In step 402 of method 400, a device to be provisioned (hereinafter, “the device”) is connected to the network via a wireless or wired connection. One example of step 402 is connecting a wireless door lock associated with door 161 of
In step 404 of method 400, authentication data from the device is transferred to the DSDN system, where the authentication data is processed. Transferring authentication data may be automatically or manually transferring a strong authentication via a cert or may be accomplished by an automatic or manual process performed by the administrator of the DSDN, for example, relying on user name and password, MAC address, or some other mechanism known in the art. One example of step 304 is the device transmitting its cert. to the router which in turn forwards the cert to the user's service provider, where the cert is processed and the device is authenticated.
In step 406 of method 400, the user's service provider, a gateway, or some other DSDN capable device determines which limited access subnetwork the new device will exist in. One example of step 306 is DSDN capable router 106 or the user's service provider determining that a new door 161 associated door lock will exist within subnetwork 160.
In step 408 of method 400, the DSDN capable device dynamically provisions the device into the step 406-determined limited access subnetwork. One example of step 408 is DSDN capable router 106 associating door 161 associated door lock with subnetwork 160.