In this pattern, a middle object, generally referred to as a proxy object, will be present between every transaction involving two objects
Examples:
Access Restriction (Internet): If you are connected to the Wi-Fi network in your company, you will ...