The Identity Authentication Mechanism of Human Testimony Based on the Mobile APP

  • Congjun LiuEmail author
  • Longgen Sun
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1117)


The OCR technology is becoming more and more mature. Its application in the document recognition greatly improves the efficiency of the digitization of various kinds of the document information. In the field of the mobile APP applications, more and more developers are developing the applications. The mobile APP applications bring more convenience to users. However, in many practical applications, besides completing the information registration, the APPs or the WEB system also need the data collection and verification to verify the authenticity and validity of the data information. Based on the existing OCR identification technology, combined with the face recognition and other technologies, this paper compares the face photo information data on the identity card with the living face photos, and provides the customers with the identity authentication mechanism services based on the mobile APP.


Mobile APP OCR technology Human testimony Face recognition 


  1. 1.
    Yimin, T.: OCR-based Identity Card Recognition System. D. Huazhong University of Science and Technology (2014)Google Scholar
  2. 2.
    Yuxiu, S.: Research on the Business Card Recognition Method Based on the OCR Technology. D. Harbin University of Science and Technology (2015)Google Scholar
  3. 3.
    Ziyi, Y., Qingyong, Z., Xueqi, L.: A face detection method combining the improved AdaBoost and the skin model. J. Comput. Digit. Eng. 4, 743–749 (2018)Google Scholar
  4. 4.
    Li, J., Xu, T., Li, H.: Face recognition based on the improved LDP. J. Comput. Appl. Softw. 5, 148–150 (2014)Google Scholar
  5. 5.
    Hui, Z., Xin, L.: Single-sample face recognition algorithm based on the improved LBP. J. Comput. Appl. Softw. 12, 220–223 (2017)Google Scholar
  6. 6.
    Juan, T., Zhao, X.: Analysis and consideration of the MVC design mode based on J2EE. J. Comput. Modern. 10, 54–58 (2010)Google Scholar
  7. 7.
    Lei, G., Xing, S.: Methods and devices for configuring the timing tasks based on the Quartz framework P. Beijing Weiku Electronic Commerce Technology Co. Ltd.: CN101887381A (2010)Google Scholar
  8. 8.
    Xu, Z., Jiao, W.: RabbitMQ message confirmation mechanism optimization. J. Comput. Syst. Appl. 3, 252–257 (2018)Google Scholar
  9. 9.
    Fan, Z., Luo, F.: JWT authentication technology and its application in WEB. J. Digit. Technol. Appl. 2, 114 (2016)Google Scholar
  10. 10.
    Luyang, L., Bing, G.: Android app-based secure login authentication solution. J. Mod. Comput. (Prof. Ed.) 35, 9–12 (2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.School of Computer ScienceJiangsu University of Science and TechnologyZhenjiangChina

Personalised recommendations