Ambient Authentication

Multiple authentication methods for a device or system can work together in the background so that you rarely ever need to actually provide deliberate authentication.

One example would be if the iPhone used not only Face ID, but also in screen Touch ID, and proximity of your unlocked Apple Watch, as well as location and behavior data of the phone all together to decide when the likelihood that it’s not you holding the phone is higher than usual, and only then ask for authentication.