. . . "Alongside technologies such as password or smart card methods, so-called biometric methods are also used." .