ISSE 2006 — Securing Electronic Busines Processes pp 204-210 | Cite as
Selecting the Optimal Biometric 2-factor Authentication Method — a User’s Viewpoint
Abstract
We present the concept of a new biometric Smart Card based authentication method for our enterprise by discussing the motive, possible form factors and technological specialties such as using a TPM. Usability and user’s feedback were determined through a pilot phase.
The business case is mostly determined by integration, thus rendering other existing authentication mechanisms and devices obsolete.
This paper discusses briefly conceptual advantages and disadvantages of 2-factor authentication methods and describes the decision making process we undertook in finding the optimal authentication method for our enterprise. We did a very thorough evaluation of an USB device containing a smart card and a biometric fingerprint reader. The pros and cons of this combination are discussed in detail and compared to other 2-factor authentication methods as well as to the old fashioned password (1- factor method).
Keywords
Smart Card None None Business Case Trust Platform Module Authentication MethodPreview
Unable to display preview. Download preview PDF.
References
- [BSIO4]Second BSI-Symposium on Biometrics 2004; Biometrics in the Reflection of Requirements; Bundesamt für Sicherheit in der Informationstechnik; SecuMedia Verlag, Ingelheim; ISBN 3-922746-55-1; 2004Google Scholar