Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication system, method, device and storage medium for communication application

An identity verification method and identity verification technology, applied in the transmission system, electrical components, etc., can solve the problems of receiving party harassment, cumbersome operation, and inability to manage stranger identity verification in a unified manner, so as to achieve the effect of improving convenience and reducing harassment

Active Publication Date: 2021-09-21
BIGO TECH PTE LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, normal conversations between strangers in the communication application can only be realized after passing the friend verification. The receiver will check the friend verification that multiple strangers have applied for in the "new friend" entry set in the communication application. At this time, the identity verification messages sent by a large number of strangers will cause harassment to the receiver. At the same time, the operation of a user sending the same friend verification message to multiple strangers is relatively cumbersome, and it is impossible to verify the identity between strangers. Unified management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system, method, device and storage medium for communication application
  • Authentication system, method, device and storage medium for communication application
  • Authentication system, method, device and storage medium for communication application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] Figure 2AIt is a schematic diagram of an interface of a communication application in an identity verification system for a communication application provided by Embodiment 1 of the present invention. This embodiment can be applied to the situation where identity verification is performed between unfamiliar users through the communication application in this embodiment. . refer to Figure 2A , the identity verification system in this embodiment may include a temporary verification page 210 under at least one scenario type.

[0035] Wherein, the temporary verification page 210 is used to show that the stranger passes the temporary verification on the current user's personal data page 220 after entering the current user's personal data page 220 on the stranger's side under the scene type corresponding to the temporary verification page. Temporary verification notification 211 initiated by control 221 .

[0036] Specifically, the communication application in this embodi...

Embodiment 2

[0046] Figure 3A and Figure 3B They are schematic diagrams of interfaces of communication applications in an identity verification system for communication applications provided by Embodiment 2 of the present invention. This embodiment is optimized on the basis of the above-mentioned embodiments, and this embodiment mainly explains in detail the conversation function opened after the current user and a stranger pass the temporary verification in the communication application.

[0047] Specifically, refer to Figure 3A , the communication application in this embodiment may also include: a first message list 310 and a second message list 320, the entry 300 of the second message list 320 is set in the display interface where the first message list 310 is located, the first message list 310 is used to display the message column of friends, and the second message list 320 is used to display the message column of strangers.

[0048] Taking the communication application configur...

Embodiment 3

[0057] Figure 4 It is a flow chart of an identity verification method for a communication application provided by Embodiment 3 of the present invention. This embodiment can be applied to the situation where identity verification is performed between unfamiliar users through the communication application in this embodiment. An identity verification method for a communication application provided in this embodiment can be executed by the device provided in the embodiment of the present invention, and the device can be any user terminal configured with the communication application, such as a mobile phone, a tablet computer or a handheld computer Wait.

[0058] Specifically, such as Figure 4 As shown, the method may include the following steps:

[0059] S410. After the stranger enters the current user's profile page on the stranger's side under at least one scenario type, the temporary verification notification initiated through the temporary verification control on the curr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity verification system, method, device and storage medium for communication applications. Wherein, the system includes: a temporary verification page under at least one scene type, and the temporary verification page is used to show that after a stranger enters the current user's personal profile page on the stranger's side under the scene type corresponding to the temporary verification page, A temporary verification notification initiated via the temporary verification control on the current user's profile page. The technical solution provided by the embodiment of the present invention realizes partitioned display management of temporary verification notifications initiated by strangers in different scenarios, improves the convenience of identity verification between strangers, eliminates the need to conduct friend verification sessions with strangers, and avoids The unified reminder of identity verification notifications in different scenarios reduces the harassment caused by a large number of strangers sending identity verification messages to current users.

Description

technical field [0001] The embodiments of the present invention relate to the field of network communication, and in particular to an identity verification system, method, device and storage medium for communication applications. Background technique [0002] With the popularity of the mobile Internet, various communication applications developed using Instant Messaging (IM) technology have been widely used in people's daily life, so that different users can establish some kind of private conversation on the network through the communication application, Thereby realizing real-time communication between different users. [0003] At present, normal conversations between strangers in the communication application can only be realized after passing the friend verification. The receiver will check the friend verification that multiple strangers have applied for in the "new friend" entry set in the communication application. At this time, the identity verification messages sent ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0838
Inventor 张友才黄恺智陈思颖
Owner BIGO TECH PTE LTD