Device Intelligence
so what is device intelligence?
Device intelligence is all about understanding the devices that are on your network. Network operators use that information to troubleshoot and optimize the network. They use it to recognize returning devices for an easier on boarding or to provide features such as parental controls. There are many other uses as well, such as provisioning tech support or deciding when older devices are no longer supported. There are four basic components to device intelligence: Device Identity, Device Context, Device Experience and Device Behavior.

a quick overview of device intelligence
A Closer Look at Key Capabilities
Device Identity is the fundamental building block of our system. Historically device identity was determined using the device MAC address. However recent changes in user privacy techniques are rendering it useless. LEVL identifies devices by how they “communicate and behave” on the network. We create a device identity in 30 seconds and can then identify the same device in about 2 seconds.

Device Context tells us what type of device is on the network. Is it a phone or laptop? Who makes it? what is the model type and operating system version. Coupling this with device identity allows network operators to assess what types of devices are on the network. This in turn enables more accurate network planning and deployment of support resources. You can learn more about device context here.

Device Experience relates to the quality of service (QOS) the device is getting on the network. By knowing the device type you can assess if there is enough bandwidth for the device. Different device types have different needs from the network. We can assess the device experience once we know the device type.

Device Behavior is driven by device type as well. By assessing the actual behavior against the known device type, LEVL can identify compromised devices and devices that are being spoofed by something else.

user PRIVACY BY DESIGN
One of the key features of LEVL’s device intelligence solution is that it is strictly based within the network. The LEVL-ID is derived and stored within the network There is no encrypted passphrase or number on the device to be compromised. There is nothing secret that needs to be transmitted over the air. The solution only looks at network management traffic and no personal user information is ever used or stored. The LEVL-ID for a device is network specific and therefore what works on one network, is not transferrable to another network. Finally, the device intelligence that is derived and stored is in the hand of network operators, not app makers that only make money by selling data.
Find your answer to Device Identity & MAC randomization issues
LEVL can help you maintain and enhance network services while making it easier to maintain user privacy. Reach out to learn more.