World's First Full-Stack Device Identity

MAC ADDRESS RANDOMIZATION SOLUTION

PRivacy-Friendly and Easy to Deploy

LEVL provides the world’s first full-stack approach to device intelligence and identity, an alternative to the MAC address. While most existing solutions focus on utilizing one or two layers of the communication stack, LEVL uses the full stack to quickly and reliably identify devices on the network, understand their context, obtain insights on their activity and protect user privacy. It’s all done from within the network. Nothing needs to be installed on a user’s device. As a result, privacy is enhanced and deployment is significantly faster with far less complexity.

Device intelligence, its what we do!

Device intelligence is all about understanding the devices that are in your network. There are four basic components toe device intelligence as follows. First, is device identity, which is being able to reliably identify the same device each time it comes on the the network. Next is device context, which being able to discern the type, manufacturer, model and OS of a given device. After that is being able to assess if the device, given its type, is getting the right bandwidth and quality of service. We call that device experience. Finally is device behavior. Is the device behaving as expected because if not it may be compromised or spoofed.

PHYSICAL AND DIGITAL IDENTITy that is privacy-friendly

At LEVL, we take a novel approach to device identification. LEVL uses a full-stack approach, leveraging data from all 7 layers of the OSI model to create a LEVL-ID, a unique identifier for every device on the network. The LEVL-ID is created passively, it is not stored on the device and it is never transmitted over the air directly. As a result, it is highly effective in preserving consumer privacy while still identifying the device. LEVL-IDs are privacy friendly, easy to implement, and cost effective. Finally, LEVL-ID does not depend on legacy device identifiers such as the MAC address and remains persistent even if the MAC address changes frequently. 

Every device has a unique set of properties  when it transmits 

Combining many properties yields intelligence on a device’s true identity 

We model over 20 properties to achieve accuracy og over 99.5% 

a privacy-friendly alternative to the mac address

Due to recent developments by major tech companies to randomize MAC addresses, the networking industry must adapt to meet the changes. The LEVL-ID is a privacy friendly MAC address alternative for device identification. The LEVL-ID does not require modification or any access to the user device. Private user data is not required for this passive system and nothing resides on the user device. Most importantly, it can be configured to be network-specific and hence, cannot be mis-used by bad actors. Thus, the LEVL-ID constitutes the perfect alternative to the MAC address, without jeopardizing the user’s privacy, and remains constant even if the MAC address changes frequently.

the power of cloud and edge computing

The LEVL Wireless Intelligence Cloud and LEVL Plug-ins comprise the LEVL platform. Once connected to LEVL’s cloud, each wireless access point or hub collects transmit data on all connected devices.

The LEVL Plug-In, typically embedded on gateway such as a Wi-Fi access point, a router or an enterprise switch, extracts physical and digital intelligence. In larger networks, the plug-in can run on a network appliance or as a virtual machine on an existing edge compute resource. The Plug-ins do data pre-processing and are connected to LEVL’s Wireless Intelligence Cloud where the machine learning and device profiling technology run. The AI running in LEVL’s cloud provides wireless intelligence to all connected devices. This infrastructure ensures that all LEVL-enabled hubs are up-to-date with the latest firmware.

Device Intelligence Delivers Unprecedented Visibility

Using Deep Packet Inspection LEVL provides digital-layer intelligence on wireless devices and build a digital profile for every device. LEVL digital profiling technology inspects the communication headers in different layers of the stack to learn a device’s communication patterns such as services a device frequently uses, ports used, and how it communicates with the outside world. When it can be, digital layer data is combined with the physical layer for an optimal solution. This technology, however, does not inspect any user data in order to protect privacy.

NO HARDWARE, NO AGENTS, SIMPLE

LEVL requires no hardware or agent on devices. Embedded software Plug-Ins reside on wireless access points or hubs that process device discovery, identification, and classification in connection with the Wireless Intelligence Cloud. When a wireless device is first provisioned or detected, the profiling process takes just over 30 seconds. The next time the device attempts to access a resource requiring authentication, the passive verification process takes only 1-2 seconds to complete.

LEVL As A SECOND FACTOR of AUTHENTICATION for IOT

It is a challenge to do a second factor or authentication on headless devices and IoT devices. The LEVL-ID serves as an additional authentication by validating the physical hardware of the device after the validation of the digital identity.