Does the IOT card need a real name?

IOT card needs a real name.

1. Why does the Internet of Things card need a real name?

Due to the low market threshold of IOT cards, agents of all sizes can calculate in units of "10,000". In order to attract individual users, some personal agents launch so-called unlimited traffic. If these traffic cards are not real names, they are easy to be used by criminals to do illegal things, which intensifies the chaos in the market and increases the difficulty of law enforcement. The particularity of not requiring real-name authentication makes IOT card a new tool for online fraud.

Second, how to name the Internet of Things card?

IOT card needs a real-name registration system, but it is the real name of the enterprise. Unlike ordinary calling cards, it does not require the registration of actual users. (20 19.2 amended one article, requiring that the real-name manager of the company's IOT card must be registered when the company name is used to handle the IOT card). If the IOT card is registered with the enterprise name, it must have the information of the user and the person in charge. If it is for personal use, the IOT card should have the main information organically, which is convenient for finding specific users. At present, there are many situations in which individuals use IOT cards, such as smart watches, portable wifi and other devices, all need real-name authentication, and there is no uniform standard for the real name of personal cards, such as uploading ID card information, uploading photos of hand-held ID cards, face recognition, etc., subject to the agent.

3. Can real-name authentication be revoked?

If the Internet of Things card is not used, it will automatically enter the account cancellation cycle, with a cycle of 2 months. After the account is cancelled, the IoT card cannot be operated, and the authenticated real-name information cannot be deleted.

Iv. IOT card operators have two handling methods:

Method 1: through the service provider (agent), you need the relevant information of the enterprise, authorization certificate and some equipment information.

Method 2: Handling through the business hall or account manager requires relevant information and vouchers of the enterprise, which is suitable for enterprises or groups with large purchases.

Legal basis:

According to the Regulations on Registration of Real Identity Information of Telephone Users in People's Republic of China (PRC) issued by the Ministry of Industry and Information Technology (Order No.25):

Article 1 These Provisions are formulated in accordance with the Decision of the Standing Committee of the National People's Congress on Strengthening the Protection of Network Information and the Regulations of People's Republic of China (PRC) Telecom in order to standardize the registration of telephone users' true identity information, safeguard the legitimate rights and interests of telephone users and telecom operators, safeguard the security of network information and promote the healthy development of the telecom industry.

Article 2 These Provisions shall apply to the registration of true identity information of telephone users in People's Republic of China (PRC).

Article 3 The registration of telephone users' real identity information mentioned in these Provisions refers to the activities of telecom operators to handle the procedures of accessing the network for users, such as fixed telephones and mobile phones (including wireless network cards, the same below), and truthfully register the real identity information provided by users when signing agreements with users or confirming the provision of services.

The term "network access" as mentioned in these Provisions refers to the services such as fixed telephone installation, transfer and transfer, mobile phone account opening and transfer.