730 Epoch-making Biometrics
If the Internet is compared to a battlefield, then Chen Yao and his team are on the road to war.
Leading the army to advance forward, but the more you go, the more difficult it will be.
Han Yuxin frowned and said, "Xinyu Software, the last large group is not yet covered."
Chen Yao nodded, just the middle-aged and elderly people were missing.
The middle-aged and elderly people, unlike the student group and office group, will not easily migrate once they get used to a certain software.
Habits are a good thing that allows people to operate easily without spending time studying.
Habits are also a bad thing. When habits become natural, they are unwilling to change, even if they are a good thing.
Xinyu Socialization, if you want to become a national-level application, you must cover the middle-aged and elderly people. After all, middle-aged and elderly people in our country are a huge group.
Many people didn’t understand why the shopping software Pindd became popular?
Compared with Taobao and Dong, it has no characteristics, so why can it grow under the nose of the overlord?
The reason is very simple. Pindd is to use WeChat to cover the middle-aged and elderly people that the shopping software has not yet been covered by.
For many middle-aged and elderly people, they can install any application, but WeChat is a must. The powerful traffic draw and the marketing strategy of Pindd, the software became popular.
"Senior Brother, do you have any solutions?" Han Yuxin looked at him expectantly.
At the beginning, he said he would first cover the student group and make one after another, and he did it.
He said he wanted to cover the office crowd, and now, he has done so.
It is indeed quite difficult to get the old man to speak with his heart, but Han Yuxin knew that this omnipotent senior brother must have a way.
Chen Yao tapped the desktop with his fingers and said, "I'll ask you, what functions do they care about most when using social software in the elderly?"
Han Yuxin pursed her lips and thought for a moment: "It must be two major functions, one is chatting and the other is payment."?"
It is unclear whether other elderly people are like this. Han Yuxin observed that the elderly around her were mainly these two major functions.
This is not to say that other functions are not important, but chat and money bags are the most important.
It doesn’t require those fancy functions, and it’s best to be simple. From this point of view, it’s easy for the elderly to satisfy, but because it’s easy for them to satisfy, new things are often difficult to attract them.
So in the next version of the software, you must chat and pay to make it easier.
"Senior brother, how do you do it?" Han Yuxin was confused again and knew young people very well, but the market for the elderly was too difficult to do, but they could not be missing.
Chen Yao asked back: "What do you think is the most trouble for the elderly to use home software?"
Han Yuxin blurted out: "Safety. While protecting them safely, some settings are often very cumbersome."
What to do if you forget your password? How to pass the verification code? And how to get those miscellaneous security settings?
Many older people can't do it well.
As for what to do, I didn't think about it for a while.
Before we knew it, the sun was setting. Chen Yao and Han Yuxin came to the cafeteria downstairs for dinner.
The legendary headquarters park is located by the sea and accommodates more than 20,000 employees. Whenever you eat, the cafeteria is particularly lively.
Different companies are divided into different areas. Chen Yao’s canteen is the software Internet. Those who eat here are people who are engaged in software development or related to software Internet.
He is usually easy-going and has no airs. The employees love him very much. After Chen Yao received the meal, he found a seat to sit down.
The software engineers around him are all very young, with an average age of about 25 years old.
During this period, everyone is busy with social software. As for what to do next, Chen Yao was having a meal and chatting with them.
At this moment, the phone vibrated, took out the phone and glanced at the screen. It was a message sent by my mother.
Mom: "My Xinyu account and password are lost, how can I find it?"
Now she is using WeChat and news to Chen Yaofa. Since her son developed a new social software, she has also begun to speak with her heart.
But somehow, I couldn't log in if I forgot my password.
Chen Yao was eating and responded to the message with his brain control.
"Just follow the prompts and reset your password."
Mom: "No, son, you are the boss of an Internet company. Wouldn't you just need to change it for me?"
Chen Yao: “…”
I really think that the boss of an Internet company can do whatever he wants, and the boss does not have permission to view the user's password.
Prince Dark Horse: "Call the customer service and I will talk to the customer service later and get it done for you."
Although it is not the best way, it is the only way to do it right now.
Older people often have treasures for passwords, security protection and other things.
Chen Yao thought for a while, or did he make a revolutionary verification method?
"I suddenly had an idea about the upgrade of Xinyu's next version?"
The engineers around him looked at him one after another: "Big Boss, do you have any ideas?"
Chen Yao typed five words on his mobile phone screen.
Brain wave recognition!
The engineers here took a look and knew what this was?
In order to solve security verification, scientists around the world have invented many biometric technologies.
For example, fingerprint.
However, fingerprints are not omnipotent. If your fingers are dirty, sweating, etc. will fail to recognize them.
Then, face recognition was invented.
According to the facial feature information of the face, it is stored digitally and then identified, but it is not absolutely safe.
Countless infrared rays are projected on the human face to form a 3D modeling technology, which can theoretically be cracked.
Another type is the sound lock. Everyone speaks differently. This recognition method can also be used for verification, but there are many disadvantages.
The recognition accuracy is low and is susceptible to sound interference from the surrounding environment.
Whether it is facial recognition, fingerprint recognition, or voice recognition, they all have one thing in common, and they are all exposed.
Once facial information, sound information, and fingerprint information are collected and illegally used by bad people, the consequences can be very serious.
Therefore, why these biometrics cannot completely replace passwords, many apps still require users to enter their passwords to log in.
However, brain wave verification is a revolutionary cryptographic technology!
Brain waves are a kind of thought. Information is stored in your own head and cannot be seen by others or cracked, allowing the software to accurately identify the owner's identity.
Brain wave recognition is an epoch-making biometric technology.
Han Yuxin asked: "Senior Brother, do you mean, in the next version, will we do brainwave recognition?"
Chapter completed!