Editor's introduction: Both projects need to do the content of the real-name authentication section, and this task is also left to the author to complete. During the second technical category email list review, the boss made a complaint, and the author wrote this summary and reflection, telling What are the detours that the authors have taken, I category email list hope you can learn from the experience! 1. Background of the story That’s right, the clearing and settlement project in dystocia (which was introduced in the previous article, you can check my previous article if you are interested) will be launched soon. However,
I am also responsible for the real-name authentication requirement for a live body test halfway through. Liveness detection requires users to do real-name authentication, and category email list clearing and settlement projects to connect with third-party payment companies also need to do real-name authentication. I emo, these two real-name authentications have crashed? It really crashed, and it was also my rollover experience, and I took a lot of detours. During category email list the second technical review, the leader said, "This is the second time, why is it still designed like this?" The defense was broken, and my self-confidence suffered a blow. I summed up my experience and hereby share it. , which can be read as a story, or taken as a warning.
The story experience After receiving the demand for real-name authentication for live detection, I did a survey on the cloud capabilities and prices of major manufacturers category email list, got a general understanding, and started to make a plan, and started my own detour: 1. One of the detours Initially, I consulted a lot of APP design copywriting and design ideas, and finally I understood that in our business, the requirement for real-name authentication category email list clearing and settlement is to the wallet. Account-dimension subject authentication (transaction subject: individuals, enterprises) is originally two things, so it is done in separate processes, allowing users to trigger real-name authentication for live detection and real-name authentication for clearing and settlement, so different situations are differentiated. The operation process.