How to certify underage health treasure?

Legal analysis:

User authentication levels are divided into first-level authentication, second-level authentication, third-level authentication and fourth-level authentication.

First-level authentication: use account number/login name; Secondary authentication: account number/login name+mobile phone number; Three-level authentication: ID card authentication, Alipay authentication and WeChat registration. You can also use UnionPay authentication or social security authentication to improve the account on the basis of the first three authentication methods. Level 4 authentication: face recognition.

Legal basis:

people's republic of china network security law

Article 2 This Law is applicable to the construction, operation, maintenance and use of networks in People's Republic of China (PRC), as well as the supervision and management of network security.

Article 3 The State adheres to the principle of paying equal attention to network security and informatization development, and follows the principles of active utilization, scientific development, management according to law and ensuring security, promoting the construction and interconnection of network infrastructure, encouraging the innovation and application of network technology, supporting the training of network security personnel, establishing and improving the network security guarantee system and improving the network security protection capability.