Intermediary transaction SEO diagnosis Taobao guest Cloud host technology Hall
[Core Tip] How do you choose between Third-party registration and local registration? How to keep the third party registration only?
This article comes from the fresh hot Internet female players nothing to get one, the author through his own on the third party registration and local registration of the issue of the analysis, to share.
I have recently encountered a problem that I have not used as a problem, is the choice of Third-party registration and local registration. The reason why we don't think of it as a problem because as an ordinary user, the third party login/registration is simple and convenient, no matter how sometimes some rogue application of "rape" I wound micro bo or the leak point information just (more see OAuth's permissions and information worries), but to the convenience also endure. But this time it became a problem, is in the design of an application, big Boss said to remove the local register, leaving only the mouth of a third party, suddenly all of a sudden Meng, this is not the key to their own door to others, this is my own home! So I thought carefully ...
As far as I know now ordinary registration is divided into 4 kinds of cases, we are currently using the third, the following separately say their strengths and weaknesses.
The first: the most traditional way of registration, registration threshold is high, easy in the landing page on the loss of users
The second: Potentially very few apps use this, because there is no user's local ID left to track user behavior
Third: After the third party registers the system by default assigns to the user an ID, may the user be visible, may also not be visible
Fourth: After the third party registered users manually fill in an ID and can not be repeated (the most personal dislike of a way, feel like being cheated in to register, than direct registration is also trouble)
To say is, as long as through a third party login, on behalf of the user holding a key to the other people to enter my home, once the key was taken away, the user will be gone. Here are the things from the user, the local App, and the third party.
User's perspective
Third-party landing to facilitate the daily life of the user, the body is inseparable from the network of the Times, every day face different landing interface, can have a simple way of landing is very important. Third-party landing convenient and fast, and a lot of information can be public, and can be in a certain APP dynamic information synchronization to each SNS platform. So some lazy users may develop a "an account to go the river" in the heart.
But then again, whatever is handled in one way is bound to capsize in the gutter, for example, when your micro-Bo was sealed, your QQ number was stolen, infringed down the relevant App can not log in, register a new account, then you recorded on the network of life are back to zero. What are you going to do then?
Local client Perspective
For the local application is simply to simplify the login process, reduce the threshold of registration, access to a large quantity of new users. In the competition for users, to improve the user's conversion rate is to determine whether the siege of the important factors. The same thing has two sides, we use the way of third party landing, to some extent it is a behavior that relies on a third party to see a very passionate article about the use of Third-party logins with app apps, although some of them are extreme, but to some extent it is also true of app A wake-up check for designers or investors, and for the kind of direct removal of locally registered apps, you should think about the future development of your app. Moreover is the user ability to the third party login hesitation, is regarding the privacy the leakage, everybody's subconscious is does not want in the random one app to be able to leak oneself too much information, the following figure.
In summary, if only a third party login, then for the users who want to protect their privacy, it may be more easily lost.
Third party perspective
In this way, the third party account looks like a big boss, just give you open a mouth can let you live better, mouth A pinch, estimated that you are not very good, and can be very good continue to expand its own user base. I have not yet thought of this binding for these big Boss what harm, in this game to win and lose the number of users, the powerful third party seemingly always is the winner.
Future development: Creating a new way of landing, simpler, more authoritative, not dependent
So I started thinking, what kind of login mode is best for a new App. Before, if you could use each user as a unit, have a unique ID, fingerprint, ID number, etc. this is unique and authentic, so that the virtual social network is fully implemented on a very real basis, but this may require a large database and server support, and even involves a lot of political factors, Like the first OpenID, it also requires a user-relative acceptance process. The future of the world will be a photoelectric information transmission of the Internet era, how in this virtual world to achieve true credibility, will be the gradual completion and thinking of the problem.
So for now, what good ideas can we have? See the user mentioned that the first landing after the nine Sudoku to unlock the way, not to re-enter, but to change a behavior, this may be a good idea. Of course, we can innovate and expand in technology, such as fingerprints, pupil, face recognition, and so on, if you want a very safe account and password, it will be: password, iris, fingerprint (with body temperature) and so on multi-directional integration, and the film is the same as the safe. It sounds distant, but who knows, the internet era can change anything in a flash.
Recently saw a simple implementation: Email One-time login method, it is American programmer Ben Brown in July 2012 proposed. His approach is very simple, the user login, only display an Email address input box (below).
After the user enters the email address, the website sends an email to the address containing a login link. Users click on this link to prove that he/she is indeed the owner of the mailbox, the identity of the valid, so as to achieve login. (Flowchart below)
The login link is valid for a period of time, but it can be used for a long time by a Cookie. If the Cookie fails, another login link is issued to the user's mailbox again.
The advantages of Email one-time login
Because the entire certification process, through e-mail, complete "No password login", and the operation process is natural, easy to understand. More importantly, it uses the existing Email protocol and does not require new code to be deployed on the server side, with the best compatibility.
The disadvantage of Email one-time login
The main disadvantage is that it requires a user to check the mailbox, a little trouble, it is not suitable for users who can not open the e-mail, such as the Internet in a friend's home. Therefore, you must also deploy an alternate login method to use its web site.
In summary, the third party login thinking, the individual in view of the current situation, or very do not agree to only retain the third party registration behavior.
Original address: http://www.geekpark.net/read/view/173252