Authentication system, method, device and storage medium for communication application
An identity verification method and identity verification technology, applied in the transmission system, electrical components, etc., can solve the problems of receiving party harassment, cumbersome operation, and inability to manage stranger identity verification in a unified manner, so as to achieve the effect of improving convenience and reducing harassment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0034] Figure 2AIt is a schematic diagram of an interface of a communication application in an identity verification system for a communication application provided by Embodiment 1 of the present invention. This embodiment can be applied to the situation where identity verification is performed between unfamiliar users through the communication application in this embodiment. . refer to Figure 2A , the identity verification system in this embodiment may include a temporary verification page 210 under at least one scenario type.
[0035] Wherein, the temporary verification page 210 is used to show that the stranger passes the temporary verification on the current user's personal data page 220 after entering the current user's personal data page 220 on the stranger's side under the scene type corresponding to the temporary verification page. Temporary verification notification 211 initiated by control 221 .
[0036] Specifically, the communication application in this embodi...
Embodiment 2
[0046] Figure 3A and Figure 3B They are schematic diagrams of interfaces of communication applications in an identity verification system for communication applications provided by Embodiment 2 of the present invention. This embodiment is optimized on the basis of the above-mentioned embodiments, and this embodiment mainly explains in detail the conversation function opened after the current user and a stranger pass the temporary verification in the communication application.
[0047] Specifically, refer to Figure 3A , the communication application in this embodiment may also include: a first message list 310 and a second message list 320, the entry 300 of the second message list 320 is set in the display interface where the first message list 310 is located, the first message list 310 is used to display the message column of friends, and the second message list 320 is used to display the message column of strangers.
[0048] Taking the communication application configur...
Embodiment 3
[0057] Figure 4 It is a flow chart of an identity verification method for a communication application provided by Embodiment 3 of the present invention. This embodiment can be applied to the situation where identity verification is performed between unfamiliar users through the communication application in this embodiment. An identity verification method for a communication application provided in this embodiment can be executed by the device provided in the embodiment of the present invention, and the device can be any user terminal configured with the communication application, such as a mobile phone, a tablet computer or a handheld computer Wait.
[0058] Specifically, such as Figure 4 As shown, the method may include the following steps:
[0059] S410. After the stranger enters the current user's profile page on the stranger's side under at least one scenario type, the temporary verification notification initiated through the temporary verification control on the curr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


