摘要 |
<p>The description is of a procedure that allows temporary secure access to a communication network. The network has a number of network connection ports. Certain of these ports are termed confidential, that is, their access is controlled by the network operator, in contrast to the other connection ports access to which is free. The access procedure claims is based on the provision of two distinct services accessible via tunnels that are, advantageously, digital. The first service is accessible only from the confidential connection ports and only allows a connection credit to be obtained. The second service is accessible from all connection ports, only by means of the connection credit issued by the first service.</p> |