HOW in the world are you doing this? The VERY NATURE of WPA3-PSK prevents multiple keys. How are you hacking this and I would imagine clients will not all ubiquitously support it?? More info is needed and honestly, Ruckus needs to explain themselves if they are BREAKING SECURITY protocols!!!!
1. looks like you're using an onboarding app of some kind here. This is really coy from Ruckus...not mentioning that in the press release trying to advance some revenue sales. Not a fan of withholding this important bit of info 2. Looks like you initially joining the client as a WPA2 client...then moving into this app...then re-associating as a WPA3 client probably getting around the first and only SAE PW attempt.
You call this "canadian patented magic"...I call it pulling the wool over customer's eyes!