Patent attributes
Examples in this application disclose data check computer-implemented methods, media, and systems. One example computer-implemented method includes retrieving, by a trusted execution environment (TEE), a check-triggering instruction from a server, where the check-triggering instruction is configured to trigger the TEE to perform a consistency check on basic data of a user to be identified, in response to the check-triggering instruction, retrieving, by the TEE, encrypted standard basic data of the user from a trusted institution, retrieving, by the TEE, encrypted basic data of the user from a first institution, retrieving, by the TEE, the basic data of the user by decrypting the encrypted basic data, performing, by the TEE, the consistency check on the basic data of the user based on the encrypted standard basic data to obtain a check result, and sending, from the TEE, the check result to a second institution.