18379867. DEVICE, METHOD AND COMPUTER READABLE MEDIUM FOR RESISTING DOWNGRADE ATTACKS simplified abstract (ARRIS Enterprises LLC)

From WikiPatents
Jump to navigation Jump to search

DEVICE, METHOD AND COMPUTER READABLE MEDIUM FOR RESISTING DOWNGRADE ATTACKS

Organization Name

ARRIS Enterprises LLC

Inventor(s)

Rui Chen of Shenzhen (CN)

Lijie Niu of Shenzhen (CN)

Linzhou Cai of Shenzhen (CN)

Li Wang of Shenzhen (CN)

DEVICE, METHOD AND COMPUTER READABLE MEDIUM FOR RESISTING DOWNGRADE ATTACKS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18379867 titled 'DEVICE, METHOD AND COMPUTER READABLE MEDIUM FOR RESISTING DOWNGRADE ATTACKS

The patent application describes a device, method, and computer-readable medium for resisting downgrade attacks in network security.

  • User equipment determines a security authentication type when connected to a network device for the first time.
  • If the security authentication type is WPA3, the only-WPA3 rule is applied.
  • The only-WPA3 rule allows the user equipment to use only WPA3 to access the network device, refusing other lower security authentication types.

Potential Applications: - Enhancing network security for user equipment connected to network devices. - Preventing downgrade attacks that compromise network security.

Problems Solved: - Protecting user equipment from downgrade attacks that exploit weaker security authentication types. - Ensuring secure access to network devices by enforcing the use of WPA3.

Benefits: - Improved network security for user equipment. - Mitigation of downgrade attacks that could compromise sensitive data.

Commercial Applications: Title: Enhanced Network Security Solution for User Equipment This technology can be utilized in industries where network security is crucial, such as finance, healthcare, and government sectors. It can be integrated into routers, access points, and other network devices to provide a higher level of security for user equipment.

Questions about the technology: 1. How does the only-WPA3 rule enhance network security?

  - The only-WPA3 rule ensures that user equipment can only use the most secure authentication type, WPA3, to access network devices, reducing the risk of downgrade attacks.

2. What are the potential implications of not implementing the only-WPA3 rule in network security?

  - Not implementing the only-WPA3 rule could leave user equipment vulnerable to downgrade attacks, potentially leading to unauthorized access to network devices and sensitive information.


Original Abstract Submitted

A device and method and computer readable medium for resisting downgrade attacks. User equipment includes a memory having instructions stored thereon and a processor configured to execute the instructions stored on the memory to cause the user equipment to perform the following operations: determining a security authentication type when the user equipment is connected to a network device for the first time; and in response to determining that the security authentication type when the user equipment is connected to the network device for the first time is WPA3, applying the only-WPA3 rule; where the only-WPA3 rule only allows the user equipment to use WPA3 to access the network device, and refuses the user equipment to use other security authentication types with lower security than WPA3 to access the network device.