Selecting the Optimal Biometric 2-factor Authentication Method — a User’s Viewpoint

  • Gunter Bitz


We present the concept of a new biometric Smart Card based authentication method for our enterprise by discussing the motive, possible form factors and technological specialties such as using a TPM. Usability and user’s feedback were determined through a pilot phase.

The business case is mostly determined by integration, thus rendering other existing authentication mechanisms and devices obsolete.

This paper discusses briefly conceptual advantages and disadvantages of 2-factor authentication methods and describes the decision making process we undertook in finding the optimal authentication method for our enterprise. We did a very thorough evaluation of an USB device containing a smart card and a biometric fingerprint reader. The pros and cons of this combination are discussed in detail and compared to other 2-factor authentication methods as well as to the old fashioned password (1- factor method).


Smart Card None None Business Case Trust Platform Module Authentication Method 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [BSIO4]
    Second BSI-Symposium on Biometrics 2004; Biometrics in the Reflection of Requirements; Bundesamt für Sicherheit in der Informationstechnik; SecuMedia Verlag, Ingelheim; ISBN 3-922746-55-1; 2004Google Scholar

Copyright information

© Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden 2006

Authors and Affiliations

  • Gunter Bitz
    • 1
  1. 1.SAP AGWalldorfGermany

Personalised recommendations