CPC G06Q 20/385 (2013.01) [G06F 1/14 (2013.01); G06F 12/10 (2013.01); G06F 21/60 (2013.01); G06Q 20/341 (2013.01); G06Q 20/343 (2013.01); G06Q 20/352 (2013.01); G06Q 20/353 (2013.01); G06Q 20/38 (2013.01); G06Q 20/40 (2013.01); G06Q 20/401 (2013.01); G06Q 20/40145 (2013.01); H04L 63/0838 (2013.01); H04L 63/0853 (2013.01); G06F 2212/65 (2013.01); G06K 19/0701 (2013.01); G06K 19/0723 (2013.01)] | 14 Claims |
1. A user authentication method using an authentication virtual code, the method comprising:
receiving, by a server, a user authentication request and the authentication virtual code, wherein the authentication virtual code is generated by an authentication virtual code generation function included in an authentication virtual code generation program based on authentication card data provided from an authentication card;
searching, by the server, for an authentication card storage location, at which the authentication card is registered, in a storage location search algorithm based on the authentication virtual code, wherein the storage location search algorithm is matched with the authentication virtual code generation function and searches for the authentication card storage location based on at least one detailed code in the authentication virtual code;
identifying, by the server, a user by extracting user information stored after being matched with the authentication card storage location that is searched by the server;
verifying, by the server, the authentication virtual code, by comparing a reception time point, at which the server receives the authentication virtual, with a generation time point, at which the authentication virtual code is generated by using the authentication virtual code generation function; and
approving, by the server, user authentication when the comparison result indicates that the generation time point is within an error range from the reception time point.
|