Systems and methods for authenticating a user at a public terminal

ABSTRACT

Systems and methods for authenticating a user to access a public terminal are described. Disclosed embodiments may include reading, using the physical credential reader, a user identifier from the physical credential device. Disclosed embodiments may also include transmitting the public terminal identifier and the user identifier to a secure server. Further, disclosed embodiments may include receiving, after completing the transmission, a unique code from the secure server. Disclose embodiments may additionally include displaying the unique code on the display device. Disclosed embodiments may include receiving, after displaying the unique code, an authentication message from the secure server. Disclosed embodiments may further include, responsive to receiving the authentication message, authorizing the user to use a terminal command at the public terminal.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a divisional application of U.S. application Ser.No. 16/030,814, filed Jul. 9, 2018, currently pending, the disclosure ofwhich is expressly incorporated herein by reference in its entirety.

TECHNICAL FIELD

The disclosed embodiments generally relate to information technologysecurity, and more particularly, to securely authenticating a user at apublic terminal.

BACKGROUND

Some computer systems include arrangements in which certain terminalsare public and may operated by many different users. For example, acomputing system may include a terminal that is available for anyone inthe public to use. In order to customize a public terminal for anindividual's use and/or to block unwanted users from accessing thesystem through the public terminal, a system may require a user topresent a credential, such as a personal identifier and/or passcode. Thecredentials may allow the user to access user-specific applications,databases, and information.

In the example context of a financial computer network, automatic tellermachines (ATMs) and point-of-sale (POS) systems may act as publicterminals. For example, ATMs may be located on city streets, accessibleto anyone in the area. And, a user of that public terminal may present apayment card, sometimes in conjunction with entry of a personalidentification number (PIN), to access the public terminal, for example,to complete a purchase or withdraw currency. However, properauthorization depends on the user being authenticated so that the systemcan trust that the user is who he or she purports to be. Otherwise, thesystem has no way to determine that a user only view and manages fundsof his or her own accounts.

SUMMARY

The disclosed embodiments address disadvantages of existing systems byproviding novel systems, methods, and techniques for securelyauthorizing a user to access a public terminal. Unlike any priorimplementations, the disclosed systems and methods improve authorizationof a user to use a public terminal by using multiple (e.g., three)factors to authenticate a user, for example. Thus, the disclosed systemsand methods may provide an improved authorization scheme that solvesissues identified with existing authentication mechanisms, such assingle factor (e.g., PIN-based) authentication, which may be susceptibleto being compromised. Further, by using more secure authorizationmethods, the risks of an un-trusted third party discovering a securitykey through eavesdropping may be reduced, speed of pairing between thetwo devices may be increased, and the amount of overhead that isrequired to share security keys may be reduced over pre-existingsystems.

Consistent with certain disclosed embodiments, a method is provided forauthenticating a user to access a public terminal using three forms ofauthentication. The method may include the step of receiving a useridentifier of a physical credential device. Also, the method may includegenerating, based on the public terminal identifier and the useridentifier, a unique code. The method may also include receiving aphotograph from an unlocked mobile phone. Further, the method mayinclude the step of, responsive to determining that the receivedphotograph corresponds to the unique code, providing a user profile tothe unlocked mobile phone, the user profile including an identificationof a type of password interface. Additionally, the method may includethe step of, responsive to receiving, from the unlocked mobile phone,password input data originating from the identified type of passwordinterface that matches a password of the user profile, transmitting aninstruction to at least one of the unlocked mobile phone and the publicterminal to allow the user to enter one or more commands affecting thepublic terminal.

Moreover, consistent with certain disclosed embodiments, a system isprovided for authenticating a user to access a public terminal usingthree forms of authentication. The system may include a display device,a physical credential reader, a memory storing instructions, and one ormore processors. The one or more processors may be configured to performoperations including reading a user identifier from the physicalcredential device using the physical credential reader. The operationsmay further include transmitting the public terminal identifier and theuser identifier to a secure server. Additionally, the operations mayinclude receiving, after completing the transmission of the publicterminal identifier and the user identifier, a unique code from thesecure server. The operations may include displaying the unique code onthe display device. The operations may include receiving, afterdisplaying the unique code, an authentication message from the secureserver. Also, the operations may include, responsive to receiving theauthentication message, authenticating the user to use a terminalcommand at the public terminal.

Consistent with certain disclosed embodiments, a method is provided forusing a computing device to authenticate a user to access a publicterminal. The method may include a step of receiving, from the publicterminal, a unique code. The method may also include a step oftransmitting a request for a user profile to a server, the request beingbased on the unique code. The method may further include a step ofreceiving the user profile in response to the request. Also, the methodmay include a step of providing, based on the user profile, a passwordinterface in a secure application running on the computing device. Themethod may include the step of receiving user input at the passwordinterface. Additionally, the method may include the step of transmittingthe user input to the secure server. The method may also include thestep of, responsive to receiving authentication, commencing a session atthe public terminal.

In addition, consistent with certain disclosed embodiments, a system isprovided for using a computing device to authenticate a user to access apublic terminal. The system may include a memory storing instructionsand one or more processors. The one or more processors may be configuredto perform operations including receiving a unique code from a publicterminal. The operations may further include transmitting a request fora user profile to a server, the request being based on the unique code.Also, the operations may include receiving the user profile in responseto the request. The operations may additionally include providing, basedon the user profile, a password interface in a secure applicationrunning on the computing device. The operations may include receivinguser input at the password interface. Further, the operations mayinclude transmitting the user input to the secure server. The operationsmay further also responsive to receiving authentication, commencing asession at the public terminal.

Aspects of the disclosed embodiments may also include a non-transitorytangible computer-readable medium that stores software instructionsthat, when executed by one or more processors, configure the one or moreprocessors to perform one or more of the methods, operations, and thelike consistent with the disclosed embodiments.

It is to be understood that both the foregoing general description andthe following detailed description are exemplary and explanatory only,and are not restrictive of the disclosed embodiments as claimed.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of this specification, illustrate disclosed embodiments and,together with the description, serve to explain the disclosedembodiments. In the drawings:

FIG. 1 is a block diagram of an example system environment for securelyauthenticating a user at a public terminal;

FIG. 2 is a flowchart of an example process for securely authenticatinga user at a public terminal, consistent with disclosed embodiments;

FIG. 3 is a flowchart of an example process for securely authenticatinga user at a public terminal, consistent with disclosed embodiments;

FIG. 4 is a flowchart of an example process for securely authenticatinga user at a public terminal, consistent with disclosed embodiments;

FIG. 5 is a flowchart of an example process for securely authenticatinga user at a public terminal, consistent with disclosed embodiments; and

FIGS. 6A, 6B, and 6C each depict an example implementation for updatinga process for pairing devices for securely authenticating a user at apublic terminal, consistent with disclosed embodiments.

DETAILED DESCRIPTION

The disclosed embodiments are directed to systems and methods forauthenticating a user at a public terminal, for example, to determinewhether the user is authorized to operate the public terminal.Authentication is necessary to verify the identity of a user, which mayin turn determine what permissions or authorizations the user may haveat a given public terminal. In particular, the disclosed systems andmethods include techniques for authenticating a user at a publicterminal using multiple forms of authentication in combination. As anexample, the disclosed embodiments may involve a scenario where a userpossesses a mobile device and a physical authentication credential whenapproaching a terminal. Using this scenario, the user may provide thephysical authentication credential to the public terminal (e.g.,scanning a magnetic strip card or inserting a chip card), after whichthe public terminal may prompt the user to enter a personalidentification code (e.g., a PIN) associated with the physicalidentification credential. The public terminal may then provide the userwith a mobile device code or pattern (also referred to as a “uniquecode”) to scan or receive using, for example, a mobile device that isunlocked. Next, the unlocked mobile device may transmit the scannedinput from the public terminal to a secure server. In some embodiments,the mobile device transmits the scanned input to a secure server with akey indicating that the mobile device is a trusted device. The key maybe used as a hash key input to cryptographically encode the scannedinput. The key may have been previously transmitted from a secure serverto the mobile device. The server may verify that the scan matches thepattern provided by the public terminal, and transmit a user profile tothe mobile device. Based on the user profile, the mobile device maypresent a password interface within an application running on the mobiledevice. Input received at the password interface may then be sent to thesecure server for verification. Once the password interface input isverified, the secure server may transmit an authentication message tothe public terminal and/or mobile device to authorize the user to userthe public terminal.

Disclosed embodiments may relate to using “triple factor”authentication. For example, embodiments may use three forms ofauthentication to authorize a user to use a public terminal. The formsof authentication may include, for example, (1) a user's personalidentification number (PIN) associated with a user's identificationcard; (2) a mobile device authentication mechanism (e.g., numericsequence, alphanumeric password, fingerprint scan, and/or facialrecognition); and (3) a user-selected authentication mechanism within asecure application running on the mobile device.

As to the first example of a user PIN, a user may submit anidentification card (e.g., access badge, keycard, magnetic strip card,proximity card, Department of Defense Common Access Card (CAC Card),Homeland Security Presidential Directive 12 (HSPD-12) compliant card,credit card, debit card) that in disclosed embodiments is then read by adevice. In other embodiments a numeric PIN or alphanumeric password isreceived from a user associated with the identification card. Yet otherembodiments may employ an identification form other than a card, such asa radiofrequency identification (RFID) fob, a universal serial bus (USB)fob, a physical key, or other form of physical identificationcredential, for example.

As to the second example of a mobile device authentication mechanism,disclosed embodiments a mobile device unlocking mechanism may be used indisclosed embodiments as an authentication mechanism. For example,smartphones that use a user password or biometric information may beemployed in disclosed embodiments to authenticate the user to operatethe mobile device. User passwords may include, for example, numeric PINs(e.g., four-, six-, or eight-digit PINs) and/or alphanumeric passwords.Biometric authentication may include, for example, fingerprint scans,facial recognition, voice recognition, retinal scans, iris recognition,and/or vascular pattern recognition. The user's mobile device mayinclude an input mechanism and/or sensor(s) to receive input of thebiometric information and/or user password. Additional mobile devicesauthentication mechanisms may be used with disclosed embodiments, evenif not explicitly named here.

In some embodiments, mobile device authentication mechanism will onlywork when the mobile device is identified as a trusted mobile device.Upon satisfying authentication measures, secure server may transmit akey to mobile device, which mobile device may use to indicate that it isa trusted device when transmitting information to a secure server. Forexample, mobile device may perform a hash function on data to betransmitted to secure server using the key. Secure server may use aninverse key to decrypt the data, ensuring that the data came from atrusted device. In other examples, mobile device may transmit the keyalong with data to secure server.

As to the third example of a user-selected authentication mechanismwithin a secure application, an application-based password derived fromuser profile information associated with the application may be used.The password interface may be any interface provided the application.For example, the password interface may involve a password (e.g.,numeric, alphanumeric) to be entered in a password field of a graphicaluser interface. In other examples, the password interface may involve apattern to be received from the user at a touchscreen user interface.For example, the user may draw an object, an abstract pattern, or asignature on a touchscreen. In still other examples, a password userinterface may be presented, in which the user, by selecting or dragging,moves images on a touchscreen user interface of a mobile device.

Other forms of authentication may be used in addition to or instead ofthe three exemplary authentication forms listed above. Further, whilecertain embodiments use three forms of authentication, embodiments ofthis disclosure may use fewer or more forms of authentication. Forexample, authentication, as used in some embodiments, may include one,two, four, five, ten, or any number of forms of authentication.

Reference will now be made in detail to the disclosed embodiments,examples of which are illustrated in the accompanying drawings. Whereverconvenient, the same reference numbers will be used throughout thedrawings to refer to the same or like parts.

FIG. 1 shows a block diagram of an example system environment forsecurely authenticating a user at a public terminal. The components andarrangements shown in FIG. 1 are not intended to limit the disclosedembodiments, as the components used to implement the disclosed processesand features may vary.

Consistent with disclosed embodiments, a system 100 may include a publicterminal 110, a secure server 140, a user device 160, and/or a network190. Other components known to one of ordinary skill in the art may beincluded in system 100 to gather, process, transmit, receive, andprovide information used in conjunction with the disclosed embodiments.

Public terminal 110 may be a device comprising a memory, processor, andother specialized hardware that is configured to transmit a patternusing a particular communication method or medium to user device 160.For example, public terminal 110 may include a transmitter capable oftransmitting a pattern using a medium of light (e.g., an LCD display, ane-ink display, a light-emitting diode, an incandescent light bulb, aninfrared transmitter, etc.), sound (e.g., a speaker, a digital audiotransmitter, a frequency modulation transmitter), thermal energy (e.g.,thermoelectric power generator, fan, infrared laser, etc.), vibrations(e.g., a motor, such as a Pico Haptic™ shaftless vibration motor, etc.),pulses of air (e.g., a fan, an air compressor, etc.) or the like to userdevice 160.

In disclosed embodiments, public terminal 110 may include one or moreprocessors 112, a memory 114, input devices 120, and/or output devices130.

Processor 112 may be one or more known processing devices, such as amicroprocessor from the Pentium™ or Atom™ families manufactured byIntel™, the Turion™ family manufactured by AMD™, the Exynos™ familymanufactured by Samsung™, or the Snapdragon™ family manufactured byQualcomm™. Processor 112 may constitute a single-core or multiple-coreprocessor that executes parallel processes simultaneously. For example,processor 112 may be a single-core processor configured with virtualprocessing technologies. In certain embodiments, processor 112 may uselogical processors to simultaneously execute and control multipleprocesses. Processor 112 may implement virtual machine technologies, orother known technologies to provide the ability to execute, control,run, manipulate, store, etc. multiple software processes, applications,programs, etc. In another embodiment, processor 112 may include amultiple-core processor arrangement (e.g., dual-core, quad-core, etc.)configured to provide parallel processing functionalities to allowpublic terminal 110 to execute multiple processes simultaneously. One ofordinary skill in the art would understand that other types of processorarrangements could be implemented that provide for the capabilitiesdisclosed herein.

Memory 114 may be a volatile or non-volatile, magnetic, semiconductor,tape, optical, removable, non-removable, or other type of storage deviceor tangible (i.e., non-transitory) computer-readable medium that storesone or more program(s), such as an application and data storage. Datastorage may store, for example, a user's personal information, accountinformation, displays, settings, one or more pairing configurations, oneor more logs, and preferences.

Input devices 120 may include devices to receive user and/or computerinput, such as a camera 122, a keypad 124, and/or a card reader 126.Camera 122 may be a device capable of capturing visual spectrum. Forexample, camera 122 may include a CCD (charge-coupled device) camera, aCMOS (complementary metal-oxide-semiconductor) camera, and the like.Keypad 124 may include a mechanism to provide user input, such as byselecting letters and/or numbers. For example, keypad 124 may include akeyboard, a number pad, tactile buttons, capacitive buttons, mechanicalswitches, one or more touchscreens, and the like. Card reader 126 man bea device capable of reading a physical credential from a user. Forexample, card reader 126 may include a magnetic strip reader, an RFIDreader, a secure chip reader, a near-field communication (NFC) device,and the like.

Output devices 130 may include devices or components to provide data. insome embodiments, output devices 130 may include display 132, infraredtransmitter 134, and/or audio output 136. Display 132 may include adevice capable of receiving computer data and presenting it visually. Asan example, display 132 may include a liquid crystal display (LCD), ane-ink display, a light-emitting diode (LED) display, a cathode ray tube(CRT) display, and the like. Infrared transmitter 134 may be a devicecapable of transmitting signals in the infrared spectrum. For example,infrared transmitter may include one or more infrared LEDs withassociated driver circuitry. Audio output 136 may include a devicecapable of producing sound. For example, audio output 136 may includeone or more of a piezoelectric speaker, an electric loudspeaker, anelectrostatic speaker, a soundbar, a subwoofer, and the like.

While not shown in FIG. 1, output devices 130, in certain embodiments,may include one or more devices capable of transmitting patterns inspecific media. That is, output devices 130 may comprise one or moreelements capable of transmitting a pattern using one or more of light,sound, thermal energy, vibrations, air pulses, or the like to userdevice 160. For example, transmitters may include one or morelight-emitting elements capable of transmitting blinking indicators,multi-colored indicators, etc. to user device 160. Transmitters may alsoinclude thermoelectric devices, fans capable of producing pulse of air,motors capable of producing vibrations, speakers, etc. In the disclosedembodiments, transmitters may include specialized hardware elements of aform factor configured to be provided as part of a card or card type ofpublic terminal 110.

Public terminal 110 may be a terminal that is accessible to the generalpopulation. In one example, public terminal 110 may be a general-purposecomputer that is available to the public, such as a computer availableat a public library or information center. In other examples, publicterminal 110 may be a specialized computer. For example, public terminal110 may be a ticket kiosk, a self-checkout system, an ATM, a POS system,and the like.

User device 160 may be a device comprising a memory, a processor, andother specialized hardware that is configured to receive a patter frompublic terminal 110 that is transmitted using a particular communicationmethod or medium. For example, user device 160 may include a sensorcapable receiving or detecting a pattern transmitted by a medium oflight (e.g., a camera, a light sensor, etc.), sound (e.g., a microphone,etc.), thermal energy (e.g., a heat detector, etc.), vibrations (e.g., apiezoelectric accelerometer, a velocity sensor, a proximity probe,etc.), pulses of air (e.g., a piezoelectric accelerometer, a velocitysensor, a proximity probe, etc.), or the like from public terminal 110.

User device 160 may also be associated with a user. In some embodiments,the user may be an individual associated with one or more accounts, anduser device 160 may be associated with or include information concerningone or more of these accounts.

User device 160 may include one or more of a processor 162, a memory164, an authentication application 166, input devices 170, and/or outputdevices 180. Processor 162 may be one or more known processing devices,such as a microprocessor from the Pentium™ or Atom™ familiesmanufactured by Intel™, the Turion™ family manufactured by AMD™, theExynos™ family manufactured by Samsung™, or the Snapdragon™ familymanufactured by Qualcomm™. Processor 162 may constitute a single-core ormultiple-core processor that executes parallel processes simultaneously.For example, processor 162 may be a single-core processor configuredwith virtual processing technologies. In certain embodiments, processor162 may use logical processors to simultaneously execute and controlmultiple processes. Processor 162 may implement virtual machinetechnologies, or other known technologies to provide the ability toexecute, control, run, manipulate, store, etc. multiple softwareprocesses, applications, programs, etc. In another embodiment, processor162 may include a multiple-core processor arrangement (e.g., dual-core,quad-core, etc.) configured to provide parallel processingfunctionalities to allow user device 160 to execute multiple processessimultaneously. One of ordinary skill in the art would understand thatother types of processor arrangements could be implemented that providefor the capabilities disclosed herein.

Memory 164 may be a volatile or non-volatile, magnetic, semiconductor,tape, optical, removable, non-removable, or other type of storage deviceor tangible (i.e., non-transitory) computer-readable medium that storesone or more program(s), such as an application and data storage. Datastorage may store, for example, a user's personal information, accountinformation, displays, settings, one or more pairing configurations, oneor more logs, and preferences.

Authentication application 166 may be a software application thatexecutes on user device 160 using processor 162 and memory 164.Authentication application may be a computer program that is used toauthenticate a user. For example, authentication application may presenta password user interface to a user to receive password input from auser. The interface may Include, for example, numeric or alphanumericentry fields, pattern entry fields, image selection fields, and thelike. In an embodiment, authentication application may be an applicationprovided by a financial institution to allow the user to interact withone or more accounts of the financial institution. The financialapplication may include a password prompt to authenticate the user priorto providing the user with access to the user's account.

Input devices 170 may include devices to receive user and/or computerinput. In some embodiments, input devices 170 may include a camera 172,a touchscreen 174, and/or an infrared receiver 176. Camera 172 may be adevice capable of capturing visual spectrum. For example, camera 172 mayinclude a CCD camera, a CMOS camera, and the like. Touchscreen 174 mayinclude a mechanism to receive user input, such as by interacting with agraphical user interface. For example, touchscreen 174 may include acapacitive touchscreen. In other examples, in addition to touchscreen174, input devices 170 may include other input mechanisms such as akeyboard, a number pad, tactile buttons, capacitive buttons, mechanicalswitches, and the like. Infrared receiver 176 may be a device orcircuitry capable of receiving and/or sensing infrared signals.

Output devices 180 may include devices or components to provide data. Insome embodiments, output devices 180 may include a display 182 and/or anaudio output 184. Display 182 may include a device capable of receivingcomputer data and presenting it visually. As an example, display 182 mayinclude a liquid crystal display (LCD), an e-ink display, alight-emitting diode (LED) display, a cathode ray tube (CRT) display,and the like. Infrared transmitter 134 may be a device capable oftransmitting signals in the infrared spectrum. For example, infraredtransmitter may include one or more infrared LEDs with associated drivercircuitry. Audio output 136 may include a device capable of producingsound. For example, audio output 136 may include one or more of apiezoelectric speaker, an electric loudspeaker, an electrostaticspeaker, a soundbar, a subwoofer, and the like.

Network 190 may comprise any type of computer networking arrangementused to exchange data. For example, network 190 may be the Internet, aprivate data network, virtual private network using a public network,and/or other suitable connection(s) that enables the components ofsystem 100 to send and receive information. Network 190 may also includea public switched telephone network (“PSTN”) and/or a wireless networksuch as a cellular network, wired Wide Area Network (WAN), WiFi network,or other known wireless network (e.g., WiMAX) capable of bidirectionaldata transmission.

Secure server 140 may include one or more computer-based systemsincluding computer system components, desktop computers, workstations,tablets, hand held computing devices, memory devices, and/or internalnetwork(s) connecting the components. In some embodiments, secure server140 may be enabled for cloud computing. Secure server 140 may include aphysical and/or virtual storage system associated with cloud storage forstoring data and providing access to data via network 190. Secure server140 may include cloud services such as those offered by, for example,Amazon®, Apple®, Cisco®, Citrix®, IBM®, Joyent®, Google®, Microsoft®,Rackspace®, Salesforce.com®, and Verizon®/Terremark®, or other types ofcloud services accessible via network 190. In some embodiments, secureserver 140 comprises multiple computer systems spanning multiplelocations and having multiple databases or multiple geographic locationsassociated with a single or multiple cloud storage services.

As used herein, secure server 140 refers to physical and virtualinfrastructure associated with a single cloud storage service. In someembodiments, secure server 140 manages and/or stores data in securememory 144. In addition, secure server 140 may be owned and/or operatedby an entity responsible for issuing (e.g., creating or authorizing thecreation of) public terminal 110 and maintaining one or more accountsassociated with public terminal 110. In some embodiments, secure server140 is associated with one or more of membership facilities, such asfitness centers, government organizations, such as state governments ordepartments of motor vehicles, banks, credit card companies, hospitals,hotels, or any other entities that may manage and/or maintain devicessuch as public terminal 110, and/or maintain one or more accounts. Insome embodiments, secure server 140 may be configured to authenticate apublic terminal 110 or user device 160 based on one or more knownauthentication techniques before providing configuration data or otherinformation, such as a security key of the disclosed embodiments, to thepublic terminal 110 and/or user device 160.

Secure server 140 may include secure processor 142 and secure memory144. Secure processor may be a processor, such as those previouslydescribed for processor 112 of public terminal 110 and processor 162 ofuser device 160. Secure memory 144 may include one or more memorydevices that store data and instructions used to perform one or moreaspects of the disclosed embodiments. In some aspects, components ofsystem 100 (shown and not shown) may be configured to receive, obtain,gather, collect, generate, or produce information to store in securememory 144. For example, in some embodiments, secure memory 144 maystore information, such as one or more pairing configurations for thesecure pairing associated with public terminal 110, user device 160,and/or secure server 140. Secure memory 144 may also include anycombination of one or more databases controlled by memory controllerdevices (e.g., other server(s), etc.) or software, such as documentmanagement systems, Microsoft™ SQL databases, SharePoint™ databases,Oracle™ databases, Sybase™ databases, or other relational databases. Insome embodiments, secure memory 144 may comprise an associative arrayarchitecture, such as a key-value storage, for storing and rapidlyretrieving large amounts of information about an individual.

System 100 may include firewall 150. In some embodiments, secure server140 may connect to network 190 using firewall 150. Firewall 150 maymonitor and control incoming and outgoing network traffic based onpredetermined security rules. Firewall 150 may act as a barrier betweena trusted internal network and untrusted external network. In anexample, network 190 may be an untrusted external network, such as theInternet, and firewall 150 may act as a barrier to selectively separatenetwork traffic of network 190 from secure server 140. For example,firewall 150 may include packet filtering, stateful filters, proxyservers, network address translation, and/or application-levelfirewalls.

FIG. 2 shows a flowchart of an example process 200 for authenticating auser to use a public terminal, consistent with the disclosedembodiments. In the following description, reference is made to certaincomponents of FIG. 1 for purposes of illustration. For example, FIG. 2may depict process 200 with method steps shown corresponding to one ormore of public terminal 110, secure server 140, and user device 160. Itshould be appreciated, however, that other implementations are possibleand that components other than those illustrated above in FIG. 1.

At step 205, process 200 may receive credentials. Public terminal 110may receive one or more user credentials. For example, a card reader 126may receive a physical user credential, such as a magnetic strip card, astrip and chip card, an RFID card, and/or an NFC card. The physical usercredential may be associated with a user. In some embodiments, publicterminal 110 may receive a personal identification code associated withthe physical user credential. For example, keypad 124 of public terminal110 may receive a numeric PIN or alphanumeric password from a user.

At step 210, process 200 may generate a mobile device code. In someembodiments, system 100 may generate a mobile device code based on thephysical user credential. Additionally, the mobile device code may bebased on a personal identification code associated with the physicaluser credential (e.g., a user PIN) and/or an identifier of publicterminal 110. For example, system 100 may perform a hash function usinga numerical identifier associated with the physical user credential. Inother examples, the hash function may also use the personalidentification code associated with the physical user credential and/orthe identifier of the public terminal.

As shown in FIG. 2, public terminal 110 may transmit credentialinformation for remote processing, in some embodiments. Public terminal110 may transmit the physical user credential, an associated personalidentification code (e.g., PIN), and/or the public terminal identifierto secure server 140 (e.g., using network 190). Based on the receivedinformation, secure server 140 may generate the mobile device code. Forexample, secure server 140 may perform a hash function using thereceived information.

Although not shown in FIG. 2, in some embodiments, public terminal 110may perform step 210. For example, public terminal 110 may generate amobile device code by performing a hash function using the physical usercredential, an associated personal identification code (e.g., PIN),and/or the public terminal identifier. If needed, public terminal 110may share the determined mobile device code with secure server (e.g.,transmit the mobile device code over network 190). Example situationswhere secure server 140 may need to receive the determined mobile devicecode may include situations where secure server is needed to serve as asecure neutral location to provide access to the mobile device code toother devices, systems, or applications. For example, system 100 may usea separate server or process to verify the mobile device code after ithas been generated (e.g., to determine whether the mobile device code iscorrupted). However, the separate server or process may not be able toaccess public terminal 110. To allow such processes or servers to accessthe mobile device code, public terminal may transmit the mobile devicecode to secure server to store (e.g., in a database).

The mobile device code may be based on one or more of the physical usercredential, an associated personal identification code (e.g., PIN), andthe public terminal identifier to secure server 140 (e.g., using network190). For example, the mobile device code may be based on an identifierencoded on a physical user credential and a numerical identifier uniqueto public terminal 110. In other examples, the mobile device code may besolely based on the physical user credential or an identifier of publicterminal 110. The public terminal identifier may include one or more ofthe MAC address of the public terminal, an identifier of the publicterminal registered with an institution, a representation of thephysical location of the public terminal (e.g., GPS coordinates, a ZIPcode, and/or a street address), a building associated or co-located withthe public terminal (e.g., Cotswald Public Library), and the like. Inthe context of security-clearance-based computer terminals, the mobiledevice code may be based on a numerical identifier encoded on a CAC cardand a unique identifier of the secure terminal. In the context offinancial institutions, public terminal 110 may be an ATM, and themobile device code may be based on the debit or credit card number(e.g., encoded on a magnetic strip or chip), a user-entered PIN (ifrequired), and the location of the ATM.

The mobile device code may be generated using a mathematical function.In some embodiments, system 100 (e.g., public terminal 110, secureserver 140) may perform a one-way function (e.g., a hash function) onthe data on which the mobile device code is based. For example, the hashfunction may operate on one input, and all the data on which the mobiledevice code is based may be combined into a single numerical value toprovide to the hash function. In this example, the values may be added,multiplied, concatenated together, or any other mathematical functionthat operates on the number of values at issue to form a single value.In another example, the hash function may be a multi-input functionperformed on two or three numerical inputs to produce a single value.When the data includes alphabetic letters (e.g., an alphanumeric PIN,the street name for a public terminal location, and the like), system100 may translate the letters into number forms. For example, system 100may use the ASCII values associated with the letters to generate themobile device code.

The mobile device code may take different forms. As discussed above, themobile device code may be initially generated as a numerical value.System 100 may use that value to provide the mobile device code inanother form. In an embodiment, the mobile device code may include avisual encoded symbol. For example, system 100 may generate aQuick-Response (QR) code using the numerical value. In other examples,the mobile device code may be encoded as an Infrared signal, sound(e.g., frequency modulation), thermal energy, vibrations, pulses of air,or the like.

At step 215, process 200 may display a mobile device code. In someembodiments, public terminal 110 may display the mobile device code ondisplay 132. For example, public terminal 110 may send a signal todisplay a QR code on an LCD display.

While the term “display” is used, when the mobile device code does notform a visual representation, other ways to provide the mobile devicecode may be used. Output devices 130 may include additional devicescapable of providing the mobile device code to another device (e.g.,user device 160). For example, when the mobile device code isrepresented by a sound, output devices 130 may include a speaker, adigital audio transmitter, and/or a frequency modulation transmitter,which may be used by public terminal 110 to provide the mobile devicecode. In the example of a thermal energy mobile device code, athermoelectric power generator, fan, infrared laser, and the like may beused by public terminal 110 to provide the mobile device code. In theexample of the mobile device code being vibrations, public terminal 110may provide the mobile device code using a motor, such as a Pico Haptic™shaftless vibration motor. In the example of the mobile device codebeing pulses of air, public terminal 110 may use a fan and/or an aircompressor to provide the mobile device code. Output devices 130 mayinclude these additional example devices and other output mechanisms toprovide the mobile device code to other devices (e.g., user device 160).

When the mobile device code is generated by secure server 140 (as shownin FIG. 2), secure server 140 may transmit the mobile device code topublic terminal 110. For example, secure server 140 may packetize themobile device code and transmit it over network 190 to public terminal110. Secure server 140 may encrypt the mobile device code prior totransmitting it (e.g., using public-private key encryption, and thelike). In this example, public terminal 110 may decrypt the mobiledevice code and provide it.

At step 220, process 200 may receive a mobile device code. User device160 may receive the mobile device code from public terminal 110. In theexample of a QR code, camera 172 of user device 160 may capture the QRcode as it is displayed by public terminal 110 (e.g., using display132). In still other examples, input devices 170 may include additionalsensors capable of detecting the mobile device code as public terminal110 provides it. In the example of a mobile device code provided byinfrared transmitter 134 of public terminal 110, infrared receiver 176of user device 160 may receive the mobile device code encoded as aninfrared signal. In still other example, where public terminal 110provides the mobile device code using sound, thermal energy, vibrations,and/or pulses or air, input devices 170 of user device 160 may includeaddition hardware capable of sensing and receiving the mobile devicecode. For example, input devices may include a microphone, temperaturesensor (e.g., thermocouple, thermally sensitive resistor, infraredtemperature sensor, and the like), vibration sensor(s), and/or air pulsesensors (e.g., airflow sensors, air pressure sensors, and the like),respectively.

At step 225, process 200 may generate one or more queries. User device160 may generate a message to provide the mobile device code to secureserver 140. The message may include a request for a user profile. Forexample, after capturing an image of the QR code, user device 160 maytransmit the image through network 190 to secure server 140 as a requestto receive a user profile corresponding to the mobile device code (whichmay be based on the physical user credential). In other embodiments,user device may translate the mobile device code signal as a numericalsequence to include in the user profile request. For example, regardlessof the mechanism used to provide the mobile device code to user device160 (e.g., sound, light, pulses of air, infrared, and the like) userdevice may convert that mobile device code signal to be a numericsequence and transmit it to secure server.

In some embodiments, user device 160 may transmit the scanned input tosecure server 140 with a security key indicating that user device 160 isa trusted device. The security key may be used as a hash key input tocryptographically encode the scanned input. For example, mobile device160 may perform a hash function on data to be transmitted to secureserver 140 using the security key. Secure server 140 may use an inversekey to decrypt the data, ensuring that the data came from a trusteddevice. In other examples, mobile device 160 may transmit the securitykey along with data to secure server 140.

The security key may have been previously transmitted from secure server140 to user device 160. Prior to step 225, or prior to process 200,secure server 140 may have interacted with user device 160 in order toverify that user device 160 is a trusted device (e.g., user device 140is a device of user that has an account with secure server 160). Forexample, secure server may transmit a temporary code to user device 160,which a user may provide and transmit back to secure server 140 using aknown secure portal (e.g., application, website, web application). Onceregistered with secure server 140, secure server 140 may transmit asecurity key to user device 160 which, when presented with atransmission from user device 160 to secure server 140, enable secureserver 140 to recognize that the transmission comes from a verifiedtrusted device.

At step 230, process 200 may determine a user profile. Secure server 140may look up a user profile based on the mobile device code. For example,secure server 140 may use the mobile device code as a key in a lookuptable to determine a user profile identifier or the profile itself. Inthe context of a QR code being the mobile device code, secure server 140may derive a numeric sequence based on the QR code and use the numericsequence as a key in the lookup table. In some embodiments, secureserver may receive the mobile device code as a numeric sequence. Forexample, secure server 140 may receive a numeric sequence as payload ofthe request for the user profile. The numeric sequence itself may act asthe key to a lookup table to determine the user profile.

In some embodiments, step 230 may only occur when secure server 140recognizes user device 160 as a trusted device. Secure server 140 maycheck the value of the security key provided by user device 160 in itsrequest for the user profile. For example, secure server 160 maydetermine whether the security key matches a stored key. In an example,the security key may be a private key that user device 160 uses to hashthe QR code (or other mobile device code) (e.g., to produce a digitalsignature), and secure server 140 may verify that the data is authenticby using a corresponding public key to the private key issued to userdevice 160 to decrypt the data.

Once process 200 determines the user profile, it may transmit it to userdevice 160. In some embodiments, secure server may retrieve a userprofile in memory and transmit it over network 190 to user device 160.For example, secure server may use the profile identifier from a lookuptable to retrieve the user profile from a database (e.g., a localdatabase, a remote database, a RAID array, cloud storage, and the like).In this example, secure server 140 may packetize the user profile andtransmit the packets to user device 160.

At step 235, process 200 may provide a password interface. When userdevice 160 receives the user profile from secure server 140, user devicemay use the profile to generate a password interface. In someembodiments, the profile may include a field to determine a type ofpassword interface to provide to the user. For example, the profile mayidentify that the user device should provide one of numeric oralphanumeric entry fields, pattern entry fields, image selection fields,and the like. In the context of a financial system, an applicationissued by a financial instruction may run on user device 160. Thefinancial institution's application may determine a password interfacewithin the application graphical user interface (GUI) based on anidentifier in the received user profile.

At step 240, process 200 may receive user input. User device 160 mayreceive user input at the password interface. For example, input device170 (e.g., touchscreen 174) of user device 160 may detect user strokesor taps entering data using the password interface. User device 160 mayrecord the user input at the password interface and provide it to secureserver 140 for verification.

At step 245, process 200 may verify user input. Secure server 140 mayreceive user password interface input from user device 160 and determinewhether it matches the user's password input. For example, secure server140 may perform a hash function (e.g., a one-way function) on the userpassword interface input (or receive a hash of the user passwordinterface input produced by user device 160). Secure server 140 maydetermine whether the hash matches a stored hash value for the userprofile transmitted to user device in step 230.

At step 250 and/or step 251, process 200 may authenticate a user'ssession. Responsive to verifying the user input at the passwordinterface, secure server 140 may transmit a signal to public terminal110, user device 160, or both indicating the user's identity has beenverified. In some embodiments, secure server 140 may also includeauthorization information, such as permissions for the user (e.g., dataor applications the user can access). In other embodiments, publicterminal 110 and/or user device 160 may be able to locally determinewhat the user is authorized to do based on the user authenticationreceived from secure server 140. For example, public terminal 110 and/oruser device 160 may be able to determine which programs or data the usercan access and operate.

In some embodiments, process 200 may include step 250. Secure server 140may transmit a signal to public terminal 110 to authenticate the user.The authentication message may include instructions indicating that theuser is authorized to use public terminal 110. For example, secureserver 140 may transmit a signal causing public terminal 110 to remove alock screen and present a user with a user interface to operate publicterminal 110. The instructions from secure server 140 may includeinstructions to provide a personalized user interface based on a userprofile for a user to use at public terminal 110. For example, theinstructions may identify certain user data and/or specific programs forthe user to make use of at public terminal 110. In the example of publicterminal 110 being a computer with security clearance restrictions, theinstructions may indicate certain classified data and/or application towhich public terminal 110 should permit access. In the example of publicterminal 110 being an ATM, the instructions may include details of theuser account with the financial institution.

In an embodiment, process 200 may include step 251. Secure server 140may transmit a signal to user device 160, authenticating the user'sidentity and authorizing the user to operate public terminal 110. Forexample, secure server 140 may transmit a signal indicating that userdevice 160 is authorized to control and/or interact with public terminal110 based on the authenticated user. In this example, user device 160may present a user interface which allows a user to interact with dataor programs of public terminal 110, control public terminal 110, allowremote access to public terminal 110, and the like. In the context ofpublic terminal 110 being in a security clearance environment, secureserver 140 may transmit an authentication message to user device 160which may include instructions that the authenticated user is authorizedto access classified data stored at public terminal 110. In the contextof public terminal 110 being an ATM, secure server 140 may transmit amessage to user device 160 authenticating the user, the messageincluding authorized permissions for the user. The authorizedpermissions may include instructions to provide a GUI to allow the userdevice 160 to control or provide commands to public terminal 110. Inthis example, user device 160 may present a GUI to allow the user torequest currency from public terminal 110, and in return, publicterminal 110 may dispense currency and provide a receipt.

FIG. 3 shows a flowchart of an example process 300 for authenticating auser at a public terminal, consistent with the disclosed embodiments. Inthe following description, reference is made to certain components ofFIG. 1 for purposes of illustration. For example, FIG. 3 may depictprocess 300 with method steps shown corresponding to one or more ofpublic terminal 110, secure server 140, and user device 160. It shouldbe appreciated, however, that other implementations are possible andthat components other than those illustrated above in FIG. 1.

At step 305, process 300 may receive credentials. Public terminal 110may receive a physical user credential. For example, public terminal 110may perform functions as those described regarding step 205 of FIG. 2.

At step 310, process 200 may determine whether local processing isavailable. Public terminal 110 may determine whether it may locallydetermine a unique mobile device code. Whether public terminal 110 maylocally determine a mobile device code may depend on one or more ofnetwork connectivity, local processing capability, remote processingcapability, and/or security concerns. With regard to networkconnectivity, public terminal may determine that local processing isneeded due to the lack of a network connection, network traffic risingabove a predetermined threshold, and/or available network bandwidthfalling below a predetermined threshold. Regarding local processingcapabilities, public terminal 110 may determine whether it has theprocessing power and/or software needed to generate the code. Forexample, public terminal 110 may determine whether it has a particularapplication or version of an application installed, whether it hashardware (e.g., processor, memory) that is on an approved list ofhardware for locally generating a mobile device code. Regarding remoteprocessing capability, public terminal 110 may determine whether aremote server is available to generate the mobile device code remotely.For example, public terminal 110 may determine whether secure server 140is active, busy, or available. If secure server 140 is active andavailable, public terminal 110 may determine that remote processing isnot needed and therefore not available. Regarding security concerns,public terminal 110 may determine whether security concerns exist, suchthat secure server 140 should generate the mobile device code to ensurethat the mobile device code is generated in a secure computingenvironment. For example, public terminal 110 may determine that localprocessing is not available when it determines that local activitymatches predetermined patterns of suspicious activity or whether publicterminal determines that it is located in a geographic locationcorresponding to a region identified as a security risk in a database.Example predetermined patterns of suspicious activity may includeexcessively failed password attempts, using an incorrect profile,providing an incorrect mobile device code, using an incorrect trusteddevice key, etc. In the context of public terminal 110 being an ATM,suspicious activity may include requests for withdrawal of currencyexceeding a predetermined amount.

If local processing is available (e.g., step 310, “yes”), process 300may proceed to step 315. At step 315, process 300 may generate a uniquemobile device code. For example, public terminal 110 may generate amobile device code as described in step 210 of FIG. 2. If localprocessing is not available (e.g., step 310, “no”), process 300 mayproceed to step 320 and step 325. At step 320, process 300 may transmitcredential information and a terminal identifier to a server. Forexample, public terminal 110 may transmit information (e.g., one or moreof a physical user credential, an associated personal identificationcode, or the public terminal identifier) to secure server 140, andsecure server 140 may generate a mobile device code and transmit themobile device code back to public terminal 110 as described in step 210of FIG. 2.

At step 330, process 300 may display a mobile device code. Publicterminal 110 may present the mobile device code using one or moremechanisms. For example, public terminal may display a QR code asdescribed in step 215 of FIG. 2 and/or perform any other presentationmechanism available or necessary to provide the mobile device code touser device 160.

At step 340, process 300 may receive an authentication message. Publicterminal 110 may receive an authentication message from secure server140. For example, public terminal 110 may receive a message over network190 authenticating it for use by a user as described in step 245 of FIG.2.

In embodiments, the authentication may include authentication data 342and/or instructions 344. Authentication data 342 may include a value oridentifier indicating to public terminal 110 that the user identify hasbeen verified, causing public terminal 110 to provide access to programsor data. Instructions 344 may include one or more functions for publicterminal 110 to perform. For example, public terminal 110 may receiveinstructions to automatically perform a function upon receiving theauthentication. Instructions 344 may include launching one or moreapplications, logging a timestamp, and/or prompting the user with aparticular GUI. In the context of public terminal 110 being an ATM,instructions 344 may include an instruction to automatically dispense apredetermined amount of currency. In some embodiments, instructions 344may include instructions to end process 300. For example, process 300may end after the completion of predetermined functions dictated byinstructions 344.

At step 350, process 300 may determine whether the authenticationauthorizes a local session or a remote session. Public terminal 110 maydetermine the type of authorization based on the authentication data 342received in step 340. When authentication indicates that a local sessionshould commence (e.g., step 350, “local”), process 300 may proceed tostep 355. At step 355, process 300 may begin a local session. Forexample, public terminal may perform functions as described in step 250of FIG. 2. When authentication dictates that a remote session shouldbegin (e.g., step 350, “remote”), process 300 may proceed to step 360.At step 360, process 300 may being a remote session. Public terminal 110may be available to control by user device 160. For example, publicterminal 110 may operate as described in step 251 of FIG. 2. Once theremote or local session is complete, process 300 may end.

FIG. 4 shows a flowchart of an example process 400 for authenticating auser at a public terminal, consistent with the disclosed embodiments. Inthe following description, reference is made to certain components ofFIG. 1 for purposes of illustration. For example, FIG. 4 may depictprocess 400 with method steps shown corresponding to one or more ofpublic terminal 110, secure server 140, and user device 160. It shouldbe appreciated, however, that other implementations are possible andthat components other than those illustrated above in FIG. 1.

At step 405, process 400 may receive a request for a mobile device code.Secure server 140 may receive information to generate a mobile devicecode. For example, secure server may receive one or more of a physicaluser credential, an associated personal identification code (e.g., PIN),and/or the public terminal identifier, as discussed in relation to step205 of FIG. 2.

At step 410, process 400 may generate a mobile device code. Secureserver 140 may generate a mobile device code. For example, secure server140 may perform functions as described in step 210 of FIG. 2 to generatea mobile device code. At step 415, process 400 may transmit a mobiledevice code. Secure server 140 may transmit the generated mobile devicecode to public terminal 110. For example, secure server 140 may transmita QR code or other coding type, such as those previously described instep 210, to public terminal 110.

At step 420, process 400 may receive the mobile device code. Secureserver 140 may receive a mobile device code from user device 160. Forexample, secure server 140 may receive a photograph of a QR code fromuser device 160. In other examples, secure server 140 may receive othertypes of mobile device codes previously described in step 220 of FIG. 2.in some embodiments, secure server 140 may receive the mobile devicecode as part of a request, such as a request for a user profile, asdescribed in step 225 of FIG. 2.

At step 425, process 400 may determine a user profile. Secure server 140may identify a user profile using a mobile device code. For example,secure server 140 may determine a user profile as described in step 230of FIG. 2. Also, as described in step 230, secure server 140 may verifythat the user profile request comes from a trusted device (e.g., therequest uses a trusted device security key) in step 425. At step 430,process 400 may provide a user profile. Secure server 140 may send theuser profile to user device 160 using network 190. For example, secureserver 140 may transmit a profile as described in step 230 and step 240of FIG. 2.

At step 435, process 400 may receive password input. Secure server 140may receive password input data from user device 160. For example,secure server 140 may receive one or more packets including payload datarepresenting the input provided by a user at a password interfacepresented at user device 160, as described in step 240 of FIG. 2.

At step 440, process 400 may verify a password. Secure server 140 maydetermine whether the received password information matches storedpassword information. For example, secure server 140 may performfunctions as described in step 245 of FIG. 2. At step 445, process 400may determine whether the password is correct. Secure server 140 maydetermine whether it was able to verify the password. When verificationeither cannot be completed, results in a failed verification, ordetermines a mismatch between provided and stored password data, secureserver 140 may determine that the password is not correct. If thereceived password data matches the store password data, secure servermay determine that the password is correct.

When the password is correct (e.g., step 445, “yes”), process 400proceeds to step 450. At step 450, process 400 may authenticate a userfor a given session. Server 140 may transmit a message authenticating auser's identity for a session at the public terminal as described instep 250 and/or step 251 of FIG. 2. Also, the authentication message mayinclude authentication data 342 and/or instructions 344 as described instep 340 of FIG. 3.

When the password is incorrect (e.g., step 445, “no”), process 400proceeds to step 455. At step 455, process 400 may determine whetherpassword attempts exceed a threshold number of attempts. Secure server140 may count the number of failed password attempts. For example,secure server 140 may increment a number when the password is incorrect(e.g., step 445, “no”). When the count exceeds a predetermined number ofattempts, secure server 140 may determine that suspicious activity isoccurring. For example, once secure server 140 determines that the wrongpassword input has been provided five times, secure server may determinethat too many failed attempts have occurred. In some embodiments, secureserver 140 may verify that password input is provided using a trusteddevice security key, such as that used to transmit a request for a userprofile, as described in step 425. When the password input is receivedby secure server 140 without using the security (e.g., the passwordinput is not hashed with the security key, the password is nottransmitted with the security key), secure server 140 may count that asa failed password attempt or deem that too many passwords have beenattempted.

When too many attempts have yet to occur (e.g., step 455, “no”), process400 returns to step 435, which is described above. When too manyattempts have occurred (e.g., step 455, “yes”), process 400 proceeds tostep 460. At step 460, process 400 may block a session. Secure server140 may send a signal to public terminal 110 and/or user device 160indicating that no authentication will be given. After authenticationoccurs (step 450) or blocking occurs (step 460), process 400 may end.

FIG. 5 shows a flowchart of an example process 500 for authenticating auser at a public terminal, consistent with the disclosed embodiments. Inthe following description, reference is made to certain components ofFIG. 1 for purposes of illustration. For example, FIG. 5 may depictprocess 500 with method steps shown corresponding to one or more ofpublic terminal 110, secure server 140, and user device 160. It shouldbe appreciated, however, that other implementations are possible andthat components other than those illustrated above in FIG. 1.

Although not depicted in FIG. 5, process 500 may begin with unlockinguser device 160. User device 160 may present an authentication screenthat must be successfully completed prior to using any or most of thefunctionality of user device 160. For example, user device 160 mayrequire the user to enter a PIN, provide an alphanumeric password, scanone or more fingerprints, and/or complete facial recognition beforegranting access to certain functionality and/or applications of userdevice 160. Other authentication mechanisms may be used as described inthis disclosure, including other biometric authentication mechanisms.Once authentication is complete, user device 160 may be unlocked.

At step 505, process 500 may receive a mobile device code. User device160 may capture a mobile device code. For example, user device 160 maysense and store a mobile device code as described in step 220 of FIG. 2.At step 510, process 500 may request a user profile. User device 160 maytransmit a request to secure server 140 for a user profile. For example,user device 160 may transmit a message as described in step 225 of FIG.2.

At step 515, process 500 may determine a password interface, and at step520, process 500 may provide a password interface. In these steps, userdevice 160 may receive a user profile from secure server 140, determinea password interface based on the user profile, and present the passwordinterface. For example, user device 160 may identify a passwordinterface and provide the password interface using one or more of outputdevices 180 as described in step 235 of FIG. 2.

At step 525, process 500 may receive user input. User device 160 mayreceive user selections or strokes corresponding to data entry at thepassword interface. For example, user device 160 may perform functionsas described in step 240 of FIG. 2.

At step 530, process 500 may transmit user input. User device maytransmit the password user interface input to secure server 140 asdescribed in step 245 of FIG. 2. At step 535, process 500 may determinewhether an authentication message has been received. User device 160 maydetermine whether it has received an authentication message from secureserver 140, as described in step 245 of FIG. 2. The authentication mayinclude authentication data 342 and/or instructions 344 as described instep 340 of FIG. 3

When the authentication message is received (e.g., step 535, “yes”),process 500 proceeds to step 540. At step 540, process 500 may begin anauthenticated session. For example, user device 160 and/or publicterminal 110 may begin a session as described in step 250 and step 251of FIG. 2. When the authentication message is not received (e.g., step535, “no”), process 500 proceeds to step 545. At step 545, process 500may receive a session block. User device 160 may receive a message fromsecure server 140 indicating that the session is blocked, as describedin step 460 of FIG. 4.

When no session block is received (e.g., step 545, “no”), process 500returns to step 520. User device 160 may provide the password interfacefor a subsequent attempt at receiving password input. When a sessionblock is received (e.g., step 545, “yes”), process 500 proceeds to step550. At step 550, process 500 may block a session. User device 160 mayno longer present the password user interface to prevent additionalattempts at password entry. For example, user device 160 may present amessage indicating that too many failed passwords have been entered. Insome embodiments, secure server 140 may perform blocking by, forexample, blocking use of the trusted device security key and/or themobile device code. After the authenticated session is complete (step540) or blocking occurs (step 550), process 500 may end.

FIGS. 6A, 6B, and 6C depict an example implementation for updating aprocess for pairing devices for securely authenticating a user at apublic terminal, consistent with disclosed embodiments.

FIG. 6A depicts mobile device 640, including fingerprint sensor 645 anda display. The display may be a touchscreen providing narrative GUIregion 650A and input GUI region 651A. Mobile device 640 may be anexample user device 160. Also, Fingerprint sensor 645 and/or input GUIregion 651A may correspond to unlocking mechanisms of a user device. Asdescribed in FIG. 5, unlocking user device 160 may begin process 500.Although not depicted in FIG. 2, unlocking user device 160 (e.g., asshown in FIG. 6A) may also precede step 220 of process 200.

FIG. 6B depicts example system 600, including mobile device 640 and ATM610. A previously discussed, mobile device 640 may be an example of userdevice 160, and ATM 610 may be an example of public terminal 110. Asshown, mobile device 640 may include mobile device code capture GUIregion 650B and camera 660 (e.g., camera 172).

ATM 610 may include display 620 (e.g., display 132) and card reader 630(e.g., card reader 126). In some embodiments, display 620 may includenarrative GUI region 622 and QR code region 624, and card reader 630 mayreceive credit card 634 (an example physical identification credential).As shown, mobile device 640 may capture an image of OR code region 624using camera 660. This may depict an example implementation of step 215and step 220 of process 200, step 330 of process 300, and/or step 505 ofprocess 500.

FIG. 6C depicts example mobile device 640. As shown, mobile device 640may include a display (e.g., touchscreen) providing narrative GUI region650C, field GUI region 651C, and input GUI region 652C. Also, aspreviously discussed in relation to FIG. 6A, user device 160 may includefingerprint sensor 645. Fingerprint sensor 645 and/or the showngraphical user interface regions (e.g., narrative GUI region 650C, fieldGUI region 651C, and input GUI region 652C) may be example password userinterfaces, as described in step 235 of process 200 and step 520 ofprocess 500.

Descriptions of the disclosed embodiments are not exhaustive and are notlimited to the precise forms or embodiments disclosed. Modifications andadaptations of the embodiments will be apparent from consideration ofthe specification and practice of the disclosed embodiments. Forexample, the described implementations include hardware, firmware, andsoftware, but systems and techniques consistent with the presentdisclosure may be implemented as hardware alone. Additionally, thedisclosed embodiments are not limited to the examples discussed herein.

Computer programs based on the written description and methods of thisspecification are within the skill of a software developer. The variousprograms or program modules may be created using a variety ofprogramming techniques. For example, program sections or program modulesmay be designed in or by means of Java, C, C++, assembly language, orany such programming languages. One or more of such software sections ormodules may be integrated into a computer system, non-transitorycomputer-readable media, or existing communications software.

Moreover, while illustrative embodiments have been described herein, thescope includes any and all embodiments having equivalent elements,modifications, omissions, combinations (e.g., of aspects across variousembodiments), adaptations or alterations based on the presentdisclosure. The elements in the claims are to be interpreted broadlybased on the language employed in the claims and not limited to examplesdescribed in the present specification or during the prosecution of theapplication, which examples are to be construed as non-exclusive.Further, the steps of the disclosed methods may be modified in anymanner, including by reordering steps or inserting or deleting steps. Itis intended, therefore, that the specification and examples beconsidered as example only, with the true scope and spirit beingindicated by the following claims and their full scope of equivalents.

What is claimed is:
 1. A method for authenticating a user to access apublic terminal, the public terminal having a terminal identifier, themethod comprising: receiving, at a secure server, a user identifier of aphysical credential device; generating a unique code by the secureserver, based on the terminal identifier and the user identifier;receiving, at the secure server, a photograph from a mobile phone, thephotograph comprising a representation of the unique code; responsive todetermining that the received photograph corresponds to the unique code,providing a user profile to the mobile phone, the user profile beingbased on the user identifier and comprising an identification of apassword interface; receiving, from the mobile phone, password inputdata corresponding to the identified password interface; determiningthat the password input data matches a password of the user profile; andresponsive to a determination that the password input data matches apassword of the user profile, transmitting by the secure server to atleast one of the mobile phone or the terminal, an indication that theuser is authenticated for access to the public terminal.
 2. The methodof claim 1, wherein generating the unique code comprises generating aunique code based on a cryptographic hash function.
 3. The method ofclaim 1, wherein generating the unique code comprises generating aunique code based on a cryptographic hash function of the terminalidentifier and the user identifier.
 4. The method of claim 1, whereinthe public terminal comprises an automatic teller machine.
 5. The methodof claim 1, wherein: the physical credential device comprises atransaction card having at least one of a magnetic strip or anelectronic circuit; and the user identifier comprises an identifiergenerated from data contained in the at least one magnetic strip orelectronic circuit.
 6. The method of claim 1, wherein: the physicalcredential device comprises a transaction card having a magnetic strip;and the magnetic strip comprises an encoded user identifier.
 7. Themethod of claim 1, wherein: generating the unique code comprisesgenerating the unique code in response to determining that the useridentifier is not associated with a suspicious activity designation. 8.The method of claim 1, further comprising transmitting the unique codefor display at the public terminal.
 9. The method of claim 1, whereintransmitting the indication comprises transmitting authentication datainstructing the terminal to provide access to one or more programs ordata via the public terminal.
 10. The method of claim 1, whereintransmitting the indication comprises transmitting an instruction forthe terminal to dispense an amount of currency.
 11. The method of claim1, wherein transmitting the indication comprises transmitting aninstruction enabling the mobile device to control an operation of theterminal, based on a user-entered command entered via the mobile device.12. The method of claim 1, wherein transmitting the indication comprisestransmitting an instruction for the terminal to display an interface tooperate the public terminal.
 13. The method of claim 1, furthercomprising: receiving a security key from the mobile phone; decryptingthe received security key; and verifying that the mobile phone is atrusted source, based on the decryption.
 14. The method of claim 13,wherein receiving the security key comprises receiving the security keyin conjunction with receiving the photograph.
 15. The method of claim 1,wherein receiving the photograph comprises receiving the photograph bythe secure server via an application of the mobile device, theapplication being associated with a least one of the terminal or thesecure server.
 16. The method of claim 1, wherein providing the userprofile comprises providing a user profile instructing an application ofthe mobile device to display the identified password interface.
 17. Themethod of claim 1, wherein receiving password input data comprisesreceiving an indication that the input data was input via theapplication of the mobile device.
 18. The method of claim 1, furthercomprising: receiving an indication the mobile phone has been unlocked.19. The method of claim 1, further comprising: receiving, in conjunctionwith the photograph, an indication the mobile phone has been unlocked.20. The method of claim 1, wherein the identified password interfacecomprises an interface requesting a fingerprint scan via the mobiledevice.