Here are some thoughts about providing users and businesses ways for a website to authenticate a user all the way to the hardware connection to his computer or mobile device.
There are many cases where software methods are sufficient, of course, but higher grades of security might be required by certain applications.

More standard software stacks are needed to link the hardware authenticators to the users

The link for this article located at Dark Reading is no longer available.