| The rapid development of computer and network technologies enable humans to enter the information age, the exchange of information between people become easier and more frequent. However, when the companies enjoy the benefits of the network, they are also faced with all kinds of security problems, stealing each other’s secrets between competitors is not uncommon.Peripheral storage devices and printers are the main cause of the internal information leaks, but peripheral monitor and auditing technologies are very difficult and the usage of IP, the computer accounts to identify the user is lack of precision, authority and oneness. Based on the current situation, this article researches key technology of internal terminal’s security, given the peripheral monitor and audit model which is combined with USBKey technology, and then apply them to the internal terminal’s security management system, effective internal security issues about windows system.Based on the peripheral monitor and audit model, the paper designs two schemes, the first one is process auditing peripheral storage devices scheme based on USBKey and Windows message:this scheme can complete peripheral storage devices audit correctly and effectively,it can make up for the disadvantage of the inaccurate of registry change notifications and also make up for the shortage of the inefficiency of WMI;the second one is about printing monitor and audit which based on USBKey and print processor:it solves problem that traditional technologies were complex, inefficiency, unstable; and then for the difficulties in auditing the copies of print job, use the API hook technology to complete the function. Because USBKey possesses the globally unique identifier of the products, the two schemes bind USBKey with user to solve the problem that traditional technologies were not precise, authoritative and lack of oneness.At the end of this paper demonstrated functional testing and performance testing. To verify the function of peripheral audit, print control and audit can work well, and the internal terminal’s security management system can run stablely and efficiently. |