Real-name authentication is not only conducive to the construction of a trusted network environment, but also can prove that "you are you" through network trusted identity authentication services in practical use functions, such as online lobby-government function, which makes data run more and users run less errands.