Solve the problem of whether the product is useful from the beginning of login

Source: Internet
Author: User
Tags error handling account security

Login?

Two input boxes with a button? What else can you do?

So let's see why we do it first.

As far as data is concerned, the flow of Web sites is still being brought by a large number of anonymous users. We cannot accurately identify successive requests from the same person based on any aspect of the request (IP address, user agent, etc.).

Unable to identify, nature can not classify and then transform mining, to obtain the value of the site.

The internet serves people, and to develop a truly exciting website, we have to touch the living people behind the browser.

Who are they, what do they want?

How do we serve them?

Here are 4 Typical user identification methods, and let's take a look at their pros and cons:

IP Address: IP address is the easiest information to get. But use it to identify a unique user will have a great disadvantage, pseudo-IP, proxy, dynamic IP, LAN share the same public network IP exports will interfere with the access to the IP address of the uniqueness and accuracy.

Ip+user Agent: Multiple information union determines user identity. For users, when using the same terminal to browse the site, the user agent information is relatively fixed, fixed operation of the broken, relatively fixed browser, this way can appropriately improve IP proxy, public IP, such as the user resolution, When the same can not avoid dynamic IP and VPN and other IP changes.

Cookie:cookie is a Web site in a small piece of text stored in the user's local terminal information, so that after the site read. Cookies can almost uniquely correspond to the user's access terminal, but unlike IP addresses, cookies need to be written to the access terminal, and if the user disables COOKIE,VFB, this user identification mechanism will fail, and when the user performs a cleaning cookie or reload system, Cookies can also be lost.

User id: The difference is that the binding is no longer the device but the user itself, with unique recognition.

At the same time, many websites write this user ID to the cookie so that the user can identify the user directly on the next visit and complete the function of "automatic login". The user ID can also concatenate the user's access record data and CRM and other background user data, which facilitates the subsequent correlation and analysis. (The above user identification method extracts from "The website Analysis actual combat")

You can also obtain a MAC address, the SIM card IMIS number (which is available on the mobile side), or as the identity of the user's unique identity.

Design ideas and processes:

Now everyone is saying "user-centric".

Users may feel better about the focus of the user-centric design than they used to, but putting them in the center of the development process may not bring them better products. What we want to understand is not the user, but the use.

Focus on what the user is doing at the moment, and how we can best support its completion.

So we have to consider how to support users to achieve each goal without interfering or interfering with them. At the same time, these completely different parts are condensed into the whole.

The following are the specific optimizations:

1, make the task more clear:

Login is the login input box and submit button, increase processing, so that its task more prominent, remove the interference of the graph, so that the process clear, the user can line thinking operation, user name "password" login coherent quick to complete the login.

The original "Forget the password, forget the account and remember Me" does not belong to the main task, where it is not important, it is important that we need to show "related tasks", so move to the side weakening performance.

Delete "Forget account" (Forget password can be retrieved, forget the account and can not be resolved, the existing line of processing is to jump to retrieve the password page, meaningless).

2, make the input faster and more efficient, improve ease of use

Guideline One: Efficacy

Minimize user input and operations:

When it clicks on the login button, to determine whether to log on locally, login to let it automatically login, not logged in, when the default focus on the input user name.

Automatic Association function:

To reduce the input of a password once in the registration panel:

General registration needs to fill in two times password, the data indicate that only need to do one time input.

According to research reports, users are often confused about whether nicknames can be used to log in. The best way is to register even when the nickname is removed, and take its @ before the character or mobile phone number as a temporary user nickname, and in the follow-up link to guide its replacement avatar and nickname.

Guideline Two: Support

The system should support a skilled user to use the system efficiently:

Additional support for shortcut keys:

tab and the previous key to support switching;

Enter and space bar support to submit;

The ESC key cancels the mask and the panel.

Guideline Three: Tolerance

People are going to make mistakes. It is inevitable that people will make mistakes in information processing. Mistakes are normal, but reducing errors should not be a human endeavour. A well-designed system should consider error and error handling as well.

Error-tolerant before and after space: the user in the PC input process, will naturally strip into the space bar, password and account input should be able to fault tolerance before and after space.

No longer check the password strength, simple password can also be passed. Similarly according to the research report, the user does not care the Video class website account password security.

Guideline IV: Environmental

The system should adapt to the real condition and the actual environment of its being used and operated. It is not the right clothes to look good and wear them.

3, optimize the experience of mobile equipment, for the future interoperability of the terminals to prepare

The rise of mobile devices, various data shows that the mobile screen is beyond the PC screen, but the end result will certainly not be a screen instead of another screen, but will be a multiple-screen interoperability, while using such a situation. When designing a Web page, you should consider that the response design comes from adapting to each terminal.

Mobile-side third-party logins are recommended for SSO logons:

SSO Advantage: Do not need to repeat the user name, password, only one step, directly click the authorization button to complete. Enhance the ease of operation and account security. See the Singing bar, 360 mobile phone browser and some other applications.

The same can be done on the Web page to log on to a third party application to automatically log on.

At this point, the interactive drawing work has been completed. Next is the visual classmate's follow-up, detailed process no longer tired to state.

Finally, the interactive work is done in a picture section:

PS: Product definition function, to solve the product is useful and valuable questions, interactive focus on easy-to-use problems, visual attention to make people want to use. Refactoring and development is to solve the problem can not be used, the same concern is not good, and the difference between the interaction between the design of the solution, and development from the technical solution.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.