Project Aims
- Obfuscate security data through distribution
- Increase factors of authentication without increasing complexity
- Have flexibility to integrate into a number of use cases
Features
- Login key is generated from user credentials and datestamp
- Key is fingerprinted, this fingerprint is stored in SQL database.
- Key is split up and distributed amongst several SQL databases
- One part of the key is placed into a USB drive
- Login re-compiles split-up key and fingerprints it
- If the fingerprint matches the stored print, user is authenticated