Is it safe for the platform to use manual real name authentication?

Updated on technology 2024-03-04
14 answers
  1. Anonymous users2024-02-06

    First of all, this method is relatively safe, and secondly, this method is more convenient for merchants, so let's talk about some personal understanding.

    1. It is because the traditional manual real-name authentication method has been very common, and everyone has long been accustomed to it, but if it is not necessary, many users are unwilling to carry out real-name authentication, which will cause many platforms to lose a lot of real customers in vain. At the same time, this method has a long waiting time, the user experience is very bad, and it is easy to lose customers.

    2. Some people think that there is a risk, that is because users and even the platform do not know that there is such a certification platform that can be directly docked, generally this platform is directly connected to the public security or UnionPay database, authenticates user information, and returns query results in real time, in this way, users do not need to upload positive and negative ID photos or hold ID cards**, as long as they enter relevant information, so they do not have to worry about personal information being leaked, and the platform also saves the tedious manual review procedure, and the efficiency can be greatly improved.

    3. Looking at the problem of certification cost, the traditional manual certification method requires a lot of time and labor costs for manual review, and the accuracy of the audit cannot be guaranteed. If you use the certification platform, you don't have to worry about this kind of labor cost and error rate, and you will be charged according to the number of times, and the larger the number, the more advantageous.

  2. Anonymous users2024-02-05

    Personally, I think that the traditional real-name authentication method is not very secure, after all, there will still be some deviations in judging the authenticity of the user's identity with the human eye, and the intelligent real-name authentication scheme is more secure. For example, the Yunmai real-name authentication solution integrates the mature OCR recognition technology with the emerging face recognition technology to truly achieve "real-name real-name verification", and the solution can be applied to the identity real-name authentication interface and management in the fields of finance, public security, border inspection, aerospace, electric power, factories, education and many enterprises and institutions.

  3. Anonymous users2024-02-04

    It is really a fraud to check an electronic invoice and enter an ID number, and it is really a robber logic to only need to enter the mobile phone number, and it is necessary for the relevant state departments to intervene!

  4. Anonymous users2024-02-03

    Generally speaking, real and effective real-name authentication requires the provision of valid identity documents (such as Zheng Yun: ID card, passport, military ID, etc.) and corresponding identity information (such as name, gender, date of birth, address, etc.), and confirm the authenticity and validity of the identity through certain authentication procedures.

  5. Anonymous users2024-02-02

    There are risks. On the one hand, the Internet real-name system can become an "iron broom" to sweep away bad information, and on the other hand, it will also make various Internet platforms become "fat" in the eyes of hackers, increasing the risk of leakage of netizens' personal information.

    According to March 2017, 360 made up the day.

    According to the "2016 ** Personal Information Leakage Situation Analysis Report" released by the corresponding platform of the vulnerability, some ** vulnerabilities in 2016 will lead to the leakage of real-name information, and the ** vulnerabilities will leak behavioral information, and the number of possible leaks is as high as 100 million and 100 million.

    According to industry insiders, hackers often get users' registration information on Internet platforms and sell them to criminals through the method of "scanning and credential stuffing", and many platforms still lack access to this kind of "credential stuffing attack".

    effective defenses.

  6. Anonymous users2024-02-01

    Legal Analysis: Not Safe. The Cyberspace Administration of China (CAC) promulgated the "Provisions on the Administration of Mobile Internet Application Information Services" to strengthen the management of mobile Internet application apps.

    The new policy divides the online real-name system into two levels, requiring app providers to implement real-name systems for registered users. Require app stores to review the real-name information of app providers on the shelves. When using the APP, the user can be anonymous in the foreground, and the background authentication can be carried out through the ** number, ID card or other real-name content, such as WeChat, Weibo authentication (because these two platforms have implemented the real-name envy system) and so on.

    Legal basis: Criminal Law of the People's Republic of China

    Article 266 Whoever defrauds public or private property and the amount is relatively large is to be sentenced to up to three years imprisonment, short-term detention or controlled release, and/or where the amount of the fine is huge or there are other serious circumstances, a sentence of between three and ten years imprisonment is to be given, and where the amount of the fine is especially huge or there are other especially serious circumstances, a sentence of not less than ten years imprisonment or life imprisonment and a concurrent fine or confiscation of property is to be given. Where this Law provides otherwise, follow those provisions.

    Article 192:Where fraudulent methods are used to illegally raise funds for the purpose of illegal possession, and the amount is relatively large, a sentence of between three and seven years imprisonment is to be given, and where the amount is huge or there are other serious circumstances, a sentence of seven or more years imprisonment or life imprisonment is to be given, and a concurrent fine or confiscation of property.

    Where a unit commits the crime in the preceding paragraph, the unit is to be fined, and the directly responsible managers and other directly responsible personnel are to be punished in accordance with the provisions of the preceding paragraph.

    Article 266:Where public or private property is defrauded and the amount is relatively large, a sentence of up to three years imprisonment, short-term detention or controlled release is to be given, and/or a fine; where the amount is huge or there are other serious circumstances, a sentence of between 3 and 10 years imprisonment and a concurrent fine is to be given; where the amount is especially huge or there are other especially serious circumstances, a sentence of 10 or more years imprisonment or indefinite imprisonment is to be given, and a concurrent fine or confiscation of property. Where this Law provides otherwise, follow those provisions.

  7. Anonymous users2024-01-31

    Brand model: Huawei P50

    System: HarmonyOS 3

    Real-name authentication is not secure and has certain risks.

    The risks of real-name authentication mainly include two aspects: one is the possibility of leaking personal information; On the other hand, if you encounter a black-hearted platform, Qing Zhuheng may also use illegal means to steal personal property.

    There are generally two authentication methods for real-name authentication: bank card authentication and reputation verification. Among them, bank card authentication not only plays the role of "real name", but also the basis for users to withdraw cash. There are also some ** who only classify ID card authentication as real-name authentication.

    Real-name authentication is a kind of verification and review of the authenticity of user information, which helps to establish and improve a reliable Internet credit foundation.

  8. Anonymous users2024-01-30

    As of July 6, 2020, there are certain risks associated with online real-name authentication.

    On the one hand, it is possible to leak one's personal information, and on the other hand, if you encounter a black-hearted platform, you may also take illegal means to steal personal property. In today's society, whether it is the Internet or outside the Internet, real-name authentication has become a necessary requirement for travel services.

    In addition to the risk of personal information leakage, real-name information verification will also bring you some benefits, such as taking the train to buy a ticket, and if you accidentally lose the ticket, you can also re-apply for it through the real-name information.

  9. Anonymous users2024-01-29

    There are risks.

    According to the "2016 ** Leakage of Personal Information Situation Analysis Report" released by the corresponding platform of 360 mending the sky vulnerability in March 2017, some ** vulnerabilities in 2016 will lead to the leakage of real-name information, and the ** vulnerabilities will leak behavior information, and the number of possible leaks is as high as 100 million and 100 million.

    According to industry insiders, hackers often obtain users' registration information on Internet platforms and sell them to criminals through the method of "credential stuffing", and many platforms still lack effective defense measures against this "credential stuffing attack".

  10. Anonymous users2024-01-28

    Now online shopping is required to real-name authentication, even if there is a risk, real-name authentication must be required, otherwise how to shop, real-name authentication is still possible, there have been cases before they have leaked user personal information, but it is also a very few, not necessarily you, now don't say that shopping requires real-name authentication, ** or something is real-name authentication.

  11. Anonymous users2024-01-27

    Now, even if you don't do any online tasks, isn't it risky? Now everything is connected, many people around me only use mobile phone cards, online shopping, don't do any game projects, etc., and don't often have ads ** come in? There is nothing that people don't know about your property status and marital status.

    Especially the debtors, the debt collectors have found out all your circumstances clearly.

  12. Anonymous users2024-01-26

    On the one hand, it is possible to leak one's personal information, and on the other hand, if you encounter a shady platform, you may also use illegal means to steal personal property.

  13. Anonymous users2024-01-25

    It is inevitable that there are risks because there are too many online scams nowadays. Sometimes we have to enter our ID! So be cautious and protect your property.

  14. Anonymous users2024-01-24

    First, open the browser to enter the page of the Penguin, enter the background of the Penguin, click on the account settings on the left, and you can perform real-name authentication here and modify the information.

Related questions