CN107292140A - A kind of social software and its attraction user, the method and device of the authentication image true and false - Google Patents

A kind of social software and its attraction user, the method and device of the authentication image true and false Download PDF

Info

Publication number
CN107292140A
CN107292140A CN201710013447.6A CN201710013447A CN107292140A CN 107292140 A CN107292140 A CN 107292140A CN 201710013447 A CN201710013447 A CN 201710013447A CN 107292140 A CN107292140 A CN 107292140A
Authority
CN
China
Prior art keywords
user
image
software
false
true
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710013447.6A
Other languages
Chinese (zh)
Inventor
李辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CN107292140A publication Critical patent/CN107292140A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/10Multimedia information

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A kind of social software and its attraction user, the method and apparatus of the authentication image true and false, for aiding in distinguishing the true and false of user images in social software, preventing network from swindling, and improve social software function, improve the interface that social software browses user's head portrait.It is by calling camera to be taken pictures to user, and user writes out dynamically verifying information when taking pictures, to help other people for seeing image to recognize the true and false of the other images of the user.Using this method, it can more effectively, conveniently and efficiently prevent network swindle, especially those networks carried out using other people photos from swindling, save the cost of labor of software operation business;By setting the attribute of common or commercial use to user, realize and display is distinguished into by domestic consumer and commercial user, interference of the commercial user to domestic consumer is reduced, while also meeting the demand of commercial user;It is laid out by the user list for changing traditional social software, is exaggerated the head portrait of display, the user that is more convenient for browses, reduces the frequency for pulling the page.

Description

A kind of social software and its attraction user, the method and device of the authentication image true and false
Technical field
The present invention relates to a kind of social software and its method for attraction user, the method for the checking user images true and false, prevent The method of network swindle.
Background technology
With the development of internet, internet is social, making friends has obtained very big development, and many people begin through network friendship Friend.But panoramic cheat is also full of on internet, wine support, meal support, coffee support emerge in an endless stream.It is exactly to utilize to have a lot Friend-making sites or mobile phone friend-making APP are swindled.And their the most frequently used means are exactly to go to attract different using beautiful photo Property.Internet dating swindle is fairly common, and this also has many abroad not only in China.
In addition, as this kind of social software in footpath between fields footpath between fields, the inside has a lot with user of the commercial object using software.But it is this kind of soft Part does not carry out classification differentiation to this kind of user and personal user again, so that personal user is frequently seen this kind of commercial user's Advertising message, causes the harassing and wrecking to personal user.And this kind of social software does not account for the demand of this kind of commercial accounts yet, society Hand over marketing function imperfect in software.
For social software, it is the most frequently used function to check stranger's image list.Existing mobile phone social software, Such as QQ, wechat, footpath between fields footpath between fields, century good edge mobile phone version, it shows that the head portrait arrangement of user's head portrait original list of stranger has Same the problem of, it may be possible to which the exploitation of these softwares is all referring to the chat software QQ of old brand, and the head portrait of its strange list is all It is a line one, head portrait is located at row left side, and right side is then the very big white space with a small amount of word.For mobile phone, Its screen very little, this head portrait arrangement wastes screen space so that user's head portrait very little is not easy to read(If user's head portrait Larger, user's head portrait of that screen display can tail off, and the white space that right side is wasted is then bigger), it is same in order to check User's head portrait of quantity, then need to carry out the operation of more drop-down pages.
The content of the invention
It is an object of the invention to provide a kind of method of the authentication image true and false and the method for preventing network from swindling, to prevent from deceiving Son is swindled using social software, while providing the method for attracting social software user and the software function of innovation;There is provided Method of the commercial user to the information harassing and wrecking of domestic consumer is filtered, while also taking into account commercial user, perfect pin is developed for them Sell function.Social software mentioned here not only includes the program used on portable equipment(Such as mobile phone, flat board APP), also include Website and other websites and APP with friend making function.In addition, the present invention will provide new user list ways of presentation, Solve the problem of a large amount of white spaces of mobile phone screen are wasted.
Present invention also provides a kind of device of the use above method, to ensure above method application in practice and reality It is existing.
The object of the present invention is achieved like this:This social software has all or part of function of existing social software, The software users(Certain customers or whole users)Personal information contain such image(Referred to herein as " origin authentication figure Picture "), other users are contrasted by the image and other images, it can be determined that the true and false of other images(Whether the use is belonged to Family), described image can be still image or dynamic image(Or be video, image).Described origin authentication Image refers to allow user to think to may determine that the image of other image true-falses with the image.Personal information mentioned here, can be with Shown in the software for being software users in the personal information of software users or the software of software users its The personal information of his user.Software can force all users all to provide origin authentication image, and user oneself can also be allowed to select, If user oneself selects, then the certain customers for belonging to above-mentioned contain the situation of origin authentication image.
The acquisition modes of the image have a variety of:1st, directly shot by camera;2nd, selected on user mobile phone(Such as:Choosing The certificate photograph containing photo such as identity card, or image of the selection containing checking feature are selected, this is poor scheme).
Software is by showing the origin authentication image of user by other software user oneself by contrasting original image and its Its image judges the true and false of other images.
What described origin authentication image can be obtained by:By camera to authenticatee(Software user sheet People)Face shooting(Can autodyne, or other people assist), shot image can be shown in software or in certain bits by program automatically Put display shot image(And non-user oneself chooses at random image file in equipment), the image is true for other users checking Pseudo- origin authentication image, other users are by contrasting other images that the image and authenticatee issue, you can judge other Image is the true picture of authenticatee.Described image can be still image or dynamic image, regard Frequently.The default interface of described interface not necessarily software or other secondary pages or other pages, are referred in particular to The image list page of user.
Described shooting action is triggered by the special button of click, is clicked on after dedicated button, is completed and show in shooting It is shown in before software interface, user is unable to select existing image file in slave unit.Described button refers on screen can be with Click on the position for triggering down-stream action(Virtual key, Menu key, virtual push button)Or the entity of mobile phone is pressed Key or button.
Above content can be briefly described for:The software contains such dedicated button, clicks on after the button, software passes through Camera gives user's shooting image, and shot image is displayed on the ad-hoc location of software interface, and user can not be by its in equipment Its image shows is in the position.As being on such description is tangible with foregoing teachings, method is simply described different.
In order to improve such scheme, in the origin authentication image or near the common spy that can recognize with ordinary people Levy(Or special mark), it is easy to let the user know that the image with this feature is origin authentication image.One kind is achieved in that Software makes unified requirement to user's shooting image, so as to form common trait.For example:Hand lifts blank sheet of paper with character, phase Same or similar background picture, posture provide example image for imitation, and these requirements cause picture to have ordinary people to know Other common trait, and origin authentication image can be identified as.It is another to be achieved in that software in image or image is attached Nearly display special mark(Image, character etc.)Above-mentioned common trait can also be formed.In addition, origin authentication image is arranged in soft Part interface is specific(Or it is special)Position can also form above-mentioned common trait.
In order to improve such scheme, described origin authentication image is located at the dedicated location that user knows in software interface, User knows that the image of the position is origin authentication image.The position is indicated in the operation instruction of software, so that user knows; Explanatory note can be increased in image or near image, the image for telling the user position is origin authentication image.
In order to improve in such scheme, described origin authentication image or nearby have special mark, user passes through the mark Will knows that the image is origin authentication image.Described mark can be word, character or figure.
In order to improve such scheme, software provides checking instruction(It is required that authenticatee performs certain affairs on request), quilt Verifier's execute instruction, in the coverage of camera showing or present the instruction requires content(Such as make certain Action, or write out character).The command content and clap picture and be displayed on software interface, so that user is differentiated.
In order to improve such scheme, dynamically verifying information is provided to one be shooted before carrying out described shooting, one be shooted will The multidate information is presented on before camera to record the information and one be shooted's face into the image clapped together.Described is dynamic State checking information refers to every time(It is different with the time)The information provided can be variant, or the information because of people.
Described dynamically verifying information can also be the information related to user such as the ID users or user name of user, most It is well unique.Unique information(Such as No. ID, the user name of user)Can be for distinguishing each user, and the age is then It is not unique, it is impossible to be used as checking information.It is close that described user name can include but is not limited to login account, user Title, user name etc. can represent the character of user identity.
Software is when certain mode informs that oneself ID or user name are presented on before camera by user, in fact It is exactly there is provided dynamically verifying information before shooting to one be shooted.
Preferably, described origin authentication image is dynamic image(Or video).
In order to improve such scheme, above-mentioned clapped image(Include dynamically verifying information in the case of normal)And shooting The checking information provided before is present on software interface after end of taking pictures(Image and checking information are separated), other Whether user can unanimously judge the true and false of image by both contrasts.Whether so may determine that it is true man's quilt in real time Shoot, or the picture be taken printed.
In order to improve such scheme, the checking information on picture that software is taken by automatic program identification, and with bat Checked according to the checking information provided before, to judge the true and false of shot image.If the checking information that procedure identification goes out and The checking information provided before of taking pictures is not inconsistent, then requires that user re-starts checking.
Without procedure identification, but checking information is prompted to authenticatee, then shown on its personal information page Checking information, allows other online friends oneself to verify, can thus avoid the technical difficulty of procedure identification, improves accuracy rate.
In order to prevent authenticatee deceives other people from being taken pictures for it, it can require that authenticatee writes out information warning on paper, For example:Take pictures statement, non-take pictures in person will bear legal responsibility!This photo only supplies ×× website authentication identity, Fei Daibie People shoots, identifying code:222666.
In order to improve such scheme, after checking information is provided, within the time that software is specified, authenticatee must complete Take pictures, otherwise this authentication failed.Replacing dynamically verifying information is now then needed to re-start checking.For example:During limitation checking Between be 20 seconds, user must 20 seconds complete proving program.Practised fraud this have the advantage that authenticatee can be reduced Time.
In order to improve such scheme, the ID card No. that software is provided according to authenticatee is directly from the identity of government department The corresponding photo of data base call is demonstrate,proved, to be checked with foregoing shot image, the true and false is judged.
In order to distinguish the true from the false, a kind of mode be the image show-and-tell that will be obtained from government's lane database in software interface, So that whether other users contrast identity card picture is consistent with shot image before authenticatee;Another way is to allow software journey Whether sequence automatic discrimination shot image is consistent with identity card picture.
In order to improve such scheme, the method that software operation business informs the above-mentioned part or all of checking true and false of user.Institute The informing mode stated can be the authenticity that the image is marked in the image of software or near image, can also software its Its position or the page are illustrated, and user can also be informed by other media, and described medium includes but is not limited to software, net The existing medium such as page, book, newpapers and periodicals, magazine, TV.
In order to improve such scheme, software compulsive requirement software users shoot origin authentication image;There is no origin authentication figure The repertoire for the software that the user of picture can use the user that can not use origin authentication image, for example, be not displayed in User list, it is impossible to give other users photos and sending messages.
Best mode is that the position of origin authentication image is fixed, the checking letter for contrasting verification for other users Breath is shown in picture appearance.If position is not fixed, that cheat can just intercept the photo of other users and then upload, and easily lead Cause other users erroneous judgement.
The object dated can be given a mark, be evaluated between social software user.Here ", " can be "AND" Relation or "or" relation.If cheated, cheated situation can be write in evaluation content, can so prevent more People is cheated.Evaluation content can show appointment cost situation.
In order to improve such scheme, whether software program can carry out appointment according to based on the following auxiliary judgment both sides:
1st, chat number of words
2nd, special keyword:" opinion ", " meeting ", " where seeing " etc..
In order to improve such scheme, in order to ensure authenticity, all users must carry out real-name authentication, pass through portion of government The identity card database of door carries out name and identification card number code check.Only carrying out the user of real-name authentication can just be displayed on Inside search result, other users photos and sending messages can be just given.
A kind of social software, it can be according to the geographical position of user(Including according between IP address positioning geographical position etc. Connect and determine that the mode in geographical position falls within such case)User list is shown, possesses chat feature, it is characterized in that:The social activity Software provides that user must set the purpose for selecting its account to use software, and project to be selected includes commercial object, and software can be by use The requirement at family performs the user for whether showing commercial object in user list.Described commercial object refers to:It uses software Purpose be vending articles, service.
In order to improve such scheme, commercial object user can individually be listed with list.
In order to improve such scheme, domestic consumer can individually be listed with list.
In order to improve such scheme, sale column publishing commodity that user can be special on software, information on services are described Commodity include but is not limited to second-hand goods.Described sale column can be in the single page or the software page A private part.
In order to improve such scheme, described commodity, information on services can be searched in the shopping search page of the software Arrive.
In order to improve such scheme, have in the commodity issued, the attribute of service one be used for indicate whether be sent to it is other City, can so avoid the occurrence of mixed and disorderly, invalid search result.
A kind of social software, it can show user list according to the geographical position of user, possess chat feature, when it is used When mobile phone, it carries such user list page(The different software users for showing), the page often goes(Level side To)Containing 2,3 or 4 user's head portraits.Preferably 3,3 head portraits can with the mobile phone of relatively good adaptation various sizes but also It can keep than larger picture size.Better way is that software determines that often row shows head portrait according to the size of user's screen Number.
A kind of social software, it can show user list according to the geographical position of user, possess chat feature, when it is used When mobile phone, it carries such user list page(The different software users for showing), the page shows 2,3 or 4 Arrange user's head portrait.Better way is that software determines to show the columns of head portrait according to the size of user's screen.
In order to improve above or below such scheme, head portrait(Can also be in the left and right sides)User profile can be placed:Year Age, height, income, distance etc..
In order to improve such scheme, user can select, set user's head portrait number of often row display.
Such page setup is particularly suitable for showing strange list.
Described social software, both can be internet site or portable equipment APP.The camera both can be with It is the camera for connecting camera or mobile phone on computers.Described " before taking pictures " refers to that user presses Take pictures before button.Described checking information, can pass through sound or image(Character is also a kind of image information)Be broadcast to by Verifier.
In the software using this method, the user for the checking that do not carry out taking pictures will be not displayed in user list or search In hitch fruit, also other images cannot be sent to other users.
Social software and the method for attracting user:Virtual present or electronic money can be given other by the user of the software User, money can be exchanged into by a certain percentage by the virtual present, electronic money by receiving the user of present.Money is finally transferred to oneself Bank account or other accounts with gathering functions(Such as Alipay, wechat).
In order to improve such scheme, software users can send appointment to other users by clicking on the button of the software and invite Please, the user for initiating to invite can select, set date subsidiary virtual present, the species of electronic money, quantity, here ", " Number include two kinds of situations of "AND" and "or".The button refers to press the virtual push button, virtual that down-stream can be triggered to perform Button, physical button, image, menu or character etc..
In order to improve such scheme, the software users can issue the auction activity of oneself appointment, ginseng on the software interface Other users with auction are with virtual present or electronic money auction.
Preferably, described auction activity can also be shown as the personal time of auction users, and this does not influence what it was dated Essence.
In order to improve such scheme, the software users can be by virtual present or electronic money with information(Including instant message, Mail)Give other users.
In order to improve such scheme, user only has opening information to obtain described virtual present or electronic money.
In order to improve such scheme, the information with present is not read more than certain time, then present fails, and can be returned Send out the user of present.
In order to improve such scheme, the appointment of initiation, which is invited, carries when and where information, and the software is according to by about square Mobile phone is in appointment time section(It can allow have regular hour error)Geographical position judge by about side whether gone to fulfill an appointment.Mobile phone location Judgement can be positioned according to satellite-signal, mobile phone signal positioning, the existing location technology of online IP address positioning etc. are entered OK, it may be referred to the technology that the social software such as footpath between fields footpath between fields is used at this stage.
In order to improve such scheme, userspersonal information's page can show the relevant information that user dated in the past, user to Other people appointment is evaluated, receives the appointment evaluation information that other users are provided(Favorable comment, in comment, difference is commented, complain quantity, appointment time Number, appointment cost etc. appointment relevant information).
In order to improve such scheme, both sides by the shop of businessman can confirm the menu of handy meal on software before appointment.
Appointment process:Appointment side is asked to initiate appointment request(Special button can be set on software, quilt can also be located at The about square personal information page)If agreeing to appointment request by about side, the appointment present or electronic money of requesting party, which enter, to be frozen Knot state.In special date, entered by about side near reservation place in certain distance(Such as 500 meters, to consider house to satellite The screening effect of positioning signal or other mobile phone positioning signals), then it is assumed that gone to fulfill an appointment by about side, phase can be clicked on by about side Close button to confirm to have gone to fulfill an appointment, certainly, this can also allow software to automatically confirm that operation of going to fulfill an appointment, the delivery in merchandising equivalent to Taobao Operation.
Only appointment request side confirms that appointment is completed or appointment request side there is not proposition reimbursement requirement and has crossed acquiescence Closing time(Such as 7 days), present or money can be about received just now(Here money can be ideal money or electronics Currency, or cash).User, which can be set, oneself receives the lowest price that appointment is invited(Or present quantity), go out less than this The appointment of valency, which will be invited, to be refused automatically by system.
The appointment request of appointment request side can also be refused by about side, now present or electronic money are retired asks to appointment The side of asking.
If appointment request does not meet with a response within a certain period of time, appointment request failure, present or money will be retired Date in the account of promoter.
The application price of appointment can be 0, if the overall consumption amount of money(The gold of consumption on the spot including appointment application fee and appointment Volume)For less than certain amount of money, then indifference comments power.
By software initiate appointment benefit be:Normal friend-making user by about when can obtain money, this is to a lot Schoolgirl understands more attractive., can if cheat is run into and the user for initiating appointment then can be to sending evaluation by user about To be commented to going on business, prevent other people from continuing to be cheated.
User can initiate the appointment underground to other users and invite, and the appointment that can also participate in other online friends issue is clapped Sell.
User can actively the personal information page sell, auction the appointment time of oneself.If the appointment of auction strikes a bargain It must just go to fulfill an appointment, otherwise the total branch of user credit is deducted points;The appointment that others initiates can be refused.
Userspersonal information's page show including(But it is not limited to)Following information:Information content of the user of unread with present, The information content without present is not read;The maximum gift bag amount of money received at present in history;Have been received by informational capacity;Appointment number of times, Appointment is evaluated, nearly 1 year, one month, history appointment number of times.
Preferably, the user of only real-name authentication just has evaluation right.The user of the appointment with present of only having struck a bargain just has Evaluation right.Letter is not read, then can not receive the present of the letter institute band.Letter is not read yet in certain time, then present is returned to automatically Give a present a side of thing(Letter still exists).
Preferably, information is pressed sorts with the total price of the subsidiary present of letter(The same price is according to time sequence)., should after information has been seen The priority of letter is to lose, into list according to time sequence.For not attaching present, then by last transmitting time order Sequence.
For prevent user merely desire to by see letter receive present thing make money, following measures can be taken:
1st, in certain time(Within two months)All do not date, then cancel that user is interior for a period of time to see that letter is received present the work(of thing Energy.Again open and watch that letter thing function of receiving present needs to apply again, the reasons why letter is not dated is seen in submission.
, present exchange for ready money need to reach certain cycle time, if user does not date in the time, improve The service charge ratio received to it.
Preferably, it could only be commented in the case of cheated to difference, it is not possible to because other reasons are commented to difference.Difference, which is commented, to be carried Hand over evidence.Invoice must be asked for dining room or bar after paying, can not alarmed to invoice, alarm receipt and invoice can be into For evidence.
Present described herein both can be virtual present or present in kind, electronic money or cash.
, can be by judging user mobile phone in order to prevent bad user from re-registering new account after processed or title IMEI strings number, cookie, cell-phone number or ID card No. prevent user from registering software account again.If the mobile phone of new registration On these above-mentioned information have at least one and be judged to the relevant information of bad user and have identical, then forbid it to note Volume account.
Preferably, by judging that the IMEI strings number of user mobile phone prevent user from registering software account again.
The other parts of software may be referred to existing website or APP, be not belonging to the characteristic of the present invention, here not Repeat.
The present invention also provides a kind of social software and attracts user, the device of the authentication image true and false, and the device uses at least one Plant above-mentioned method.The present invention can be used in numerous general or special purpose computing system environments or configuration.Described device can be with It is:Personal computer, server computer, work station, handheld device or portable set, laptop device, multiprocessor system System, the system based on microprocessor, set top box, programmable consumer-elcetronics devices, network PC, minicom, mass computing DCE and equipment of machine including any of the above system or equipment etc..When the software is website, the equipment is outstanding It refers to the server of the website(Including distributed server).When the software is cell phone software(APP)When, the equipment is especially also wrapped The webserver that service is provided for software is included(Including distributed server).
Advantages of the present invention.After this method, website or cell phone software operator need not manually participate in certification, and straight The online friend for the part of the judgement true and false being left for viewing photo or video is met, it is soft for the huge website of number of users or mobile phone Part, will save substantial amounts of cost of labor.For example, the video authentication that century good edge friend-making net is used, exactly allows the work of website Go to carry out manual examination and verification as personnel, this can produce substantial amounts of labour cost.It should be noted that the video of century good hoddy is recognized Card, can gather the photo of authenticatee by camera, but its photo gathered by camera is underground, but leave for Staff's examination & verification of website is used, and this and the method applied in the present invention are different.Each the staff of website is Limited, once need the number of video authentication too many, then examination & verification velocity potential must be slack-off.And use this method, then it can do To shoot authentication image after can begin to use, user without waiting for.
In addition, century good hoddy shoots photo simply by camera, the checking information of dynamic change is not provided but, this One problem of sample is that one be shooted can print others' photo in advance, and the photo printed is directly shot by camera, The leak that can be bored is left to cheat.
After this method, the fraud in terms of internet dating will greatly be contained.
By classifying to user, domestic consumer be can choose whether to show commercial user, and pin is provided to commercial user Function is sold, their the unnecessary interference to common social software user have both been avoided, the need for meeting them again, one action two .
Possessing the social software of communication function turns into after the software that a cellphone subscriber carries with, if it has full work( The shopping function of energy, that can bring great convenience to user:
1st, the communication function of bitcom in itself can meet the communication function of both parties.
, cellphone subscriber special shopping or chat app need not be still further installed, mobile phone space can be saved.
, personal and commercial user is unified in a software, be more conducive to it is personal nearby find commodity or service, beneficial to double Box drain leads to, and this is better than softwares such as masses' comments, because they do not have communication function, has chat feature to be more convenient for both parties Communication.
Actually there are many such commercial users on the footpath between fields of footpath between fields, but not including the use of software in the user property on footpath between fields footpath between fields Purpose, client is not required and indicates the purpose for using software, is not had and is allowed user to choose whether to show commercial object user Function, so these users are mixed in user list, very big puzzlement is caused to common friend-making user.Current footpath between fields footpath between fields does not have The special function of allowing user's publishing commodity or service, does not provide corresponding function of search yet.
Although wechat has micro- shop, but does not have direct publishing commodity sales information in the user interface of wechat(Especially use The personal second-hand article transferable information in family)Function, opening micro- shop needs cumbersome flow, and wechat is not searched at present The function of the merchandise news of all user's issues.
With Taobao Wang Wang difference:Taobao Wang Wang is the software for being exclusively used in shopping exchange, do not searched by geographical position, The function of user is shown, exactly, it does not have social functions.
All it is neighbouring people because the user list of the social software is come sequencing display by geographical position, So it is easier to facilitate the generation of transaction, especially second-hand article, everybody has, and neighbouring people is more convenient for transferring the possession of after seeing.
Social software is used after head portrait pattern of rows and columns of the present invention, it is possible to bigger head is shown on mobile phone screen Picture, user can see more clearly, while number of times and frequency that user pulls the page can also be reduced.
Using the method for attraction user of the present invention, more high-quality beauty handsome boys can be attracted soft using this Part, so as to improve attraction of the software to domestic consumer, increases number of users.Shone due to solving cheat well using beauty The problem of piece deceives people, can also attract more users.
Brief description of the drawings
The invention will be further described with reference to the accompanying drawings and examples.
Fig. 1 is that the authenticatee of the embodiment of the present invention 1 takes pictures schematic diagram.
Fig. 2 is the user picture list schematic diagram of the software presentation of the embodiment of the present invention 1.
Fig. 3 is stranger's original list of chat software " footpath between fields footpath between fields " existing latest edition.
Fig. 4 is stranger's original list of the software presentation of the embodiment of the present invention 2.
Fig. 5 is userspersonal information's page of the software presentation of the embodiment of the present invention 3.
Embodiment
Verifying the best embodiment of true and false method is:Dynamic verification code, ID users or use are coordinated using dynamic image Name in an account book.Secondary choosing is still photo+dynamic verification code.Due to the personage in dynamic image can activity, its is hand-held dynamic State identifying code can also be moved and then, and therefore, for general cheat, this verification mode can not be gone by software at all Identifying code is changed, difficulty is very big.Because patent application document can not show dynamic video, therefore accompanying drawing here is only with quiet The mode of state photo+dynamic verification code.
Embodiment 1 is one embodiment of the present invention.
In the embodiment shown in fig. 1:Mobile phone A PP have taken the photo of authenticatee, before shooting, and authenticatee is led to Cross cell phone software and see identifying code 222666, and the dynamic verification code is write on a blank sheet of paper, photographed together with head portrait In photo.
In fig. 2, the photo is displayed on below the leftmost side of the user picture list of the cell phone software, photo especially note Understand " head portrait that our station is shot, identifying code 222666 ".User is by contrasting the checking below identifying code and photo in photo Code, you can distinguish the true and false of photo.
Embodiment 2 is one embodiment of the present invention.
In Fig. 3, the screen of user interface one on footpath between fields footpath between fields can show 5 strange user's head portraits.Fig. 4 is set using the present invention Head portrait pattern of rows and columns, a screen shows 12 strange user's head portraits, and list of the size than footpath between fields footpath between fields in Fig. 3 of each head portrait Individual head portrait size is big, and the reader that is more convenient for checks clear.
Embodiment 3 is one embodiment of the present invention.
In Fig. 5, it is shown that situation is evaluated in the appointment of user, click on favorable comment, difference and comment after link, it can be seen that be specific to evaluate Content.The page also show the situation of user's information collected.User is also given in addition to sell the link of second-hand dotey, initiate Link, the link of user's auction appointment of appointment.

Claims (10)

1. a kind of social software and its method, the method for the authentication image true and false for attracting user, it is characterized in that:The software users (Certain customers or whole users)Personal information contain such image(Referred to herein as " origin authentication image "), other users Contrasted by the image and other images, it can be determined that the true and false of other images(Whether the user is belonged to), described image Can be still image or dynamic image.
2. the method for the social software authentication image true and false as claimed in claim 1, it is characterized in that:Described origin authentication image It is obtained by, is shot by camera and include authenticatee(Namely software users)The image of face, program can Automatic that shot image is shown in into software or shot image is shown in ad-hoc location, the image is to verify the true and false for other users Origin authentication image, other users are by contrasting other images that the image and authenticatee issue, you can judge other images The true and false.
3. one of method of the social software authentication image true and false as described in claim 1,2, it is characterized in that:Original tested described The common trait that in card image or can be nearby recognized with ordinary people(Or special mark), it is easy to let the user know that with this The image of feature is origin authentication image.
4. one of method of the social software authentication image true and false as described in claim 1,2, it is characterized in that:It is described original to test Card image is shown in dedicated location in software interface.
5. one of method of the social software authentication image true and false as described in claim 1,2,3 or 4, it is characterized in that:Carry out institute Dynamically verifying information is provided to one be shooted before the shooting stated, one be shooted is on request presented the content required by the multidate information Before camera so as to by the content and one be shooted face record together into the image clapped.
6. the method for the social software authentication image true and false as claimed in claim 5, it is characterized in that:Before shot image and shooting The checking information provided is present on software interface, and whether other users both can unanimously judge to be clapped by contrast The true and false of image.
7. one of method of the social software authentication image true and false as described in claim 1,2,3 or 4, it is characterized in that:Software is given Go out checking instruction, the content of the instruction requirement is presented in authenticatee's execute instruction in the range of being taken.
8. the method for any one social software authentication image true and false as described in claim 5 or 6, it is characterized in that:Described Dynamically verifying information is the ID users or user name of user(Including but not limited to login account, user's pet name, user name).
9. the method for the social software authentication image true and false as claimed in claim 8, it is characterized in that:Origin authentication image used For dynamic image.
10. a kind of social software, it is characterized in that:It by judge the IMEI of user mobile phone go here and there number, cookie, cell-phone number or identity Card number prevents user from registering software account again.
CN201710013447.6A 2016-04-02 2017-01-09 A kind of social software and its attraction user, the method and device of the authentication image true and false Pending CN107292140A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610199375 2016-04-02
CN2016101993754 2016-04-02

Publications (1)

Publication Number Publication Date
CN107292140A true CN107292140A (en) 2017-10-24

Family

ID=60093404

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201610502245.3A Pending CN107292139A (en) 2016-04-02 2016-06-30 A kind of social software and its attraction user, the method and device of the authentication image true and false
CN201710013447.6A Pending CN107292140A (en) 2016-04-02 2017-01-09 A kind of social software and its attraction user, the method and device of the authentication image true and false

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201610502245.3A Pending CN107292139A (en) 2016-04-02 2016-06-30 A kind of social software and its attraction user, the method and device of the authentication image true and false

Country Status (1)

Country Link
CN (2) CN107292139A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110162331A (en) * 2018-02-11 2019-08-23 李辉 A kind of social software and its method and apparatus used

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109784517A (en) * 2018-12-24 2019-05-21 深圳市珍爱捷云信息技术有限公司 Appointment task processing method, device, electronic equipment and computer storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101359388A (en) * 2008-08-05 2009-02-04 杨马起 Meeting or blind date system and method from network to true-life for two membership in friend-making net
US20120114190A1 (en) * 2010-11-04 2012-05-10 The Go Daddy Group, Inc. Systems and Methods for Person's Verification Using Photographs on Identification Documents Taken by a Verifier-Controlled Mobile Device
CN102750519A (en) * 2012-05-30 2012-10-24 北京城市网邻信息技术有限公司 Method and device for identifying and filtering images
CN103886505A (en) * 2012-12-19 2014-06-25 上海爱相随信息科技有限公司 Member interaction auxiliary mechanism of dating platform
CN104699729A (en) * 2013-12-04 2015-06-10 三竹资讯股份有限公司 Device and method for identifying authenticity of social network site photo

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101359388A (en) * 2008-08-05 2009-02-04 杨马起 Meeting or blind date system and method from network to true-life for two membership in friend-making net
US20120114190A1 (en) * 2010-11-04 2012-05-10 The Go Daddy Group, Inc. Systems and Methods for Person's Verification Using Photographs on Identification Documents Taken by a Verifier-Controlled Mobile Device
CN102750519A (en) * 2012-05-30 2012-10-24 北京城市网邻信息技术有限公司 Method and device for identifying and filtering images
CN103886505A (en) * 2012-12-19 2014-06-25 上海爱相随信息科技有限公司 Member interaction auxiliary mechanism of dating platform
CN104699729A (en) * 2013-12-04 2015-06-10 三竹资讯股份有限公司 Device and method for identifying authenticity of social network site photo

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
新民网: "像像破解网络交友诚信软肋,打造纯净的网络社交平台", 《WWW.FACE99.COM/INDEX/READ?PAGE=5》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110162331A (en) * 2018-02-11 2019-08-23 李辉 A kind of social software and its method and apparatus used

Also Published As

Publication number Publication date
CN107292139A (en) 2017-10-24

Similar Documents

Publication Publication Date Title
US11361292B2 (en) Selected place on map or from category specific list of nearby places associated payment interface for making payment
JP2015079371A (en) Campaign application system, campaign application method, campaign management server, campaign management method, and program
CN106067134A (en) A kind of network self-service type books are recommended and are purchased and borrow method
US20150348046A1 (en) Systems and Methods for Performing Secure Commercial Transactions
CN107103458A (en) Information processor and electronic billing system
CN107657445A (en) A kind of on-line payment method and on-line payment system
US20020152130A1 (en) Method for conducting an on-line raffle session
US20130097509A1 (en) Video sticker album available on line and system develoed for operationalizing such album
US8412709B1 (en) Distributed information collection using pre-generated identifier
US20170004547A1 (en) Queuing and number calling method and system
CN103229524A (en) Method and system for mobile identification, commerce and agreement transactions
CN107292140A (en) A kind of social software and its attraction user, the method and device of the authentication image true and false
CN107612989A (en) A kind of information-pushing method, terminal and system
CN109670854A (en) The information application method in shop, terminal, system and readable storage medium storing program for executing under line
CN107958422A (en) A kind of social software and its attraction user, the method and device of the authentication image true and false
JP4922953B2 (en) Benefit grant system
JPWO2019225142A1 (en) Information processing device and information processing method
US20140025456A1 (en) Method of Fundraising Through a Collaborative Creation of Artwork with Prize-Winning Incentives
KR20180071148A (en) Control system for cafe goods design
CN106710080A (en) Self-help service system
JPWO2018116401A1 (en) Asset management system, asset management method, and program
KR102102016B1 (en) System and method for acquiring lost items
KR20160094697A (en) Talent donation marketing system
JP2011248736A (en) Gift selection system
US20030204446A1 (en) One-beam, multi-person web interaction method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination