ABSTRACT

A technique for authenticating network users is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for authenticating network users.

The method may comprise receiving, from a client device, a request for connection to a network. The method may also comprise evaluating a security context associated with the requested connection. The method may further comprise assigning the client device one or more access privileges based at least in part on the evaluation of the security context.

Technique for authenticating network users
Technique for authenticating network users

Technique for authenticating network users

An Inventor: Dr. Tal Lavian

FIELD OF THE DISCLOSURE

The present disclosure relates generally to network security and, more particularly, to a technique for authenticating network users.

BACKGROUND OF THE DISCLOSURE

SUMMARY OF THE DISCLOSURE