摘要 |
<p>The method involves implementing a non-authenticated network access (S3) and markings (M1,M2) are set for non-authenticated network access, and operating authentication by a user or an equipment over the non-authenticated network access (S7,S8). The authenticated user or equipment is assigned to the non-authenticated network access. The markings alter the network access as authenticated, if the authentication of the user or the equipment is successful.</p> |