Detecting camera access breaches

user-607cde9d4c775e0497f57189(2020)

引用 2|浏览13
暂无评分
摘要
Examples disclosed herein relate to detecting camera access breaches by an application running on a computing device. The examples enable determining, by a computing device comprising a physical processor that implements machine readable instructions, that a type of camera access of a camera on a computing device is requested by an application running on the computing device, wherein the type of camera access comprises a photo, a video, a facial recognition, a bar code scanning, or object detection; determining, by the computing device and based on a set of camera access types associated with the application, whether the requested type of camera access is permitted; and responsive to determining that the requested type of camera access is not permitted, remediating the unpermitted camera access request by causing display, by the computing device, of an alert on the computing device, where the alert comprises information about an improper access of the camera by the application.
更多
查看译文
关键词
Object detection,Set (abstract data type),Code (cryptography),Facial recognition system,Computer hardware,Bar (music),Computer science
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要