Next-Generation Device intelligence and identity
LEVL is the first company in the world to take a full-stack approach to device intelligence and identity. While most existing solutions focus on utilizing one or two layers of the communication stack, LEVL believes the key to holistic device intelligence is analyzing all layers —a full-stack approach. With this technique, we can quickly and reliable identify devices on the network, understand their context and obtain insights on their activity. All from within the network, nothing need to be installed on the user device. One of the key differentiators of this approach is the use of physical layer data, something that is unique to LEVL and offer numerous benefits.
Combining PHYSICAL AND DIGITAL IDENTITy to deliver privacy-friendly solutions
LEVL uses both physical layer intelligence as well as digital layer intelligence to shed light on a device’s true identity and purpose.
Physical layer intelligence can provide a lot of device information including device type, components, behaviors, and even unique identity. This is accomplished just by observing waveforms and transmission characteristics of how devices communicate on the network. This technique relies on the fact that the physical attributes of every device (its hardware build) result in a unique communication behavior that can be modeled to obtain intelligence on that device. The modeling is done using a set of characteristics that can be passively retrieved. Thanks to advancements in machine learning, AI and recent embedded software trends , LEVL is able to bring this technology to the commercial market.
Every device has a unique set of properties and anomalies when it transmits
Combining many such properties yields intelligence on a device’s true identity and purpose
We model over 20 properties to achieve an accuracy better than existing human voice recognition technology
On the other hand, using Deep Packet Inspection LEVL is able to provide digital layer intelligence on wireless devices and build a digital profile for every device. This digital profiling technology inspects the communication headers in different layers of the stack to learn a device’s communication patterns such as services a device frequently uses, ports used by it, and how it communicates with the outside world to create a unique digital signature for every device. This technology, however, does not inspect the data transmitted in order to protect the privacy of users.
LEVL’s patented solution combines the physical layer intelligence with that of digital layers to provide unprecedented visibility which was not possible previously.
Utilizing the power of both cloud and edge computing
There are two primary components of the LEVL Platform, the LEVL Wireless Intelligence Cloud and LEVL Plug-ins. Once connected to LEVL’s cloud, each wireless access point or hub receives the capability to collect intelligence on all connected devices.
The LEVL Plug-In extracts the physical and digital intelligence. The Plug-In is typically embedded on gateway such as in an WiFi access point, a router or an enterprise switch. These Plug-ins do part of the pre-processing and are all connected to LEVL’s Wireless Intelligence Cloud which is where the machine learning core and the device profiling technology runs. Running an AI approach LEVL’s cloud is able to provide Wireless intelligence to all connected devices. This infrastructure also makes sure that all LEVL enabled hubs are up-to-date with the latest firmware updates.
LEVL requires no hardware or agent on devices. Embedded software is placed in the form of Plug-Ins only on wireless access points or hubs that process device discovery, identification, and classification in connection with the Wireless Intelligence Cloud. When a wireless device is first provisioned/detected, the profiling process can take about one minute. Once this process is completed, when the device attempts to access a resource requiring authentication, the verification process is a passive one and takes only 1-2 seconds to complete.
LEVL’S SECOND FACTOR
One of the by-products of LEVL’s full-stack approach is that it provides a second factor of authentication at the hardware level to complement digital credentials such as a username and password or a certificate exchange. But what is unique are two things: 1. The second-factor authentication is totally transparent to the user and, 2. This second factor is nearly impossible to spoof or to brute force.
In fact, this platform is the first-ever two-factor authentication (2FA) service for device-to-device communications.
lEVL-ID: a privacy friendly alternative to the mac address
As major tech companies promote the daily randomization of the MAC address, the networking industry requires a privacy friendly alternative to the MAC address for device identification. The LEVL-ID is created passively, without requiring modification or any access to the user device. It does not rely on user’s private data nor is it stored on the user device. Most importantly, it can be configured to be network-specific and hence, cannot be mis-used by bad actors. Thus, the LEVL-ID constitutes the perfect alternative to the MAC address, without jeopardizing the user’s privacy, and remains constant even if the MAC address changes frequently.
LEVL ELIMINATES DOZENS OF WIRELESS DEVICE ATTACK OPPORTUNITIES
With the hardware authenticated in addition to digital credentials, LEVL eliminates dozens of types of cyberattacks. Below is a sample of the vulnerabilities that are eliminated with the employment of LEVL:
including credential theft via Phishing, device spoofing, and impersonation are stopped with LEVL.
Physical layer attacks
including rogue devices, wireless man-in-the-middle, relay and replay attacks are not possible when LEVL authenticates the underlying hardware being utilized.
Component exploitations of Hardware / Firmware / APIs
These are the exploitation of vulnerabilities in the underlying components of the chipset. Many times these are outside of the control of the OEM. Many of these can be patched if OEMs are aware of the flaws, and even then the patching process usually takes months to complete. Many other exploits cannot be patched and vary in nature. LEVL’s second-factor authentication will stop many of these component exploitations.