CN118069276A - Social software and method and device for using same - Google Patents

Social software and method and device for using same Download PDF

Info

Publication number
CN118069276A
CN118069276A CN202410283361.5A CN202410283361A CN118069276A CN 118069276 A CN118069276 A CN 118069276A CN 202410283361 A CN202410283361 A CN 202410283361A CN 118069276 A CN118069276 A CN 118069276A
Authority
CN
China
Prior art keywords
user
software
users
image
social software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410283361.5A
Other languages
Chinese (zh)
Inventor
请求不公布姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CN118069276A publication Critical patent/CN118069276A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/10Multimedia information

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A method and apparatus for social software and use thereof for preventing social fraud on a network. It prevents phishing by allowing users to evaluate each other and displaying the mutual evaluation between users on the user's personal data interface. By adopting the method, the phishing on the software for marriage and friend making can be prevented more effectively, conveniently and quickly, and the labor cost of a software operator is saved.

Description

Social software and method and device for using same
Technical Field
The invention relates to social software, a method for attracting users, a method for verifying authenticity of images of users and a method for preventing phishing.
Background
With the development of the internet, social networking and friend making have greatly progressed, and many people start making friends through the internet. But the internet is also full of various cheats, wine holders, rice holders and coffee holders, and the layers are endless. There are many frauds that use friend-making websites or mobile phone friend-making APP. Their most common approach is to use beautiful photos to attract the opposite.
In addition, social software such as strange has many users who use the software for business purposes. However, such software does not classify such users from individual users, so that individual users often see advertising information from such commercial users, causing nuisance to individual users. Such social software does not take into account the needs of such business clients, and there is no perfect sales functionality within the social software.
Viewing stranger image lists is the most common feature for social software. The existing mobile phone social software such as QQ, weChat, strange, century best-margin mobile phone version and the like has the same problems in head portrait arrangement of a user head portrait list page of a stranger, and probably the development of the software refers to chat software QQ of the old brand, the head portraits of the stranger list are all arranged on one row, the head portraits are arranged on the left side of the row, and the right side of the head portraits are quite large blank areas with a small amount of characters. For a mobile phone, the screen is very small, the head portrait arrangement wastes screen space, so that the head portrait of the user is very small and inconvenient to read (if the head portrait of the user is larger, the head portrait of the user displayed on the screen is smaller, and the blank area wasted on the right side is larger), and more operation of pulling down pages is needed for viewing the head portraits of the same number of users.
Disclosure of Invention
The invention aims to provide a method for verifying authenticity of an image and a method for preventing phishing, so as to prevent a fraudster from fraudulently using social software, and simultaneously provide a method for attracting social software users and innovative software functions; the method for filtering the information disturbance of the commercial users to the common users is provided, and meanwhile, the commercial users are also considered, so that perfect selling functions are developed for the commercial users. The social software includes not only programs (such as mobile phones and tablet APP) used on portable devices, but also websites and other websites and APP with friend making function. In addition, the invention provides a new user list display mode and solves the problem that a large amount of blank areas of the mobile phone screen are wasted.
The application also provides a device using the method, so as to ensure the practical application and implementation of the method.
The purpose of the invention is realized in the following way: the social software has all or part of the functions of the existing social software, the personal information of the software user (part of users or all users) contains an image (called as an original verification image) and other users can judge the authenticity of other images (whether the other images belong to the user) by comparing the image with the other images, and the image can be a static image or a dynamic image (or called as video or image). The original verification image refers to an image which enables a user to consider that the image can be used for judging the authenticity of other images. The personal information may be personal information of the software user in the software of the software user, or personal information of other users displayed in the software of the software user. The software can force all users to provide the original verification image, and can also enable the users to select the original verification image, if the original verification image is selected by the users, the original verification image is contained in part of the users.
The image is acquired in a plurality of ways: 1. shooting directly by a camera; 2. selection on the user's handset (e.g., selecting a photograph of a document containing a photograph such as an identification card, or selecting an image containing authentication features, which is a poor solution).
The software displays the original verification image of the user, so that other software users can judge the authenticity of other images by comparing the original image with the other images.
The original verification image may be obtained by: the face of the person to be authenticated (the software user himself) is photographed (the person to be authenticated can be self-photographed or assisted by others) through the camera, the program can automatically display the photographed image on the software or display the photographed image at a specific position (instead of the user himself randomly selecting the image file on the device), the image is an original authentication image for other users to authenticate, and other users can judge whether other images are real images of the person to be authenticated by comparing the image with other images issued by the person to be authenticated. The image can be a static image, a dynamic image or a video. The interface is not necessarily the default interface of the software, but may be other secondary pages or other pages, especially the image list page of the user.
The shooting action is caused by clicking a special key, and after clicking the special key, the user cannot select the existing image file from the device before shooting is completed and displayed on the software interface. The keys refer to the parts (virtual keys, menu keys and virtual buttons) which can be clicked to cause the action of the subsequent program on the screen, and can also be physical keys or buttons of the mobile phone.
The above can be described briefly as: the software comprises a special key, after clicking the key, the software shoots an image for a user through a camera, the shot image is displayed at a specific position of a software interface, and the user cannot display other images on the device at the position. Such descriptions are virtually identical to those previously described, except that the methods are recited.
In order to improve the above scheme, common features (or special marks) which can be identified by common people are arranged in or near the original verification image, so that a user can know that the image with the features is the original verification image. One implementation is that the software makes uniform demands on the user's captured image, forming a common feature. For example: white paper with hand-written characters, the same or similar background pictures, gestures or giving example images for imitation, these requirements result in pictures having common features that can be recognized by ordinary persons and can be considered as original verification images. Another implementation is that the software displays special signs (images, characters, etc.) within or near the image as well as forming the common features described above. Alternatively, the above-described common feature may be formed by arranging the original verification image at a specific (or dedicated) location of the software interface.
In order to improve the scheme, the original verification image is positioned at a special position known by a user in a software interface, and the image known by the user at the position is the original verification image. The position is noted in the use instruction of the software so as to be known by a user; text descriptions can also be added in or near the image to tell the user that the image at that location is the original verification image.
In order to improve the scheme, a special mark is arranged in or near the original verification image, and the user knows that the image is the original verification image through the mark. The marks can be words, characters or figures.
In order to improve the scheme, the software gives a verification instruction (the verified person is required to execute certain transactions according to the requirement), the verified person executes the instruction, and the instruction requirement content (such as making certain actions or writing characters) is displayed or presented in the shooting range of the camera. The instruction content and the photographed picture are displayed on a software interface for authentication by the user.
In order to improve the scheme, dynamic verification information is provided for a photographed person before the photographing is carried out, and the photographed person presents the dynamic information in front of a camera so as to record the information and the face of the photographed person into a photographed image. The dynamic verification information refers to information which is given each time (different with time) and is different or is obtained by a person.
The dynamic verification information may be information related to the user, such as a user ID number or a user name, and is preferably unique. Unique information (e.g., user ID number, user name) can be used to distinguish between individual users, whereas age is not unique and cannot be used as authentication information. The user name may include, but is not limited to, a login account, a user nickname, a web name, etc., that may represent the user's identity.
The software has somehow informed the user that his own user ID or user name is to be presented in front of the camera, i.e. before the camera shooting, the user is provided with dynamic authentication information.
Preferably, the original verification image is a dynamic image (or video).
In order to improve the scheme, the photographed image (which normally contains dynamic verification information) and the verification information given before photographing are presented on a software interface (the image and the verification information are separated) after photographing is finished, and other users can judge whether the image is true or false by comparing whether the photographed image and the verification information are consistent. This makes it possible to determine whether it is a real person that is photographed in real time or a printed photograph that is photographed.
In order to improve the scheme, software automatically recognizes verification information on the photographed picture through a program and checks the verification information with the verification information given before photographing so as to judge the authenticity of the photographed image. If the authentication information identified by the program does not match the authentication information given before photographing, the user is required to perform authentication again.
The verification information is prompted to the verified person without program identification, and then the verification information is displayed on the personal data page of the verified person, so that other net friends can verify the verification information by themselves, the technical difficulty of program identification can be avoided, and the accuracy is improved.
To prevent the authenticatee from cheating others to take a picture of them, the authenticatee may be required to write alert information on paper, such as: photograph statement, non-self photograph will assume legal responsibility-! The photo is only used for the X website to verify identity of the person, the non-substitute person shoots, and the verification code is as follows: 222666.
In order to improve the scheme, after the verification information is given, the verified person must complete photographing within the time designated by the software, otherwise, the verification fails. At this time, the dynamic verification information needs to be replaced to carry out verification again. For example: the verification time is limited to 20 seconds and the user must complete the verification process at 20 seconds. This has the advantage that the time for the verifier to impersonate the artifact can be reduced.
In order to improve the scheme, the software directly calls the corresponding photo from an identity card database of a government department according to the identity card number provided by the authenticatee so as to check with the photographed image and judge the authenticity.
In order to judge the authenticity, one way is to display the images obtained from the government database on a software interface so that other users can compare whether the identity card photos are consistent with the images shot before the authenticatee; another way is for the software program to automatically determine if the taken image and the identification card photograph are identical.
To improve the above scheme, the software operator informs the user of the above method of partially or totally verifying authenticity. The informing mode can be to mark the authenticity of the image in or near the image of the software, or to explain the image in other positions or pages of the software, or to inform the user through other media, including but not limited to the existing media such as software, web pages, books, newspapers, magazines, televisions, etc.
In order to improve the scheme, the software forces the software user to shoot the original verification image; a user without an original verification image will not be able to use all the functions of the software that the user with the original verification image can use, e.g. not be displayed in the user list, and not be able to send information to other users.
Preferably, the position of the original verification image is fixed, and verification information for comparison verification by other users is displayed outside the image. If the position is not fixed, the cheater can intercept photos of other users and upload the photos, and misjudgment of the other users is easy to cause.
Objects that have been dated may be scored and evaluated between social software users. The term "and" as used herein may be "or" as used herein. If spoofed, the spoofed condition may be written in the evaluation content, which may prevent more people from being spoofed. The evaluation content may display appointment expense conditions.
To improve the above scheme, the software program may assist in determining whether the two parties have made an appointment according to the following criteria:
1. Chat word number
2. Special key words: "see", "see-through", "where see", etc.
To improve the above scheme, to ensure authenticity, all users must conduct real name authentication, and name and identification number verification is conducted through an identification card database of a government department. Only the user who performs real-name authentication can be displayed in the search result, and information can be sent to other users.
The social software can display a user list according to the geographic position of a user (including the mode of indirectly determining the geographic position according to IP address positioning, etc. also belongs to the case), and has the chat function, and is characterized in that: the social software provides that the user should set the purpose of selecting the account number to use the software, the to-be-selected item comprises business purpose, and the software can execute the user whether to display the business purpose in the user list according to the requirement of the user. The commercial purpose is as follows: the purpose of the software is to sell goods and services.
To improve the above, the business purpose users may be listed individually with a list.
To improve the above scheme, the general users may be listed individually with a list.
To improve the above scheme, the user can issue commodity and service information on special sales columns in software, wherein the commodity comprises but is not limited to secondhand commodity. The sales column may be a separate page or may be a dedicated part within a software page.
In order to improve the scheme, the commodity and service information can be searched on a shopping search page of the software.
In order to improve the scheme, one of the attributes of the distributed goods and services is used for indicating whether the distributed goods and services are sent to other cities, so that messy and invalid search results can be avoided.
Social software which can display a list of users according to their geographical location, has a chat function, and when it is used in a mobile phone, it has a user list page (for displaying different software users) with 2, 3 or 4 user portraits per line (horizontal direction). Preferably 3, 3 head portraits can be well adapted to mobile phones of various sizes and can also keep a relatively large image size. Preferably, the software determines the number of display head portraits per line according to the size of the user's screen.
Social software which can display a list of users according to their geographical location, has a chat function, and when it is used in a mobile phone, it has a list of users page (for displaying different software users) with 2,3 or 4 columns of user portraits. Preferably, the software determines the number of columns of the displayed head portrait according to the size of the user's screen.
To improve the above scheme, user information may be placed above or below (or on the left and right sides as well) the avatar: age, height, income, distance, etc.
In order to improve the scheme, the user can select and set the number of user head portraits displayed in each row.
Such a page arrangement is particularly suitable for presenting stranger lists.
The social software can be an internet site or a portable device APP. The camera can be a camera connected to a computer or a camera of a mobile phone. The term "before photographing" refers to before the user presses the photographing button. The authentication information may be transmitted to the authenticatee by sound or image (character is also an image information).
In the software using this method, the user who does not perform photographing authentication will not be displayed in the user list or the search result, nor can other images be transmitted to other users.
Social software and method for attracting users: the user of the software can send the virtual gift or the electronic currency to other users, and the user receiving the gift can exchange the virtual gift and the electronic currency into money according to a certain proportion. The money is finally transferred to the own bank account or other accounts with the collection function (such as payment treasures, weChat, etc.).
To improve the above scheme, the software user can send out appointment invitations to other users by clicking the button of the software, and the user who initiates the invitations can select and set the virtual gift attached to the appointment, the type and the number of the electronic money, and the "number" includes the two cases of "and" or ". The key refers to a virtual button, a virtual key, an entity key, an image, a menu, a character or the like which can cause the execution of a subsequent program by clicking.
To improve the above scheme, the software user can issue the auction activity of the appointment on the software interface, and other users participating in the auction can auction with virtual gift or electronic money.
Preferably, the auction campaign may also be displayed as the auction user's personal time, which does not affect the nature of his appointments.
To improve the above scheme, the software user may send virtual gifts or electronic money to other users along with information (including instant messages, letters).
In order to improve the above scheme, the user can obtain the virtual gift or electronic money only by opening the information.
In order to improve the scheme, the information with the gift is not read for a certain time, and the gift is invalid and can be returned to the user who gives the gift.
To improve the above scheme, the initiated appointment invitation carries time and place information, and the software judges whether the about party is going to the appointment or not according to the geographic position of the about party's mobile phone in the appointment time period (a certain time error is allowed). The judgment of the mobile phone position can be performed according to the existing positioning technologies such as satellite signal positioning, mobile phone signal positioning, internet IP address positioning and the like, and the technology used by social software such as strange at the current stage can be referred to.
In order to improve the scheme, the user personal information page can display related information of past appointments of the user, appointment evaluation of the user for other people, and appointment evaluation information (related information of good, medium, bad, complaint number, appointment times, appointment expense and the like) given by other users.
To improve the above scheme, both parties before the appointment can confirm the menu of good meals on the software through the merchant's store.
Appointment process: the appointment requesting party initiates an appointment request (a special button can be arranged on software or can be positioned on a personal data page of the about party), and if the about party agrees to the appointment request, the appointment gift or electronic money of the requesting party enters a frozen state. On the date of the appointment, the about party enters a certain distance (such as 500 meters, taking into account the shielding effect of the house on satellite positioning signals or other mobile phone positioning signals) near the appointment place, and the about party is considered to be about, and the about party can click a related button to confirm that the about is about, which can also enable software to automatically confirm about the appointment operation, and is equivalent to shipping operation in the panning transaction.
Only if the appointment requester confirms that the appointment is completed or if the appointment requester does not make a refund request and a default time of delivery (e.g., 7 days) has elapsed, the about party may receive a gift or money (here, the money may be virtual money, electronic money, or cash). The user may set a minimum price (or gift amount) for himself to accept the appointment invitation, which will be automatically rejected by the system below this bid.
The transferee may also reject the appointment request of the appointment requester, at which time the gift or electronic money is returned to the appointment requester.
If the appointment request is not responded to within a certain amount of time, the appointment request is stale and the gift or money is returned to the account of the appointment initiator.
The appointment application price may be 0, and if the total cost amount (including the appointment application fee and the appointment land cost amount) is less than a certain amount, there is no poor rating.
The benefits of initiating an appointment by software are: the normal friend-making user can obtain money when being contracted, which is more attractive to many girls. While the user initiating the appointment may give an evaluation to the contracted user, and if a fraudster is encountered, a bad evaluation may be given to prevent others from continuing to be fraudulently.
The user can initiate appointment invitations which are not disclosed to other users, and can also participate in appointment auctions published by other net friends.
The user may actively sell and auction his or her own appointment time on the profile page. Appointment of auction must be sent to appointment if the deal is done, otherwise user credit total score is deducted; an appointment initiated by another person may be rejected.
The user personal information page display includes (but is not limited to) the following information: the user does not read the information quantity with the gift, and does not read the information quantity without the gift; the maximum gift amount received historically; the total amount of information received; number of appointments, date rating, last year, month, historical number of appointments.
Preferably, only real-name authenticated users have evaluation rights. Only users who have completed an appointment with a gift will have evaluation rights. If the letter is not read, the gift carried by the letter cannot be received. If the letter is not read for a certain time, the gift is automatically returned to the party who is feeding the gift (the letter is still.
Preferably, the information is ordered by the total price of the satellite accompanying gifts (also the price is ordered in time). After the message is seen, the priority of the message is lost and the message is entered into a time ordered list. For absence of attached gifts, the final signaling time sequence is ordered.
To prevent the user from only wanting to make money by looking at the credit, the following measures may be taken:
1. No appointment exists within a certain period of time (such as within two months), the function of watching letters and receiving gifts for a period of time of the user is canceled. The function of re-opening the viewing letter and gift is required to be re-applied, and the reason that the viewing letter does not have an appointment is submitted.
The gift exchanging cash needs to reach a certain period time, and if the user does not have an appointment in the period of time, the proportion of the commission charge received by the user is increased.
Preferably, the bad comments are only given if they are spoofed, and may not be given for other reasons. The bad comments must submit evidence. After payment, the invoice must be requested from the restaurant or bar, the invoice can be alerted without being sent, and the alerting receipt and the invoice can become evidence.
The gift described herein may be either a virtual gift or a physical gift, electronic money, or cash.
In order to prevent bad users from re-registering new account numbers after being processed or seal number, the users can be prevented from re-registering software account numbers by judging IMEI serial numbers, cookies, mobile phone numbers or identity card numbers of the mobile phones of the users. If at least one item of the information on the newly registered mobile phone is the same as the related information of the user judged to be bad, the registration account is forbidden.
Preferably, the user is prevented from registering the software account again by judging the IMEI serial number of the mobile phone of the user.
Other parts of the software can refer to the existing website or APP and are not part of the features of the invention, and are not repeated here.
The invention also provides a device for attracting users and verifying authenticity of images by social software, and the device uses at least one method. The invention is operational with numerous general purpose or special purpose computing system environments or configurations. The device may be: personal computers, server computers, workstations, hand-held or portable devices, tablet devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments and devices that include any of the above systems or devices, and the like. When the software is a website, the device is particularly a server (including a distributed server) of the website. When the software is a mobile phone software (APP), the device particularly also includes a web server (including a distributed server) that serves the software.
The invention has the advantages. After the method is adopted, the website or mobile phone software operator does not need to participate in authentication manually, but directly leaves the part for judging authenticity to net friends watching photos or videos, and a large amount of labor cost is saved for the website or mobile phone software with huge number of users. For example, the video authentication adopted by the century good friend-making network is to let the staff of the website go to perform manual examination, which generates a lot of labor cost. It should be noted that, the video authentication of the century good edge network will collect the photo of the verified person by the camera, but the photo collected by the camera is not public, but is reserved for the staff of the website to audit, which is different from the method adopted by the invention. The staff of each website is limited, and once the number of people needing video authentication is too large, the auditing speed tends to be slow. By adopting the method, the user can start to use after shooting the verification image without waiting.
In addition, century good-edge net only takes photos through a camera, but does not provide dynamic change verification information, so that a person to be taken can print out photos of other people in advance, the photo to be printed out is directly taken through the camera, and a leak which can be drilled is left for a fraudster.
By adopting the method, the fraud activity in the aspect of network friend making is greatly suppressed.
By classifying the users, the common users can choose whether to display the business users, and provide sales functions for the business users, so that unnecessary interference of the users to the common social software users is avoided, and the needs of the users are met, thereby achieving two purposes.
After the social software with the communication function becomes the software carried by the mobile phone user, if the social software has the full-function shopping function, great convenience is brought to the user:
1. the communication function of the communication software can meet the communication function of the buyer and the seller.
The mobile phone user does not need to additionally install special shopping or chat apps, so that the space of the mobile phone can be saved.
The personal and business users are unified into one piece of software, so that the personal can find goods or services nearby, and the personal can communicate with both parties, and the personal and business users are better than the public critique software, and the personal and business users have no communication function, so that the communication between the buyer and the seller can be facilitated due to the chat function.
In fact, there are many commercial users in strange practice, but the attribute of the strange user does not include the purpose of using the software, and the client is not required to note the purpose of using the software, and the function of enabling the user to select whether to display the commercial purpose user is not provided, so that the users are included in the user list, and great trouble is caused to the ordinary friend-making user. At present, the stranger has no special function for releasing goods or services by the user, and no corresponding searching function is provided.
Although the WeChat has a WeChat, the WeChat has no function of directly issuing commodity sales information (especially second hand commodity transfer information of a user person) on a user interface, the WeChat needs a complicated process to open, and the WeChat has no function of searching commodity information issued by all users at present.
And Wangbao Wangwang, the differences are as follows: nakebaowang is a software special for shopping communication, has no function of searching and displaying users according to geographic positions, and does not have a social function.
Because the user list of the social software is displayed in a ranked manner by geographic location, people nearby are all more likely to be involved in transactions, particularly second-hand items, and people all have a nearby person who sees the transaction more likely to transfer the transaction.
After the social software adopts the head portrait arrangement mode, larger head portraits can be displayed on the mobile phone screen, so that the user can see the head portraits more clearly, and the frequency and frequency of the user pulling pages can be reduced.
The method for attracting users can attract more high-quality beautiful girls to use the software, thereby improving the attraction of the software to common users and increasing the number of users. As the problem that the fraudsters use the beauty photos is solved well, more users can be attracted.
Drawings
The invention is further described below with reference to the drawings and examples.
Fig. 1 is a schematic view of a photograph of a authenticatee according to embodiment 1 of the present invention.
FIG. 2 is a schematic diagram of a user photo list presented by the software of embodiment 1 of the present invention.
Fig. 3 is a stranger list page of the chat software "stranger" with the current latest version.
FIG. 4 is a stranger list page presented by the software of embodiment 2 of the present invention.
FIG. 5 is a user personal information page presented by the software of embodiment 3 of the present invention.
Detailed Description
The best implementation mode of the authenticity verification method is as follows: dynamic images are adopted to match dynamic verification codes, user ID numbers or user names. The next choice is still photo + dynamic verification code. Because the characters in the dynamic image can move, the hand-held dynamic verification code can also move, so that the verification mode can not be used for modifying the verification code through software for common cheats, and the difficulty is great. Because the patent application document cannot show the dynamic video, the drawings only adopt a mode of static photo and dynamic verification code.
Example 1 is one embodiment of the present invention.
In the embodiment shown in fig. 1: the mobile phone APP takes a picture of the authenticatee, before taking, the authenticatee sees the authentication code 222666 through the mobile phone software, and writes the dynamic authentication code on a piece of white paper, and takes the picture together with the head portrait.
In fig. 2, the photo is displayed on the leftmost side of the user photo list of the mobile phone software, and the photo is specially noted with "the head portrait photographed by the home station, and the verification code 222666". The user can distinguish the authenticity of the photo by comparing the verification code in the photo with the verification code below the photo.
Example 2 is one embodiment of the present invention.
In fig. 3, a screen of a strange user interface may display 5 strange user avatars. In fig. 4, the head portrait arrangement mode provided by the invention is adopted, 12 strange user head portraits are displayed on one screen, and the size of each head portrait is larger than that of a single head portrait of a strange user in fig. 3, so that the head portraits are more convenient for readers to see and clearly.
Example 3 is one embodiment of the present invention.
In fig. 5, the date evaluation situation of the user is shown, and after clicking the good evaluation link and the bad evaluation link, the specific evaluation content can be seen. The page also shows the information received by the user. In addition, links to users selling secondaries, initiating appointments, and auctioning appointments are presented.

Claims (8)

1. A social software, characterized by: its user personal information interface carries information related to the ratings given to the user by other users.
2. The social software of claim 1, wherein: the user personal information interface is also provided with evaluation related information sent by the user to other users.
3. The social software of claims 1, 2, wherein: the user personal information interface is provided with the information related to the number of the good comments and the bad comments received by the user.
4. The social software of claims 1,2, wherein: the user personal information interface is provided with a good-evaluation and poor-evaluation link, and specific evaluation contents can be seen after clicking the good-evaluation and poor-evaluation links.
5. The social software according to any one of claims 1-4, wherein: only authenticated users have the right to evaluate.
6. Social software and a method for using the same are characterized in that: scoring may be performed between users of social software.
7. Social software and a method for using the same are characterized in that: social software users may be rated between themselves.
8. A device for social software use, characterized by: the device uses at least one of the methods described above.
CN202410283361.5A 2016-04-02 2017-01-09 Social software and method and device for using same Pending CN118069276A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201610199375 2016-04-02
CN2016101993754 2016-04-02
CN201710013447.6A CN107292140A (en) 2016-04-02 2017-01-09 A kind of social software and its attraction user, the method and device of the authentication image true and false

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201710013447.6A Division CN107292140A (en) 2016-04-02 2017-01-09 A kind of social software and its attraction user, the method and device of the authentication image true and false

Publications (1)

Publication Number Publication Date
CN118069276A true CN118069276A (en) 2024-05-24

Family

ID=60093404

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201610502245.3A Pending CN107292139A (en) 2016-04-02 2016-06-30 A kind of social software and its attraction user, the method and device of the authentication image true and false
CN202410283361.5A Pending CN118069276A (en) 2016-04-02 2017-01-09 Social software and method and device for using same
CN201710013447.6A Pending CN107292140A (en) 2016-04-02 2017-01-09 A kind of social software and its attraction user, the method and device of the authentication image true and false

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201610502245.3A Pending CN107292139A (en) 2016-04-02 2016-06-30 A kind of social software and its attraction user, the method and device of the authentication image true and false

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201710013447.6A Pending CN107292140A (en) 2016-04-02 2017-01-09 A kind of social software and its attraction user, the method and device of the authentication image true and false

Country Status (1)

Country Link
CN (3) CN107292139A (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110162331A (en) * 2018-02-11 2019-08-23 李辉 A kind of social software and its method and apparatus used
CN109784517A (en) * 2018-12-24 2019-05-21 深圳市珍爱捷云信息技术有限公司 Appointment task processing method, device, electronic equipment and computer storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101359388A (en) * 2008-08-05 2009-02-04 杨马起 Meeting or blind date system and method from network to true-life for two membership in friend-making net
US20120114196A1 (en) * 2010-11-04 2012-05-10 The Go Daddy Group, Inc. Methods for Person's Verification Using Photographs on Identification Documents
CN102750519A (en) * 2012-05-30 2012-10-24 北京城市网邻信息技术有限公司 Method and device for identifying and filtering images
CN103886505A (en) * 2012-12-19 2014-06-25 上海爱相随信息科技有限公司 Member interaction auxiliary mechanism of dating platform
TWI493491B (en) * 2013-12-04 2015-07-21 Mitake Information Corp System, device and method for identifying genuine and sham of a photograph of a social network site

Also Published As

Publication number Publication date
CN107292139A (en) 2017-10-24
CN107292140A (en) 2017-10-24

Similar Documents

Publication Publication Date Title
US11282003B2 (en) Validity determination of an event ticket and automatic population of admission information
US11620635B2 (en) Methods and systems for approving transactions
CN107749018B (en) Network accessible point of sale device instances
US11983718B2 (en) Systems and methods for performing secure commercial transactions
US11854090B1 (en) Augmented reality account statement
KR102123284B1 (en) Purchase and Order Application System for using a Point Score and Drive Method of the Same
US20150170309A1 (en) Visual Signature Recording for Verification Purposes
US11032423B2 (en) Simultaneous voice and data content driven commercial data platform
US20130198284A1 (en) OFFLINE vCARD
KR101657588B1 (en) System for Providing Product Dealing Information based on Product Image using Web and Method therefor
CN118069276A (en) Social software and method and device for using same
WO2017035125A1 (en) Social finance platform system and method
US20220261855A1 (en) License-based advertising service system
JP6799992B2 (en) Usage details / store information link device, program and method
US11238481B1 (en) Methods and systems for providing a best price guarantee
US11948133B2 (en) Systems and methods for use in transferring funds between payment accounts
WO2014007567A1 (en) Server providing on/offline trading service, terminal for product trading, and method for providing trading service thereby
KR101758712B1 (en) Method of managing receipt and apparatus for the same
WO2015084746A1 (en) Systems, methods, and devices for dynamic transaction and promotion processing
CN107958422A (en) A kind of social software and its attraction user, the method and device of the authentication image true and false
CN114902298A (en) Code generation and tracking for automatic data synchronization in a data management system
Hendriana et al. Design and Implementation of Online Fashion Store “Demi Outfits” Based on Android
KR101599582B1 (en) A server and a product trading terminal for providing trading service on the on/of line, and a method for providing trading service
KR102171291B1 (en) Spread sheet service for group chat room
KR101657582B1 (en) System for Extracting Hash Tag of Product Image using Web and Method therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination