In this recent paper researchers explores the possiblity of creating security checks directly from users activity. Verification based on activity logs of apps in the mobile would make an automated key creator.
Despite some limitation to security for some applications that require especific criptography and legal restictions to what can be used as verification, system could bring benefits: no need of previous passowrd checking, confirmation and registry, limitation of password sharing.
Users would free part of the valuable RAM memory used to remember the multitude of passwords we deal daily.