. How does SlickLogin Work? SlickLogin can sense the location of the device namely phone, laptop, etc… It takes the help of numerous protocols and locates the position of phone. Wi-Fi, NFC, Bluetooth, GPS, etc… are few ways of locating the position. SlickLogin has a unique dubbed voice based sounds. These sounds are crafted in a way that it becomes difficult for humans to hear. The process works in a way that the system plays the sounds via the speakers of the computer, laptop, etc… and then the computer responses back by sending a signal of receiving it. This acts as a verification process for login in the account. This can also be done in smart phones. There is an in-built app in Smartphone. The microphone of the Smartphone receives the sound and sends the confirmation back. Google’s role: Google has recently bought and took over SlickLogin in order to strengthen the information security systems. Google in association with SlickLogin have decided to make the world of internet more secured and safe. It will replace the typed passwords with sounds. Although the commercial project has not been launched, yet Google is still in the process of doing it as soon as the project is ready. Google has a first mover advantage with respect to verification process. Google had introduced the two step process for verification for free. They are in the phase of coming up with more features for enhancing security process. SlickLogin is now a part of Google and it will be using the same team and knowledge base of if for this project. The financials are not yet disclosed. The three founders of SlickLogin have recently quoted that, “Today we’re announcing that our team is joining with Google, a company that shares our core beliefs that logging in should be easy instead of frustrating, and authentication should be effective without getting in the way.

Frequently Asked Questions?

Blockchain is a decentralized, distributed ledger that records transactions across multiple computers. It ensures transparency, security, and immutability in data storage.
AR overlays digital information onto the real world through devices like smartphones or AR glasses, enhancing the user's perception of the environment.
IoT refers to the network of interconnected devices that communicate and share data. It enables smart homes, wearable tech, and efficient industrial processes.
AI involves creating computer systems capable of performing tasks that typically require human intelligence. It includes machine learning, natural language processing, and computer vision.
VR creates a simulated environment that users can interact with. It typically involves the use of VR headsets to provide an immersive experience.
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks. It includes measures like firewalls, antivirus software, and encryption.

Join our subscribers list to get the latest news and special offers.