摘要 |
Access from a first processing apparatus to an application running on a second processing apparatus is established by sending, on behalf of the first processing apparatus, a log-on request to the second processing apparatus via a first network. There is a response to the log-on request with a demand for authentication data being sent in reply to the demand. At least one of the demand and the authentication data are sent via a second network that differs from the first network. |