Logo
blank Skip to main content

The task was to provide blocking of user access to the devices which are connected via the external USB ports.

It is very popular task for Corporate Security software. Solutions variates much depending on the range of supported (blocked) USB devices, options for customizing the level of access.

In our solution rules of blocking should be user, device type, device and manufacturer specific.

 

Initial conditions

We will be able to define the user context by setting filters on devices for example when a device is opened. USB-port is a bus so different functional devices appear on it. As the filters we must use any properties of USB controller which administrator can browse in the Device Manager such as โ€œDevice Instance Idโ€, โ€œHardware Idsโ€, โ€œMatching Device Idโ€ etc.

Problems with USB-Device Blocking

The main problem is user-specific device blocking (device should work for user1 but not for user2). As it was mentioned above USB is a bus therefore we should expect any devices which functionality should be blocked.

The analysis of operations of input/output for USB device does not guarantee that it will be possible to detect user context in application โ€“ device interaction. Therefore it is impossible to define the user context by general USB-bus filter.

Moreover the service for access to cameras and scanners appears in Windows XP. These devices are also connected to USB, and the context for them is detected as system service (SYSTEM registration record) from filter driver. In this case we have to detect logouted user and user context of application that uses that device.

Solution

If we need to block devices which provide functionality on USB we have to use filters for devices that are higher in the stack of devices โ€“ exactly they are functional. I.e. it is possible to find devices which were created on the USB bus in the tree of devices (DeviceTree) and put filters on them also to block access in accordance with the rules.

The most of connected devices will have the context of user working with this device. There are devices which the system works directly with – such as keyboard, mouse and some others. Such devices will be the exceptions.

If the access to the devices is forbidden for the system, than the most of devices can work incorrectly because of failed initialization. For example, mass-storage will not be connected to the system because it will not be possible to open it. We will be able to detect mass-storage connected to USB bus by setting the filters of the file systems.

Result

Using the described approach weโ€™ve blocked the access to the most of functional devices where it is possible to detect user context. Because of initially blocking task was formulated as user specific itโ€™s impossible to develop fully universal driver for the devices of all of types.

We detect user context in different ways for different types of USB devices. For example file system filters were used for mass-storages as far as itโ€™s easy to define the user context at this level. For other devices (such as USB audio columns) the filters of functional devices in the Device Tree were created. For the devices of ยซscanners and camerasยป type we had to find higher level solution. Support of devices of this type is also present however itโ€™s put in a separate interface for the comfortable work with such devices by means of the system tools.

Learn more about Corporate Security tasks that we solve at Corporate Security System Components page

Have a question?

Ask our expert!

Tell us about
your project

...And our team will:

  • Process your request within 1-2 business days.
  • Get back to you with an offer based on your project's scope and requirements.
  • Set a call to discuss your future project in detail and finalize the offer.
  • Sign a contract with you to start working on your project.

Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.