How to protect user privacy information? See how big companies handle it!

How to protect user privacy information? See how big companies handle it!

Let’s summarize the practices and design points of major products in terms of “privacy protection”, so that there will be more entry points and reference objects when designing for user privacy information in the future.

We use a variety of apps every day, including financial, social, and e-commerce apps, and these apps store your important private information, such as login passwords, amount values, identity information, and so on.

We working people are sensitive to this private information, but we have no choice but to trust these apps.

Therefore, today we will summarize the practices and design points of major products in terms of "privacy protection", so that we will have more entry points and reference objects when designing for user privacy information in the future.

Password input protection

Passwords are the keys to log into various apps, and they are also the basis for protecting our information data. In terms of protection in this regard, various apps have come up with various tricks, both in terms of design techniques and system functions.

1. After iOS screen recording and screenshot: hide password

Thanks to iOS's consistent emphasis on user privacy, when filling in passwords on various APPs is monitored by screen recording and screenshot functions, Apple can also use its own technology to detect and keep it confidential.

The saved images and videos will automatically hide any traces of password entry, including encryption symbols and characters entered on the keyboard.

2. Bilibili: Creating an “anti-peeping” perception

When you enter your mobile phone number in the Bilibili app, the mascot above always keeps its eyes open, but when the cursor is positioned on the "password" or "verification code" input field, the mascot changes to "covering its eyes".

This use of surrounding elements to create the perception that "no one will see your password" is also a common practice among many APPs.

3. Bank APP: Custom keyboard

This is only available in specific types of products, such as banking, finance, and financial management apps.

In order to protect the security of user information, these products will customize and develop a set of mobile phone keyboards to ensure that the characters entered by the user are displayed randomly and irregularly each time.

Avoid others from remembering your click area and order, so as to obtain relevant information. But the corresponding implementation cost is not low~

Identity information shielding

1. Meituan: Automatically anonymous when giving negative reviews

For example, Meituan and Ele.me will automatically check the anonymous review option when users give low-score reviews to prevent users from being maliciously harassed by merchants.

However, this is only the apparent practice. I have always been xx about whether merchants are really unable to obtain user information.

2. Didi Hitch: Delayed release of negative reviews

In addition to automatic anonymous evaluations, Dida Carpool will delay the publication of negative reviews to protect users from malicious harassment from drivers through the time difference.

3. WeChat: Create a new pseudonym

When using WeChat to log in to other apps or websites, you can create an identity to log in. The new identity includes a new avatar and nickname, which can also be obtained randomly.

Avoid synchronizing your main social information with other platforms, especially when using Tencent products and in scenarios where you “don’t want to be known by WeChat friends.”

Protection of Amount Value

1. Wealth Management: Hidden Amount Text

When hiding the amount of money, Licaitong does not show only the encryption symbol (******) as in the traditional way, but changes the encryption characters into the text: "empty".

This concept of 'nothing' is more effective in terms of the perception of privacy protection than 'yes, but encrypted'.

2. Ping An One Wallet: Hide the amount when your hand covers the screen

The amount of your personal assets will not be displayed directly in the personal assets area. When you cover the screen with your hand, the system will predict that you only want to be visible secretly, and automatically display the amount of your assets. This privacy design that uses screen perception is also a highlight.

Screen Recording Processing

In addition to the above-mentioned hidden passwords of iOS, other apps also have corresponding design points.

1. Bank APP: Pop-up warning

For example, Bank of China or Industrial and Commercial Bank of China will force a pop-up window to remind users when they are asked to enter passwords through screen recording.

This is a relatively compromise approach, and serves as a security reminder. However, after the reminder, the user can still enter characters while recording the screen. Even if the password is encrypted, the characters entered on the keyboard are still recorded one by one.

2. Maimai: Black screen processing

Maimai directly turns the screen black to remind users to stop recording before they can enter the password normally, rather than asking users to enter the password in a dark environment.

I heard that IKEA previously hid not only the characters of the password but also the number of digits of the password when facing screen recording.

Screenshot processing

This is also the most common scenario in daily life, which can save all sensitive information on the screen as images. Therefore, for products with high security requirements, users' screenshots will be processed and warned.

1. Alipay and WeChat Wallet: Risk Warning

In Alipay and WeChat wallets, when taking a screenshot of the payment code, the user will be reminded of the risks of taking the screenshot.

2. Banking apps: screenshots prohibited

Some banking apps are stricter in this regard and directly prohibit users from taking screenshots.

3. QQ: Hide your name with one click

When taking QQ screenshots, you can block the user's QQ nickname with one click to avoid spreading your social information.

Multi-window leakage processing

When a phone opens multiple screen windows, the information leakage in the application is an easy-to-ignore place. Even if the content visibility in each application is not very strong, that small area still makes it easy for others to know what you are doing (especially when checking a certain aspect).

For this aspect of design, the processing of some large-scale APPs provides us with some directions and references, such as:

1. Alipay: Blurred interface content

Alipay and Ant Fortune blur the content on the screen when multiple windows are activated.

2. UC Browser: Black screen processing

UC Browser will directly display a black screen and won’t let you see anything.

3. Tide: Retaining Users

When the product has multiple windows, it prompts users not to close the app, which plays a certain role in product retention. Even when there is nothing in the product that can leak user privacy.

Conclusion

Well, the above are some of the major APPs’ protection scenarios and countermeasures for user privacy. I hope you can flexibly apply these techniques according to your actual situation.

<<:  How can a UI designer who has been working for one or two years and is still standing still advance in his studies?

>>:  In 2021, many websites will stop working on older versions of Android

Recommend

Explosive materials and landing pages for popular industries!

The more exaggerated, the more explosive? Totally...

In the dead of night, mites begin to date and mate on your face | Nature Trumpet

In the past two weeks, we have collected the foll...

A universal event planning solution

There is actually no shortcut to planning an even...

4 steps to explain the most comprehensive ideas for attracting new users!

Attracting new members to the community is a prob...

Warning? Three more good news about iPhone 13

The outline is becoming clearer and clearer. I pe...

Android collects nearly 10 times more user data than iOS, report says

Following the Android location tracking scandal, ...

Duang! A complete collection of self-study Android materials

[[128183]] Text/Tikitoo I have learned Android fo...

Live broadcast room operation, process and framework!

In 2020, the popularity of Douyin live streaming ...

If there are changes in this private part of the male body, it may be cancer!

When it comes to breast cancer, the first reactio...