PROTECTING AGAINST MALICIOUS ATTACKS IN IMAGES
Techniques and systems are provided for image processing. For instance, a process can include obtaining, from one or more image sensors, an image of an environment. The process can further include detecting a first visual code in the image; decoding the first visual code; verifying safety of content...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Techniques and systems are provided for image processing. For instance, a process can include obtaining, from one or more image sensors, an image of an environment. The process can further include detecting a first visual code in the image; decoding the first visual code; verifying safety of contents of the first visual code; determining that the contents of the first visual code contain a uniform resource locator (URL); and prefetching data linked by the URL based on verifying the safety of the contents of the first visual code. |
---|