Abstract
We present the concept of a new biometric Smart Card based authentication method for our enterprise by discussing the motive, possible form factors and technological specialties such as using a TPM. Usability and user’s feedback were determined through a pilot phase.
The business case is mostly determined by integration, thus rendering other existing authentication mechanisms and devices obsolete.
This paper discusses briefly conceptual advantages and disadvantages of 2-factor authentication methods and describes the decision making process we undertook in finding the optimal authentication method for our enterprise. We did a very thorough evaluation of an USB device containing a smart card and a biometric fingerprint reader. The pros and cons of this combination are discussed in detail and compared to other 2-factor authentication methods as well as to the old fashioned password (1- factor method).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Second BSI-Symposium on Biometrics 2004; Biometrics in the Reflection of Requirements; Bundesamt für Sicherheit in der Informationstechnik; SecuMedia Verlag, Ingelheim; ISBN 3-922746-55-1; 2004
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2006 Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Bitz, G. (2006). Selecting the Optimal Biometric 2-factor Authentication Method — a User’s Viewpoint. In: ISSE 2006 — Securing Electronic Busines Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9195-2_22
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9195-2_22
Publisher Name: Vieweg
Print ISBN: 978-3-8348-0213-2
Online ISBN: 978-3-8348-9195-2
eBook Packages: Computer ScienceComputer Science (R0)