PROTECTING AGAINST MALICIOUS ATTACKS IN IMAGES

Techniques and systems are provided for image processing. For instance, a process can include obtaining, from one or more image sensors, an image of an environment. The process can further include detecting a first visual code in the image; decoding the first visual code; verifying safety of content...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: KARMI, Gad, BAPST, Mark
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Techniques and systems are provided for image processing. For instance, a process can include obtaining, from one or more image sensors, an image of an environment. The process can further include detecting a first visual code in the image; decoding the first visual code; verifying safety of contents of the first visual code; determining that the contents of the first visual code contain a uniform resource locator (URL); and prefetching data linked by the URL based on verifying the safety of the contents of the first visual code.