Skip to main content

Selecting the Optimal Biometric 2-factor Authentication Method — a User’s Viewpoint

  • Chapter
  • 524 Accesses

Abstract

We present the concept of a new biometric Smart Card based authentication method for our enterprise by discussing the motive, possible form factors and technological specialties such as using a TPM. Usability and user’s feedback were determined through a pilot phase.

The business case is mostly determined by integration, thus rendering other existing authentication mechanisms and devices obsolete.

This paper discusses briefly conceptual advantages and disadvantages of 2-factor authentication methods and describes the decision making process we undertook in finding the optimal authentication method for our enterprise. We did a very thorough evaluation of an USB device containing a smart card and a biometric fingerprint reader. The pros and cons of this combination are discussed in detail and compared to other 2-factor authentication methods as well as to the old fashioned password (1- factor method).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Second BSI-Symposium on Biometrics 2004; Biometrics in the Reflection of Requirements; Bundesamt für Sicherheit in der Informationstechnik; SecuMedia Verlag, Ingelheim; ISBN 3-922746-55-1; 2004

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Bitz, G. (2006). Selecting the Optimal Biometric 2-factor Authentication Method — a User’s Viewpoint. In: ISSE 2006 — Securing Electronic Busines Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9195-2_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9195-2_22

  • Publisher Name: Vieweg

  • Print ISBN: 978-3-8348-0213-2

  • Online ISBN: 978-3-8348-9195-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics