As the basic identity verification step of business risk control, the system verifies the consistency between a user's name, ID number, and mobile phone number by comparing them against an authoritative database. This quickly identifies the risk of using someone else's identity.