Unlock instant, AI-driven research and patent intelligence for your innovation.

Model training method and device, electronic equipment and storage medium

A technology of model training and electronic equipment, applied in the field of security, can solve problems such as inability to simulate attack scenarios

Pending Publication Date: 2021-03-09
北京知道未来信息技术有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the current testing tools can only perform brute-force cracking tests based on common weak passwords (i.e. passwords with low security levels), or combine common weak passwords with users' personal information to randomly generate new passwords
The passwords generated by this method cannot combine social engineering information well, so the current testing tools cannot simulate real attack scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Model training method and device, electronic equipment and storage medium
  • Model training method and device, electronic equipment and storage medium
  • Model training method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0039] Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a model training method and device, electronic equipment and a storage medium; the electronic equipment inputs a large number of first training samples into a to-be-trained password model, takes a weak password as supervision, trains the to-be-trained password model for information mining, and obtains a pre-trained password model. Since the pre-training model is obtained by training based on samples containing social engineering, the pre-training model can be used for predicting possible passwords of the to-be-tested user according to social engineering information ofthe to-be-tested user.

Description

technical field [0001] The present application relates to the security field, and in particular, relates to a model training method, device, electronic equipment, and storage medium. Background technique [0002] With the development and popularization of the Internet, information security becomes more and more important. Therefore, it is necessary to test the password strength of the existing system. [0003] However, the current testing tools can only perform brute force cracking tests based on common weak passwords (that is, passwords with low security levels), or combine common weak passwords with users' personal information to randomly generate new passwords. The passwords generated by this method cannot combine social engineering information well, so the current testing tools cannot simulate real attack scenarios. Contents of the invention [0004] In order to overcome at least one deficiency in the prior art, in the first aspect, the embodiment of the present appli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/46G06K9/62
CPCG06F21/46G06F18/28G06F18/214
Inventor 不公告发明人
Owner 北京知道未来信息技术有限公司