Randomized input device heating

ABSTRACT

A security code input may be obfuscated from a thermal imaging device by randomly heating a random set of inputs of an input device. The security code is inputted on an input device, which communicates with a security system to grant or deny access to a user based on an entry of the security code. The input device includes a plurality of hearing elements. The input device may receive an input from the user. A random set of heating elements including one or more heating elements, are generated from the plurality of heating elements. A temperature is determined for the one or more heating elements of the random set of heating elements. The temperature is then applied to the one or more heating elements of the random set of heating elements of the input device.

BACKGROUND

The present disclosure relates to information security, and moreparticular aspects relate to access control and authorization.

Security systems may be used to gain access to secured locations orprotect secured items. The security system may require a security codethat authorizes or denies a user access based on if they know thesecurity code or not. A security device may be used to input thesecurity code. The user may input the security code on the securitydevice to gain access to the secured location or secured items.

SUMMARY

According to embodiments of the present disclosure, a method, a system,and a computer program product are proposed to use random interjectionsof heat on a device or sound through a speaker to obfuscate a securitycode of a user. Obfuscating the security code may include making itdifficult for an unauthorized user to copy and later using a securitycode of an authorized user. The usage of an authorized user's securitycode may be obfuscated by randomly heating the input device to createthermal noise and obfuscate thermal imaging security breaches. The usageof an authorized user's security code may be obfuscated by generating arandom audible tone to create audible noise and obfuscate auditorysecurity breaches.

One embodiment provides a method for obfuscating a security code from athermal imaging device by randomly heating a random set of inputs of aninput device. A security code input may be obfuscated from a thermalimaging device by randomly heating a random set of inputs of an inputdevice. An ambient temperature may be measured of the input device. Thesecurity code is inputted on an input device, which communicates with asecurity system to grant or deny access to a user based on an entry ofthe security code. The input device includes a plurality of hearingelements. The input device may receive an input from the user. A randomaudible tone may be communicated to the user. The temperature of theinput of the user on the input device is recorded. A random set ofheating elements including one or more heating elements, are generatedfrom the plurality of heating elements. Based on the temperature of theinput of the user a temperature is determined between an upper thresholdand a lower threshold of the temperature. A temperature is determinedfor the one or more heating elements of the random set of heatingelements. The temperature is then applied to the one or more heatingelements of the random set of heating elements of the input device.

Another embodiment is directed towards a system for obfuscating asecurity code from a thermal imaging device by randomly heating a randomset of inputs of an input device. The system includes a memory, aprocessor device, an input device, and a heating controller. Theprocessor device communicatively couples the memory, the input device,and the heating controller. The input device is configured tocommunicate a security code to a security system, which may grant ordeny access to a user based on an entry of the security code. The inputdevice includes a plurality of hearing elements. The input device isconfigured to receive an input from the user. The processor device isconfigured to generate a random set of heating elements including one ormore heating elements, from the plurality of heating elements. Theprocessor device is configured to determine a temperature for the one ormore heating elements of the random set of heating elements. The heatingcontroller is configured to apply the temperature to the one or moreheating elements of the random set of heating elements of the inputdevice.

Yet another embodiment is directed toward a computer program product forobfuscating a security code from a thermal imaging device by randomlyheating a random set of inputs of an input device. The computer programproduct is configured to communicate a security code to a securitysystem, which may grant or deny access to a user based on an entry ofthe security code. The input device includes a plurality of hearingelements. The heating elements of the input device are coupled with aheating controller. The computer program product is configured toreceive an input from the user. The computer program product isconfigured to generate a random set of heating elements including one ormore heating elements, from the plurality of heating elements. Thecomputer program product is configured to determine a temperature forthe one or more heating elements of the random set of heating elements.The computer program product is configured to apply the temperature tothe one or more heating elements of the random set of heating elementsof the input device.

The above summary is not intended to describe each illustratedembodiment or every implementation of the present disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

The drawings included in the present application are incorporated into,and form part of, the specification. They illustrate embodiments of thepresent disclosure and, along with the description, serve to explain theprinciples of the disclosure. The drawings are only illustrative ofcertain embodiments and do not limit the disclosure.

FIG. 1 depicts an illustration of a security device as an input device,according to various embodiments.

FIG. 2 depicts an illustration of an interconnect between the inputs ofan input device and a heating controller, according to variousembodiments.

FIG. 3 depicts an illustration of a computer configured to create randominterjections of noise of heat and sound, according to embodiments.

FIG. 4 depicts an illustration of a user entering a security code on aninput device, according to various embodiments.

FIG. 5 depicts an illustration of a user entering a security code on aninput device while the computer interjects thermal and audible noise,according to various embodiments.

FIG. 6 depicts a flowchart of the random security measure beinginterjected, according to various embodiments.

While the invention is amenable to various modifications and alternativeforms, specifics thereof have been shown by way of example in thedrawings and will be described in detail. It should be understood,however, that the intention is not to limit the invention to theparticular embodiments described. On the contrary, the intention is tocover all modifications, equivalents, and alternatives falling withinthe spirit and scope of the invention.

DETAILED DESCRIPTION

Aspects of the present disclosure relate to deterring an unauthorizeduser from effectively monitoring a usage of a security code orinformation of a user, more particular aspects relate using thermal oraudible noise to obfuscate a theft of a security code of a user. Thesecurity code of the user can be used to gain access to information, alocation, or tangible goods in the possession of the user. To obfuscatethe unauthorized user from monitoring the usage of the security key,noise that may be thermal or audible may be used to make it difficultfor the unauthorized user to gather the security code of the user. Whilethe present disclosure is not necessarily limited to such applications,various aspects of the disclosure may be appreciated through adiscussion of various examples using this context.

With the increase in quality of thermal imaging, new and inexpensivethermal imaging devices may be readily available for use by consumers.The thermal imaging devices may be compact or easily concealable andthat may allow users to operate the thermal imaging devices withoutbeing noticed. The increases in quality of thermal imaging devices allowthe devices to display minor temperature differences, which may be usedto determine transfers of heat from people to objects. The thermalimaging device may be used to monitor an object before interaction for abase temperature, and after interaction to determine a change intemperature being an interaction with the object. A base temperature maybe the ambient temperature of the object before interaction. The changein temperature may be the residual heat left by the user afterinteraction. To obfuscate thermal imaging attacks, the input device maybe heated in random locations to produce a variable heat map to makethermal imaging difficult for unauthorized users, described furtherherein.

Passcodes or personal identification numbers (PINs) may be used toprotect an identity of a user, The PINs can be used to log in to securesystems or gain entry to a secured area. These PINs may be observed andlater used by an unauthorized person to gain access to locations oritems that do not belong to them. To obfuscate an unauthorized personfrom gaining access, active measures may be used to thwart securitythreats.

An input device used to enter a security code may include a grouping ofone or more distinct inputs. The grouping of distinct inputs may includevisual, tactile, or audial properties that may distinguish a first inputfrom a second input. The input device may be made out of variousmaterials including but not limited to metal, plastic, or glass. Anexample list of input devices may include a number pad, a keyboard, or ascreen displaying a grouping of inputs. For example, the distinct inputsmay be inputs or buttons that a user may press to input the securitycode. The buttons or inputs may be individually marked such that a firstinput may be distinguished from a second input. For example, the markingcould include a first input with a visual marking of a number 1 and asecond input with a visual marking of a number 2. In an additionalexample, the marking could include tactile reading system or markingsuch as braille of a first input with a tactile marking of a number 1,and a second input with a tactile marking of a number 2. In anadditional example, a screen displaying a grouping of inputs facilitatedby a graphical user interface (GUI). The touch screen may displaynumbers, letters, pictures, or a combination thereof. The inputs of thetouch screen may be displayed on a portion of the screen where a firstinput may require a first portion of the screen, and a second input mayrequire a second portion of the screen. The portion of the screen mayinclude a preselected selection of the screen that the user may use toinput on the touch screen. For example, a portion of the screen may bedivided into 1 inch by 1 inch square that the user may touch to inputthe security code.

A security device may be an input device that a user may input a codeinto to gain access to or lock/unlock an item or a location. Forexample, an input device may be a number keypad including the numbers0-9 arranged such that the user may input a combination of the numbers0-9 to create a security code. In an additional example, an input devicemay be a keyboard input device that may include the alphabet and thenumbers 0-9 that the user may input into a combination to create asecurity code. The input device may also be displayed on a screen. Forexample, a screen displaying a grouping of inputs may include a GUI,which may display numbers, letters, pictures, or a combination thereof.The inputs of the GUI may be combined to create a security code.

Heat transfer to the security device may happen in one or more ways.Types of heat transfer may include conduction, convection, andradiation. Conductive heat transfer may include heat flowing through twosolid objects where the heat from one object moves to another. Forexample, the heat transfer of conduction may include a user pressing aninput of an input device. The heat of the user's finger may transfer tothe input heating the input through conduction. In an additionalexample, conduction may include placing a heating element in contactwith an input and heating the input. The emitted heat from the heatingelement may be transferred to heat the colder input. Convective heattransfer includes heat flowing from a heat source through liquid or gaswhere the warm liquid or glass rises pushing cooler liquid or glasstowards the heat source. For example, heat transfer of convection mayinclude a heating element placed behind an input of the input device.The heating element may heat the air around the input throughconvection, which may transfer the heat to the input. Radiation heattransfer carries heat through empty space called infrared radiation,where a heat source heats an object through the space or air. Forexample, heat transfer of radiation may include a heat source placedbehind an input of the input device and the heat may radiate from theheating element heating the input.

Thermal imaging devices may be used by an unauthorized user to gatherinputs, which may be combined into a security code (code). The securitycode may be used to access restricted information or items owned by anauthorized user. Thermal imaging devices may include stand-alone devicesand extensions that may be attached to devices (e.g. mobile phoneextensions). The thermal imaging device may create a thermal image (heatmap). The heat map may show the inputs of the user if the pressing ofthe inputs of the security device transfers heat from the user to theinputs. An unauthorized user may then use the heat map to determine thesecurity code of an authorized user. For example, a security code may beused to gain access to a building. To access the building a user mustinput a PIN to unlock the doors and enter the building. An unauthorizeduser may use a thermal imaging device to view the security code of auser after the user has entered the security code. The unauthorized usermay copy the security code of the authorized user to enter the building.

In some scenarios, the security inputs may require multiple forms ofidentification. For example, an authorized user may have to inputsecurity checks to access their baking account from an automated tellermachine (ATM). The ATM may require two security checks. The firstsecurity check may require the user to provide a physical identificationof owning the bank account (e.g. a checking card). The second securitycheck may require a security code (e.g. a PIN). The user must input bothsecurity checks to gain access to the bank account. For an unauthorizeduser to gain access to the bank account of the user, the unauthorizeduser must gain access or steal the physical identification, and thesecurity code to access the bank account of the user. To steal thephysical identification the unauthorized user may take the physicalidentification from the user. To steal the security code theunauthorized user may use thermal imaging device to gather the PIN ofthe bank account of the user. The unauthorized user may use the physicalidentification and the security code to gain access to the bank accountof the user.

The creation of incorrect inputs (i.e. noise) may be used to cause adisruption of the ability of an unauthorized user to gather the inputsof the user. Noise may include creating an illusion of additional inputsthat the user did not make to create incorrect inputs. If a first buttonpress of a user may cause a random set of inputs to seem as they alsohave been pressed, then the random set of inputs may be considerednoise. For example, a 10 digit input device may be used to input asecurity code. If a user inputs a first input that causes a random setof inputs to be heated, then the noise may cause an incorrect heat mapto be generated from a thermal imaging device that is being operated bythe unauthorized user.

To obfuscate unauthorized users from accessing a security input of anauthorized user obfuscation methods may be put into place. Obfuscationmethods may include the interjections of noise to obfuscate an attemptof an unauthorized user from gaining access to the security code. Noisemay include heating the locations of inputs (i.e. inputs) of the inputdevice to make thermal imaging difficult. The heating of the locationsof the inputs may include placing a heating element behind, or withinthe inputs of the input device. For example, the input device may be a10 digit input device. Behind the inputs of the 10 digit input device,heating elements may be placed that may randomly heat the inputs suchthat the use of a thermal imaging device may have troubles discerningthe heat transferred inputting the security code and the random heating.In another example, the input device may be a glass screen displaying agrouping of inputs on a GUI. Behind the screen, but within the inputdevice a heating controller may be placed. The heating controller mayconnect a grouping of a plurality heating elements, or a variableheating controller. The heating controller may apply a temperature to arandom set of the heating elements. The plurality of heating elementsmay be heated randomly by the variable heating controller such that theuse of a thermal heating imaging device may have troubles discerning theheat transferred inputting the security code and the random heating bythe heating controller.

By randomly selecting a set of heating elements and heating the randomlyselected set, the security code may be difficult to determine from thethermal noise that was generated. An unauthorized user operates athermal imaging device to gather a heat map of the input device. If theinput device does not include heating elements that are randomlyselected, then the heat of the security code input of the user may beabsorbed by the inputs of the input device. An unauthorized user maythen analyze the heat map generated by the thermal imaging device andcopy the security code of the authorized user. If a backgroundtemperature or ambient temperature of the input device is present, thenthe input of the user may increase the temperature of the input over thebackground temperature by pressing the inputs. For example, if thetemperature of the input device is 35° C. and an input of the authorizeduser raises the temperature of the input to 37° C., then the input ofthe user may be observed on a heat map by the unauthorized user.

An additional obfuscation method for obfuscating an unauthorized userattempting to access a security input from an authorized user mayinclude producing an auditory tone (i.e. sound) to disguise the sound ofthe input. When an input of a security device is pressed, a tone may beemitted to disguise the input from an unauthorized user from monitoringthe sounds outputted from the pressing of the input. The tone may be thesame tone for each pressing of the input, or the tone may be random foreach pressing of an input. The tone may not be audible by unassistedhuman ears, but when amplified by an eavesdropping device the tone maymask the input of the user. For example, an input device may include a10 digit input device. For each button press by a user, an audible beepmay be outputted by the security device for each input from the user. Inan additional example, a tone repository may be stored within thesecurity device or a computer communicatively coupled to the securitydevice. The tone repository may store a collection of tones that arerandomly outputted by the security device for each input of the user.

In FIG. 1, a security device is illustrated, according to embodiments.The security device illustrated may be an input device 110 includinginputs 112. The input device 110 illustrated may be a 10 digit inputdevice 110. The inputs 112 of the input device 110 are marked 0-9 andcan be combined by using a plurality of inputs 112 to create a securitycode. To gain access a user may input the security code. For example, aninput device 110 may be used to lock or unlock a door of a secured roomof a building, a device of the user, or a safe. The input device 110 mayauthenticate the input of the security code of the user and allow ordeny the user access to the secured room. If the user correctly inputsthe security code, then the user may gain access to the secured room.

In various embodiments, the input device 110 may be a touchscreen. Ifthe input device 110 is a touch screen, then the inputs 112 may bedisplayed on the screen through a GUI. For example, the touch screen maydisplay the inputs 112 on the GUI to the user for inputting the securitycode. The security code may include alphanumeric characters, or imagesdisplayed on the touch screen facilitated by the GUI. In an additionalexample, the input device 110 may be a mobile device that may require asecurity code to access the phone. The mobile device may display theinputs 112 as alphanumeric characters, or images to the user to inputthe security code.

FIG. 2, an interconnect between the inputs of an input device and aheating controller is illustrated, according to embodiments. A securitydevice may contain a plurality of inputs 212 arranged on the inputdevice 210. An interconnect 226 may connect the heating controller 220to heating elements 222 and return to the heating controller through theneutral 224 that may connect to a ground. The heating elements 222 maybe heated through electrical heating. Electrical heating may include anyprocess where electrical energy is turned into heat. For example,electrical heating may include and electrical resistors, which mayreceive work in the form of electricity and output heat. The heatingcontroller 220 may select a plurality of heating elements 222 to beheated upon an input from a user. For example, an input from a user mayinclude an input. The input may include the user pressing an input 212of the input device 210. If the user presses an input 212, then theheating controller 220 may heat one or more heating elements 222 of theinput device 210.

FIG. 3, a computer configured to create random interjections or noise toobfuscate a security code theft of an authorized user is illustrated,according to embodiments. The random interjections or noise may includethermal noise or audible noise in an attempt to obfuscate anunauthorized user from using a security code of an authorized user. Thethermal noise may be generated by a heating controller 320 and theaudible noise (audible tone) may be generated by a sound controller 324.The security device 310 may receive the input from the user in the formof a security code, which may be authenticated by a security system 350.The security system 350 may allow or deny the user access based on theinputted security code.

In various embodiments, the heating controller 320 may include atemperature sensor 322. The temperature sensor 322 may monitor thetemperature of the security device 310. The temperature sensor 322 maymeasure the temperature of the inputs of the security device 310 andsend the recorded temperature to the computer 330. The computer may usethe recorded temperature of the security device 310 to determine atemperature range for heating the inputs when using the temperaturegenerator 344. The temperature sensor may also record the temperature ofthe input of a user on the security device 310. The computer may use therecorded temperature of the user when using the temperature generator344. For example, a user may press an input of the security device 310and the temperature sensor 322 may measure the temperature of the inputof the user. The computer 330 may then use the measured temperature todetermine a temperature for the temperature generator 344.

The security system 350 may be local or a network security system. Alocal security system may allow the user to access an area or storage.Examples of a local security system may include a safe, a door entry, oraccessing a device. For example, a door entry may include a locked doorthat may be unlocked if the user is able to input a security code. Ifthe user is in possession of the security code, then the user may inputthe security code into the security device 310 and unlock the door. Inan additional example, an accessing of a device may include a mobiledevice. The mobile device may require a security code to be able toaccess the device. The user may input the security code into the mobiledevice, and if the security code is correct, then the user may accessthe device. A network security system may include access to a roomwithin a building or a shared storage. The security system 350 may beconnected to a network that may store security codes for one or moreauthorized users. The security codes may be stored within a database. Ifa user inputs a security code, then the security code may be checkedwithin the database and the user may be allowed or denied access basedon the input of the security code.

To keep the security code from being gathered by an unauthorized user acomputer 330 may create thermal noise or audible noise. The thermalnoise may be generated and transmitted to the security device from aheating controller 320. The audible noise may be generated through asound generator 346 and outputted through a sound controller 324. Thethermal noise may include heating the inputs or behind the inputs of thesecurity device 310 to obfuscate an attempt of an unauthorized user fromgathering and using the security code of an authorized user. The heatingmay include increasing the temperature of the area around the input tocreate thermal noise when monitoring the security device 310 with athermal imaging device. The audible noise may create an audible sound oran audible tone (e.g. a beep) that may mask the sounds of a button pressof a user when inputting a security key. The thermal noise or theaudible noise may be generated to obfuscate an unauthorized user fromdetermining a pattern.

A computer 330 may contain a memory 332 that is communicatively coupledto a processor 334. The memory 332 may store one or more functions thatthe processor 334 may perform. The functions may include a randomlocation generator 342, a temperature generator 344, and a soundgenerator 346. The functions may be include a random number generatorthat determines the how the functions perform. For example, the randomnumber generator may send the random location generator 342 thelocations one or more inputs to heat on a first input of a user and eachsubsequent input of the user. In an additional example, the randomnumber generator may inform the temperature generator 344 varioustemperatures to heat each of the inputs determined by the randomlocation generator 342. In an additional example, the sound generator346 may output a sound bite or file that may cause the sound controller324 to output a sound.

The random selection of heating elements by the heating controller 320may include a random number generator that operates a random locationgenerator 342. The random location generator 342 may randomly select oneor more heating elements to be heated. The random number generator mayalso randomly select temperatures through the temperature generator 344to heat the inputs that were randomly selected to a temperature. Upon aninput of user on an input of the security device 312 the computer 330may select one or more inputs to be heated, and temperatures for theinputs to be heated to. For example, a 10-digit input device may be usedby the security system including inputs numbered from 0-9. An input ofthe user pressing the first input may cause the random locationgenerator 342 to select the sixth input and the ninth key. Thetemperature generator 344 may then select a temperature for the randomlyselected sixth input and ninth input to be heated to. The computer 330may then output the selections to the heating controller 320. Theheating controller 320 may then output the heating instructions to thesixth heating element and the ninth heating element of the input device312.

In various embodiments, a lower threshold and an upper threshold of thetemperature may be placed on the temperature generator. The lowerthreshold and the upper threshold may prevent the temperature generator344 from using an in inefficient or excessive temperature. Aninefficient temperature may include heating the input to a temperaturethat is lower than the temperature of the environment of the inputdevice, which may not register on a heat map when monitored. To preventan inefficient temperature from being used a lower threshold may beimposed on the temperature generator 344. The lower threshold of thetemperature may be determined by measuring the ambient temperature ofthe security device. A temperature sensor 322 may monitor thetemperature of the inputs of the input device. Without any input from auser, the temperature may be recorded of the ambient temperature. Theambient temperature may be used as the lower threshold. For example, theambient temperature of the security device may be 20° C. The lowerthreshold may then be set at 20° C. An excessive temperature may includeheating the input to a temperature that is greater than the temperatureof an input of a user, which may be too excessive on a heat map whenmonitored. An excessive temperature may also be determined by atemperature barrier which may be placed on the input device to preventthe temperature of the input to be too hot for a user to touch, or toohot to register as an input on a heat map when monitored. To prevent anexcessive temperature from being used an upper threshold may be imposedon the temperature generator 344. The upper threshold may be determinedby the lower threshold, the temperature of an input of the user, or of atemperature barrier. Upon the determination of the lower threshold, theupper threshold may be determined by the lower threshold. For example,if the lower threshold is 20° C. the upper threshold may be set 15° C.higher at 35° C. The upper threshold may be determined by the user. Forexample, the user may press a key. Upon the keypress of the user, thetemperature of the input may be recorded and used as the upper thresholdof the temperature. A temperature barrier may be set to prevent theinput device from getting too warm for use. A temperature barrier may beset at a comfortable temperature that the user may still touch withouthaving to worry about being painful. For example, a comfortabletemperature to touch may be 35° C., if the input device is more than 35°C. the input device may be too hot to touch. The temperature barrier maythen be set at 35° C.

The sound generator 346 may generate a sound on each input of the user.Upon the input of a security code of a user the sound generator 346 mayaccess a sound or tone database stored within the sound generator 346and the sound may be outputted to the sound controller 324. The speakermay then output the sounds or tone to muffle or mask the keypress of theuser. For example, the input of a user may cause the sound generator 346to send the instructions to the sound controller 324 for an audiblebeeping sound to be produced for each input. The audible beeping soundmay be the same beeping sound for each keypress. In an additionalexample, each keypress of the user may cause a different sound or tonemay be selected at random and outputted by the sound controller 324. Thefirst input may cause a high tone, a second input to be a low tone, thethird and fourth inputs may cause a high tone, and the fifth input a lowtone. Each input from every user inputting on the security device 310may cause a different combination of high and low tones.

FIG. 4, a user entering a security code on an input device isillustrated, according to embodiments. A user may input a four-digitsecurity code including four button presses on the input device 410. Thefour-digit security code may include a first input 401, a second input402, a third input 403, and a fourth input 404. The four-digit securitycode may result in a successful security code input of 405. Each inputof the four-digit security code may include the user heating the inputsby heat transfer. Heat transfer may include conduction where one objectis heated by another. Each input of the user may heat the input throughconductive heat transfer. For example, if a user presses the one inputwith the first input 401, then the first key may be heated byconduction.

The temperature key 460 displays a temperature gradient. The temperaturekey 460 contains six temperatures 1-6 from black (temperature 1) beingthe hottest, to white (temperature 6) being unheated which may be at astart (ambient) temperature. The ambient temperature may include heatingdue to the environment of the input device 410. For example, the inputdevice may be heated by thermal radiation from the sun. The input devicemay start at an ambient temperature of the environment, and be heatedfrom the input of the user.

In various embodiments, a temperature gradient may be selected for thetemperature key 460. The temperature key 460 range may includetemperatures ranging from a lower threshold to an upper threshold. Thetemperatures between the lower threshold and the upper threshold may beset temperatures between the upper threshold and the lower threshold.The lower threshold may be set for temperature 6, the lowesttemperature. For example, the lower threshold may be set at the ambienttemperature of the input device 410. If the ambient temperature of theinput device 410 is 20° C. then the temperature 6 may be set at 20° C.The upper threshold may be set for temperature 1, the highesttemperature. For example, the upper threshold may be set based on atemperature 10° C. above the lower threshold making temperature 1 atemperature 30° C. The range of temperatures between temperature 1 andtemperature 6 for the temperature key 460 may be 20° C. for temperature6, 22° C. for temperature 5, 24° C. for temperature 4, 26° C. totemperature 3, 28° C. for temperature 2, and 30° C. for temperature 1.In an additional example, the upper threshold may be set from the firstinput 401 of the user on an input of the input device 410. If thetemperature of the input of the user is 30° C., then the upper thresholdor temperature 1 may be set at 30° C. The range of temperatures betweentemperature 1 and temperature 6 for the temperature key 460 may be 20°C. for temperature 6, 22° C. for temperature 5, 24° C. for temperature4, 26° C. to temperature 3, 28° C. for temperature 2, and 30° C. fortemperature 1.

The user may input the security code by pressing the inputs of the inputdevice 410. If the security code is a four-digit combination of inputs1-2-3-4, the user may input a first input 401, a second input 402, athird input 403, and a fourth input 404. The user may transfer heat tothe inputs of the input device 410 and after inputting the securitycode, and a thermal imaging device may gather the heat map 405 of theinput device. The heat map 405 may display a residual heat left by theuser based on conduction of the user inputting the input presses of thesecurity code.

For an unauthorized user to determine the security code, theunauthorized user may use the heat map to determine which input is thehottest and which is the coolest of the four-digit security code. Thehottest key, the fourth input of a temperature 1 would be the last inputthe user pressed making it the fourth input. The second hottest key, thethird input of a temperature 2 would be the second to last input theuser pressed making the third input. The third hottest key, the secondinput of a temperature 3 would be the second input the user pressedmaking it the second input. The fourth hottest key, the third input of atemperature 4 would be the first input the user pressed making the firstinput. The unauthorized user would then determine that the four-digitsecurity code would be 1-2-3-4.

In various embodiments, during the security code input of the user asound may be outputted during the input of the user. The input devicemay output a sound or tone on the input of the user or the sound made bythe pressing of the input may be monitored by the unauthorized user. Ifeach input made a different audible tone, then the unauthorized user maylisten to the input of the security code of the user and copy thesecurity code. For example, the first input 401 may output a first tone,the second input 402 may output a second tone, the third input 403 mayoutput a third tone, and the fourth input 404 may output a fourth tone.If the unauthorized user listened to all of the inputs, then theunauthorized user may determine that the security code is 1-2-3-4.

FIG. 5, a user enters a security code on an input device while thecomputer interjects noise to obfuscate a theft of an identity of a useris illustrated, according to embodiments. An authorized user may input asecurity code on an input device 510 and a computer may instruct aheating element to heat individual inputs of the input device 510 toobfuscate a thermal imaging device from gathering the security code ofthe user. The computer may randomly select one or more inputs to beheated. The computer may heat the randomly selected inputs to varyingtemperatures. The temperatures may include the temperatures within thetemperature key 560. The temperature key 560 may include thetemperatures of heated inputs from temperatures 1-6, where temperature 1is the hottest, and temperature 6 is an initial temperature.

In various embodiments, a temperature 6 of the temperature key 560 maybe the temperature of the input device 510 at ambient temperature of theenvironment of the input device 510. Heating the input device 510 by theuser may increase the temperature of the pressed inputs, based on heatexchange from the user to the input though conduction.

In various embodiments, a temperature 1 of the temperature key 560 mayinclude using a temperature sensor to record the temperature of theinput of the user. The temperature sensor may record the temperature ofthe user, and set the temperature 1 of the temperature key 560 at thattemperature for the random heating of the input device. For example, theuser may make the first input 501. The temperature sensor may recordtemperature of the first input 501 of 34° C. The computer may use therecorded temperature of 34° C. as the temperature 1 for a temperatureselection.

The security input of the authorized user inputting the security code onthe input device 510 may include heating a plurality of inputs that areselected. The selection may include a computer with a random numberlocation. The random location generator may select the plurality ofheating elements to be heated. The heating of the plurality of heatingelements may cause the inputs to be heated or look to be heated. Thecomputer may also include a temperature selector. The computer mayinclude a random generator for determining a temperature to heat therandomly selected inputs. For example, the authorized user may input asecurity code of 1-2-3-4. The random thermal noise outputted by thecomputer may display multiple possible four-digit security codecombinations that may obfuscate an attempt of an unauthorized user foraccessing the security code of the authorized user.

In various embodiments, the plurality of inputs may be selected in asequence or an order. The sequence or order may include a cycle ofselected heating elements by the computer. The sequence may include apredetermined list that the computer may use to determine the next setof heating elements to be heated. The sequence may be selectedregardless of the input of the user. The list may include an everycombination of heating elements and temperature the heating elements maybe heated to theoretically creating an infinite list of the sequence.For example, the list may include a sequence of one-hundred thousandcombinations of heating elements and temperatures. The first sequencemay be selecting heating element one and five with temperatures 31° C.and 32° C. respectively. The second sequence may be selecting heatingelement two and nine with temperatures 35.004° C. and 37.05° C.respectively. The sequences may continue until the final combination isreached and restarted at the beginning.

In various embodiments, the cooling of the input may be measured todetermine the appearance of the temperature of the input at variousintervals after the input. The cooling of an input may include measuringthe temperature of the pressing of the input by the user. The decreaseof the temperature may be measured at time intervals that the computerdetermines for a security code entry. For example, a typical securitycode entry may take 4 seconds for a 4-digit security code 1 second perentry. If in 1 second the temperature of a pressed entry decreases from34° C. to 33° C., then the cooling may be 1° C. per second. Therefore,every 1° C. change in temperature may appear to be a 1 second previousinput on the heat map of the thermal imaging device.

The first input 501 may include a user inputting a first number of afour-digit security code. The first input may include a random selectionby the computer of a plurality of random inputs to be heated, and atemperature to heat each of the plurality of inputs. For example, thefirst input 501 may include the user pressing the first (1) key. Uponpressing the first key, a plurality of inputs may be heated includingthe sixth (6), seventh (7), and ninth (9) inputs. The first input may beheated from the user to temperature 1, the sixth input may be heatedfrom the computer to temperature 4, the seventh input may be heated totemperature 3, and the ninth input may be heated to temperature 1.

The second input 502 may include a user inputting a second number of afour-digit security code. The second input may include a randomselection by the computer of a plurality of random inputs to be heated,and a temperature to heat each of the plurality of inputs. The secondinput may also include the cooling of inputs previously heated from thefirst input 501. For example, the second input 502 may include the userpressing the second (2) key. Upon pressing the second key, a pluralityof inputs may be heated including the zero (0), and fifth (5) key. Thesecond input may be heated from the user to temperature 1, the zeroinput may be heated from the computer to temperature 2, and the fifthinput may be to temperature 5. The inputs from the first input 501 mayalso retain their heat or an amount of the heat from the first randomheating. The retention of the heat may cause the first input to have atemperature 2, the sixth input to have a temperature 5, the seventhinput to have a temperature 4, and the ninth input to have a temperature2.

The third input 503 may include a user inputting a third number of afour-digit security code. The third input may include a random selectionby the computer of a plurality of random inputs to be heated, and atemperature to heat each of the plurality of inputs. The third input mayalso include the cooling of inputs previously heated from the firstinput 501 and the second input 502. For example, the third input 503 mayinclude the user pressing the third (3) key. Upon pressing the thirdkey, a plurality of inputs may be heated including the first (1), thefifth (5), and the eighth (8) inputs. The third input may be heated fromthe user to temperature 1, the first input may be heated from thecomputer to temperature 1, the fifth input may be heated to temperature3, and the zero input may be heated to temperature 3. The inputs fromthe first input 501 and the second input 502 may also retain their heator an amount of the heat from the first random heating. The retention ofthe heat from the first input 501 may cause the sixth input to have atemperature 6, the seventh input to have a temperature 5, and the ninthinput to have a temperature 3. The retention of the heat from the secondinput 502 may cause the zero input to have a temperature 3, and thesecond input to have a temperature 2.

The fourth input 504 may include a user inputting a fourth number of afour-digit security code. The fourth input may include a randomselection by the computer of a plurality of random inputs to be heated,and a temperature to heat each of the plurality of inputs. The fourthinput may also include the cooling of inputs previously heated from thefirst input 501, the second input 502, and the third input 503. Forexample, the fourth input 504 may include the user pressing the fourth(4) key. Upon pressing the fourth key, a plurality of inputs may beheated including the sixth (6), and the eighth (8) inputs. The fourthinput may be heated from the user to temperature 1, the sixth input maybe heated from the computer to temperature 5, and the eighth input maybe heated to temperature 1. The inputs from the first input 501, thesecond input 502, and the third input 503 may also retain their heat oran amount of the heat from the first random heating. The retention ofthe heat from the first input 501 may cause the seventh input to have atemperature 6, and the ninth input to have a temperature 4. Theretention of the heat from the second input 502 may cause the zero inputto have a temperature 4, and the second input to have a temperature 3.The retention of the heat from the third input 503 may cause the firstinput to have a temperature 2, the third input to have a temperature 2,and the fifth input to have a temperature 5.

The heat map 505 of the input device may display the input of the userinput of the security code and the random heating of the input device bythe computer. The heat map 505 may include the residual heat of theinputs of the input device from the heating of the inputs from the userthrough a heat transfer of conduction, and the random heating by thecomputer through a heat transfer. The example heat map 505 may include afirst input of temperature 2, a second input of temperature 3, a thirdinput of temperature 2, a fourth input of temperature 1, a fifth inputof temperature 5, a sixth input of temperature 5, a seventh input oftemperature 6, an eighth input of temperature 1, a ninth input oftemperature 4, and a zero input of temperature 4. Using the heat map505, the security code may difficult to determine a four-digit inputfrom the heat map 505. For example, the security code could beinterpreted as 5, 6, 9, or 0 as the first input, 2 as the second input,1 or 3 as the third input, and 4 or 8 as a fourth input. In anadditional example, the security code could be interpreted as 5 or 6 asthe first input, 2, 9, or 0 as the second input, 1 or 3 as the thirdinput, and 4 or 8 as the fourth input.

In various embodiments, the input device may be a touch screen. Thetouch screen may include a GUI. The GUI may display a plurality ofinputs to the user, which the use may press to input a security code.The user may select one or more inputs on the touch screen to input thesecurity code. For example, the touch screen device may be a mobilephone. The mobile phone may display number 0-9 that the user may inputfor the security code. The user may then input the security code bypressing one or more portions of the mobile phone to input the securitycode.

In various embodiments, after the user inputs the security code aplurality of randomly selected inputs may be heated to a temperature.Instead of heating a plurality of inputs after each input press, theheating of the plurality of inputs may be initialized after the fourthdigit of the four-digit security code has been inputted. Upon the pressof the first through third input the input device may not be heated,upon the press of the fourth key, a plurality of inputs of the inputdevice 510 may be heated. For example, after the fourth input mayinclude selecting a random plurality of inputs to heat to a temperature.After the fourth input the heating of the inputs may be displayed on aheat map 505 of the temperature of the inputs.

In various embodiments, the timing of the heating of the heatingelements by the heating controller, or the output of the sound by thesound controller may be delayed. The delay of the timing of the heatingelements may obfuscate the heat map generated by a thermal imagingdevice. When observed on a thermal imaging device the delayed input maylook as an additional input has been pressed. For example, a user maypress a first input and 0.5 seconds after the first input was pressedthe fourth input is heated, the fourth input when observed on a heat mapwould seem to look like the fourth input was pressed in secession afterthe first input. When the sound of the sound controller is delayed, thedelayed sound output may seem to sound like an additional input waspressed or multiple additional inputs were pressed. For example, a usermay press a first input, which results in an audible sound, 0.5 secondsafter the user presses the first input a sound may be generated andoutputted from the sound controller, which may sound like a second inputbeing pressed.

FIG. 6, a flowchart of a method 600 of the random heating securitymeasure being interjected is illustrated, according to embodiments. Asecurity system may include a computer configured to randomly heatinputs of the input device. The computer may also be configured torandomly heat the randomly selected inputs of the input device to aselected temperature. Monitoring the input device with a thermal imagingdevice after heating the inputs randomly may display a plurality ofinputs heated to various temperatures. The computer may also beconfigured to create random audible noise.

In operation 602, a security system may include a security device (inputdevice) that a user may input one or more inputs to gain access to whatthe input device is securing. The input device may be used to input asecurity code. The security system may include an input device iscoupled to a heating controller. The input device may include aplurality of inputs a user may press to input a security code. Theheating controller may connect to heating elements within the inputdevice. The heating elements may be within the inputs of the inputdevice, behind the inputs of the input device, or may heat the inputs ofthe input device. The heating controller may also be communicativelycoupled to a computer that may instruct the heating controller to heatthe heating elements of the input device. The computer may determine arandom plurality of inputs (set of inputs) that may be heated. Thecomputer may determine a temperature to heat each of the set of inputs.The input device may then be heated to a temperature determined by thecomputer.

In operation 604, the computer determines if an input has been receivedon the input device. The computer may implement a security measure basedon the input of a user. The input of the user may include a press of aninput or button of the input device. The user may press an input of theinput device when inputting a security code. The computer may thenimplement a security measure upon the input of the user. The securitymeasure may include heating a plurality of inputs of the input device.The heating of the plurality of heating elements may obfuscate a use ofheat map of a thermal imaging device from gathering the security inputof an authorized user. For example, a user may press an input of theinput device, upon the press of the input device a security measure maybe implemented by the computer and heating controller on the inputdevice. If an input of the input device is not pressed the method 600may loop or be suspended until an input is pressed. If an input of theinput device is pressed the method 600 may progress to operation 608,where a set of heating elements are generated.

In various embodiments, a security measure may include generating arandom tone based on the input of the user. The generation of an audibletone may obfuscate the sounds generated by the input of the authorizeduser on the input device. The computer may be communicatively coupledwith a speaker. The speaker may generate a tone on the press of theinput by the user. For example, a user may press a first key of theinput device. The computer may then output a tone to the speaker that isaudibly transmitted by the speaker obfuscating the sound of the inputpress by the user.

In operation 606, a random set of a plurality of heating elements aregenerated. The input may issue a command to the computer, which maydetermine a random plurality of inputs (a random set of inputs) to beheated. The randomly selected set of the plurality of inputs to beheated may be routed through the heating controller, which informs therandomly selected set of heating elements to heat. For example, the usermay press an input of the input device when entering the security code.Upon the press of the key, the computer may determine that a random setof two inputs of the input device may be heated. In an additionalexample, upon the press of an input of the user, the computer maydetermine that a set of three inputs of the input device may be heated.

The security measure may include audible noise. Upon the input of theuser, a random audible noise may be generated to obfuscate the sound ofthe input of the user that an unauthorized user may use to determiningthe input of the authorized user by listening. For example, if anauthorized user presses an input of the input device, a speaker mayoutput an audible tone to the user. The audible tone may mask the soundthe input produces when inputted by the user.

In operation 608, a temperature is generated for each heating element ofthe set of the plurality of heating elements. A command may be generatedby the computer to determine a temperature of which to heat the set ofinputs. The command may include one or more temperatures that theheating elements may be heated to. The command may be sent from thecomputer to the heating controller, instructing the heating controllerto heat the heating elements to a randomly selected temperature. Therandomly selected temperature may be generated from a temperature rangeincluding a lower threshold and an upper threshold. The lower thresholdmay be set based on an ambient temperature. For example, the lowerthreshold may be set by measuring the temperature of the input device,the temperature of the input device before the input of the user may beset as a lower threshold. The upper threshold may be set based on thelower threshold or an upper limit of the temperature.

The heating controller may instruct the heating elements to heat to theselected temperature. For example, a press of a third input of the inputdevice may generate a set of two heating elements including a firstheating element and a fifth heating element. A temperature is selectedby the computer for the first heating element of a temperature of 34° C.and a temperature is selected for the fifth heating element of atemperature of 38° C. In an additional example, a press of a ninth inputof the input device may generate a set of four heating elementsincluding a first, second, sixth, and eighth heating elements. Atemperature may be generated by the computer for each of the inputs inthe set resulting in 32° C. for the first, 35° C. for the second, 35° C.for the sixth, and 37° C. for the eighth.

In various embodiments, the temperature can be randomly selected by thecomputer. The temperature may be randomly selected between the upper andlower threshold. Instead of determining the temperature of the inputs,the temperature may just be randomly selected by a random numbergenerator within the computer as long as the temperature is between theupper threshold and the lower threshold. For example, if the upperthreshold is 40° C. and the lower threshold is 30° C. then a temperaturemay be selected between 30-40° C.

In various embodiments, the temperature controller may include atemperature sensor. The temperature sensor may measure the temperatureof the input after a user presses the input. Upon the pressing of theinput by the user, the temperature sensor may record the temperature ofthe input pressed by the user. The recorded temperature may then be usedby the computer for the temperature generator. For example, the user maypress the first input of the security device. The temperature sensor maythen record the temperature of the first input as 36° C. The temperaturemeasurement by the temperature sensor of 36° C. may then be applied toone or more inputs of the security device as a security measure.

In various embodiments, the temperature may be selected based on adetermined cooling of the input. The rate of cooling may be measured andapplied to the determination of the temperatures. By selecting thetemperatures based on the rate of cooling, the heat map of the inputdevice may look like inputs were pressed in different time periods. Forexample, if the cooling rate of an input is 1° C. per 1 sec, then every1° C. difference in the temperature of the input causes the cooler inputto seem to be inputted 1 sec earlier.

In operation 610, the temperature is applied to the set of the pluralityof heating elements. The random set of heating elements and the selectedtemperatures for each of the heating elements within the set may begenerated by the computer and sent the heating controller. The heatingcontroller may then heat the set of heating elements to their respectivetemperatures. For example, a set of heating elements may include a firstheating element and a third heating element. The computer may determinea temperature of 34° C. for the first heating element and 36° C. for thethird heating element. The first heating element may then be heated to34° C. and the second heating element may be heated to 36° C. In anadditional example, a set of heating elements may include a secondheating element a fifth heating element and a seventh heating element.The computer may determine a temperature of 31° C. for the secondheating element 34° C. for the fifth heating element and 34° C. for theseventh heating element. The second heating element may then be heatedto 31° C. the fifth heating element may be heated to 34° C. and theseventh heating element may be heated to 34° C.

The method 600 may then return to operation 604 where additional inputsare received by the input device, which may result in additional sets ofheating elements being randomly selected and heated to temperatures. Forexample, the user may input a first input on the third key that randomlyheats the fourth key to 36° C. and the fifth key to 32° C. The user maythen input a second input on the eighth key that randomly heats thethird key to 34° C., and the seventh key to 35° C. The method maycontinue indefinitely until the user ceases inputting keys on the inputdevice.

In various embodiments, the heating controller may receive the heatinginstructions on the completion of the input of the security code of theuser. Upon the completion of the inputs of the user on the securitydevice, the heating controller may heat a random set of keys generatedby a computer. A security code may require a predetermined amount ofinputs, after the predetermined amount of inputs have been pressed, thecomputer may instruct the heating controller to heat a generated randomset of heating element to a randomly generated temperature for eachheating element. For example, the security code may a predeterminedamount of inputs of four inputs, upon the fourth input press of theuser; the computer may send a generated random set of heating elementsand temperatures to the heating controller and heat the generated randomset to the temperatures.

In various embodiments, the security measure may include audible noise.Upon the input of the user, a random audible noise may be generated toobfuscate the sound of the input of the user that an unauthorized usermay use to determining the input of the authorized user by listening.For example, if an authorized user presses an input of the input device,a speaker may output an audible tone to the user. The audible tone maymask the sound the input produces when inputted by the user.

The present invention may be a system, a method, and/or a computerprogram product. The computer program product may include a computerreadable storage medium (or media) having computer readable programinstructions thereon for causing a processor to carry out aspects of thepresent invention.

The computer readable storage medium may be a tangible device that mayretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein may bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including an objectoriented programming language such as Smalltalk, C++ or the like, andconventional procedural programming languages, such as the “C”programming language or similar programming languages. The computerreadable program instructions may execute entirely on the user'scomputer, partly on the user's computer, as a stand-alone softwarepackage, partly on the user's computer and partly on a remote computeror entirely on the remote computer or server. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network, including a local area network (LAN) or a wide areanetwork (WAN), or the connection may be made to an external computer(for example, through the Internet using an Internet Service Provider).In some embodiments, electronic circuitry including, for example,programmable logic circuitry, field-programmable gate arrays (FPGA), orprogrammable logic arrays (PLA) may execute the computer readableprogram instructions by utilizing state information of the computerreadable program instructions to personalize the electronic circuitry,in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, may be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that may directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, may be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

The descriptions of the various embodiments of the present disclosurehave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of the describedembodiments. The terminology used herein was chosen to explain theprinciples of the embodiments, the practical application or technicalimprovement over technologies found in the marketplace, or to enableothers of ordinary skill in the art to understand the embodimentsdisclosed herein.

What is claimed is:
 1. A system for obfuscating a security code, thesystem comprising: an input device including a plurality of heatingelements, wherein the input device is configured to: receive an inputfrom a user on the input device that grants access to a user based on anentry of a security code, the input device coupled to a plurality ofheating elements; a memory; a processor device communicatively coupledto the input device and the memory, wherein the processor device isconfigured to: measure an ambient temperature of an input device;display the input device on a graphical user interface; communicate, inresponse to receiving the input, a random audible tone to the user;record a temperature of the input of the user on the input device;generate, in response to receiving the input, a random set of heatingelements including one or more heating elements of the plurality ofheating elements; determine a temperature of a temperature range forheating one or more heating elements of the random set of heatingelements based on the temperature of the input of the user, wherein thetemperature range includes: an upper threshold of the temperature rangewhich is the temperature of the input of the user, and a lower thresholdof the temperature range which is the ambient temperature of the inputdevice; and a heating controller communicatively coupled to the inputdevice, the memory, and the processor device, wherein the heatingcontroller is configured to: apply the temperature of the temperaturerange to each of the one or more heating elements of the random set ofheating elements.