Technology

Next-Generation Device intelligence and identity

LEVL provides the world’s first full-stack approach to device intelligence and identity. While most existing solutions focus on utilizing one or two layers of the communication stack, By using the full stack, LEVL quickly and reliably identifies devices on the network, understands their context, obtains insights on their activity and protects user privacy. It’s all done from within the network. Nothing needs to be installed on a user’s device. One of the key differentiators of this approach is the use of physical layer data, something that is unique to LEVL and offer numerous benefits.

PHYSICAL AND DIGITAL IDENTITy that is privacy-friendly

LEVL sheds light on a device’s true identity and purpose through physical and digital layer intelligence.

Physical layer intelligence can reveal information including device type, components, behaviors, and even unique identity. The physical attributes of every device –its hardware build — result in unique communication behaviors and characteristics that can be used to identify a device. The communication variances that result from the physical differences can be modeled to obtain intelligence on that device. The modeling is done using a set of characteristics that can be passively retrieved. Thanks to advancements in machine learning, AI and embedded software trends, LEVL has brought this technology to the commercial market.

Every device has a unique set of properties and anomalies when it transmits 

Combining many such properties yields intelligence on a device’s true identity and purpose

We model over 20 properties to achieve an accuracy better than existing human voice recognition technology

Using Deep Packet Inspection LEVL provides digital-layer intelligence on wireless devices and build a digital profile for every device. LEVL digital profiling technology inspects the communication headers in different layers of the stack to learn a device’s communication patterns such as services a device frequently uses, ports used, and how it communicates with the outside world. Digital layer data is combined with the physical layer for an optimal solution. This technology, however, does not inspect any user data in order to protect privacy.

Physical and Digital Identity Analysis  \that Delivers Unprecedented Visibility. 

the power of cloud and edge computing

The LEVL Wireless Intelligence Cloud and LEVL Plug-ins comprise the LEVL platform. Once connected to LEVL’s cloud, each wireless access point or hub collects intelligence on all connected devices.

The LEVL Plug-In, typically embedded on gateway such as a Wi-Fi access point, a router or an enterprise switch, extracts physical and digital intelligence. The Plug-ins do part of the pre-processing and are connected to LEVL’s Wireless Intelligence Cloud where the machine learning and device profiling technology run. The AI running in LEVL’s cloud provides wireless intelligence to all connected devices. This infrastructure ensures that all LEVL-enabled hubs are up-to-date with the latest firmware.

NO HARDWARE,
NO AGENTS,
SIMPLE

LEVL requires no hardware or agent on devices. Embedded software Plug-Ins reside on wireless access points or hubs that process device discovery, identification, and classification in connection with the Wireless Intelligence Cloud. When a wireless device is first provisioned or detected, the profiling process takes about one minute. The next time the device attempts to access a resource requiring authentication, the passive verification process takes only 1-2 seconds to complete.

LEVL’S SECOND FACTOR
of AUTHENTICATION

a privacy friendly alternative to the mac address

Due to recent developments by major tech companies to randomize MAC addresses, the networking industry must adapt to meet the changes. The LEVL-ID is a privacy friendly MAC address alternative for device identification. The LEVL-ID does not require modification or any access to the user device. Private user data is not required for this passive system and nothing resides on the user device. Most importantly, it can be configured to be network-specific and hence, cannot be mis-used by bad actors. Thus, the LEVL-ID constitutes the perfect alternative to the MAC address, without jeopardizing the user’s privacy, and remains constant even if the MAC address changes frequently.

LEVL ELIMINATES DOZENS OF WIRELESS DEVICE ATTACK OPPORTUNITIES

With the hardware authenticated in addition to digital credentials, LEVL eliminates dozens of types of cyberattacks. Below is a sample of the vulnerabilities that are eliminated with the employment of LEVL:

Physical layer attacks

  • Rogue devices
  • Wireless man-in-the-middle, relay and replay attacks 

Digital attacks

  • Credential theft via phishing
  • Device spoofing
  • Impersonation