18172669. DETECTION OF UNTRUSTED CONFIGURATOR simplified abstract (HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP)

From WikiPatents
Jump to navigation Jump to search

DETECTION OF UNTRUSTED CONFIGURATOR

Organization Name

HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP

Inventor(s)

Qin Wei of Beijing (CN)

Guangning Qin of Beijing (CN)

Zhiyuan Yao of Beijing (CN)

Lan Pang of Beijing (CN)

DETECTION OF UNTRUSTED CONFIGURATOR - A simplified explanation of the abstract

This abstract first appeared for US patent application 18172669 titled 'DETECTION OF UNTRUSTED CONFIGURATOR

The patent application focuses on the detection of an untrusted configurator in a network environment.

  • An access point (AP) receives enrollee authentication information from a network device and simulates an enrollee to broadcast a configuration request.
  • When an untrusted configurator responds to the configuration request, the AP identifies it as untrusted and transmits device information to the network device.
  • This process helps in detecting untrusted configurators in the network, preventing devices from connecting to potentially harmful networks.

Potential Applications:

  • Network security systems
  • IoT device provisioning
  • Wireless network management

Problems Solved:

  • Detection of untrusted configurators
  • Preventing devices from connecting to untrusted networks

Benefits:

  • Enhanced network security
  • Protection of devices from potential threats
  • Efficient management of network configurations

Commercial Applications:

  • Network security companies
  • IoT device manufacturers
  • Wireless network providers

Questions about the technology: 1. How does the system differentiate between trusted and untrusted configurators? 2. What measures are in place to ensure the accuracy of detecting untrusted configurators?

Frequently Updated Research: Research on improving the accuracy and efficiency of detecting untrusted configurators in network environments.


Original Abstract Submitted

Implementations of the present disclosure relate to detection of an untrusted configurator. In the implementations, an access point (AP) receives enrollee authentication information simulated by the network device from a network device. Then, the AP simulates an enrollee and broadcasts a configuration request including the enrollee authentication information. When a configurator responds to the configuration request, the AP identifies the configurator as an untrusted configurator, and then the AP transmits device information of the untrusted configurator to the network device. In this way, the untrusted configurator in the serving range can be detected, thereby avoiding the devices being provisioned to connect to untrusted networks.