Abstract
We present the concept of a new biometric Smart Card based authentication method for our enterprise by discussing the motive, possible form factors and technological specialties such as using a TPM. Usability and user’s feedback were determined through a pilot phase.
The business case is mostly determined by integration, thus rendering other existing authentication mechanisms and devices obsolete.
This paper discusses briefly conceptual advantages and disadvantages of 2-factor authentication methods and describes the decision making process we undertook in finding the optimal authentication method for our enterprise. We did a very thorough evaluation of an USB device containing a smart card and a biometric fingerprint reader. The pros and cons of this combination are discussed in detail and compared to other 2-factor authentication methods as well as to the old fashioned password (1- factor method).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Second BSI-Symposium on Biometrics 2004; Biometrics in the Reflection of Requirements; Bundesamt für Sicherheit in der Informationstechnik; SecuMedia Verlag, Ingelheim; ISBN 3-922746-55-1; 2004
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2006 Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Bitz, G. (2006). Selecting the Optimal Biometric 2-factor Authentication Method — a User’s Viewpoint. In: ISSE 2006 — Securing Electronic Busines Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9195-2_22
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9195-2_22
Publisher Name: Vieweg
Print ISBN: 978-3-8348-0213-2
Online ISBN: 978-3-8348-9195-2
eBook Packages: Computer ScienceComputer Science (R0)