Project Aims

  • Obfuscate security data through distribution
  • Increase factors of authentication without increasing complexity
  • Have flexibility to integrate into a number of use cases


  • Login key is generated from user credentials and datestamp
  • Key is fingerprinted, this fingerprint is stored in SQL database.
  • Key is split up and distributed amongst several SQL databases
  • One part of the key is placed into a USB drive
  • Login re-compiles split-up key and fingerprints it
  • If the fingerprint matches the stored print, user is authenticated