The broadband telephony interface is provisioned by receiving information authenticating
a provisioning server, establishing a communication channel between the user and
the provisioning server over which is transmitted authorization information from
the user to the provisioning server, and encrypting and transmitting a cryptographic
key associated with the user to the provisioning server. The cryptographic key
can be a symmetric key or a public key corresponding to a private key stored in
the broadband telephony interface. The cryptographic key can be utilized to generate
other keys which are utilized to secure communication channels for the telephony
service. The broadband telephony interface advantageously can be implemented as
untrusted hardware or software that is installed by a customer.