As the basic identity verification step of business risk control, this process compares user names, ID numbers, mobile phone numbers, and bank card numbers against authoritative databases. This quickly identifies the risk of using someone else's identity.