It seems like a proven secure authentication method and a natural choice for a technology like this.
Currency and other financial instruments commonly use the first type of authentication method.
Once we've authenticated - that's the problem with credit card fraud is weak authentication methods.
Field tests and authentication methods can be easily performed for the research and development purposes.
These authentication methods could be used to restrict access to certain data, or to entire devices.
Client connects and sends a greeting which includes a list of authentication methods supported.
Several messages may now pass between the client and the server depending on the authentication method chosen.
Both authentication methods were successfully reverse engineered within months of release.
These new services require more secure and user-friendly authentication methods.
(Though it is the most common authentication method used by online banks.)