Method, device, equipment and readable storage medium for identifying abnormal phone card
An identification method and phone card technology, applied in the field of communication, can solve problems such as inconsistencies in user identities, and achieve the effect of reducing user risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] When the user opens a card at the operator, as long as he has the identification information, the business hall can issue the card for the user and bind it with the user identity corresponding to the identification information. For example, user A can hold an ID card, go to the operator to open a card, and the obtained phone card is bound to the ID card information. In this process, user A can hold his own ID card to obtain a card bound with his own identity information. However, the user can also hold other people's ID cards. For example, user A can hold the ID card that user B picked up. Since the personnel in the business hall cannot accurately distinguish whether the ID card belongs to user A, it is possible to use B’s ID card to open the card, but the actual owner of the phone card is A, which will bind the phone card actual users pose a risk. In another application scenario, some agents who sell phone cards will also use their ID card information to open cards, a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


