Security in the virtual world of technology at this very necessary considering the number of people who are familiar with these technologies, so many kecederungan want to know or even steal something that is very confidential or protected by the copyright laws for profit individuals with ways to krek or better known as “hackers”.

To anticipate these possibilities need any way that hackers can not be opened or stolen documents
confidential and only certain people can access. Many technologies have been developed to address database security, but, if passwords or passwords to remember atau harus other key must be hidden and probably will not forget the crack bigger, why not use something inherent in our own bodies without having to remember to remember.

To overcome the above method is developed biometric technology that has outstanding properties can not be eliminated, forgotten or transferred from one person to another, is also difficult to be imitated or forged.

Biometric technology is developed because it can fulfill two functions namely identification and verification, besides it has the characteristics such as biometrics, can not be lost, can not be forgotten and not easily falsified because inherent in human existence, where each other will not be the same, then uniqueness would be more guaranteed.

Biometric technology offers the biological authentication allows the system to recognize users more precisely. There are several methods including: a fingerprint scanning, retinal scanning, and DNA scanning.Two last method is still in its early stages of research, while fingerprint scanning is now widely used and is used in conjunction with a smartcard in the authentication process. In North America, a man named E. Henry in the year 1901 has been successful prior to use fingerprints to identify the dismissal of workers to cope with the double remuneration.

The use of fingerprint biometrics using New Generation Matching technology (NGM) for fingerprint management seeking the order list, has been applied at some airports for the waiting list. NGM is a fully operational technology, is a result of progress fingerprints, NGM allows for fingerprint processing at very high speeds. It only requires two individual fingerprints (the general index) to process a search among the millions of people. Achievement and ability with a perfect fit for the management of waiting lists.
In the implementation of the security of a fingerprint database of all data from every user who has access to a database maintained and purified in the database and the computer.
For example, following the implementation of fingerprint in the database are described from the quote the results of research “PerlMonks” which has a good heart to be able to access the source code of this program, as stated by PerlMonk in writing as follows: “This program is divided-distributed in the hope that it will be useful” , is as follows;

#!/usr/bin/perl -w
#$Header: sunfingerprint,v0.9 2000/12 afb$
#$! sunfingerprint: checks file list against Suns md5 database
# reads input file/stdin, of the format:
# /usr/bin/ls
# /usr/bin/cat
# that is, one file per line, md5's the files and fetches the results of
# a search against Sun's md5 executable db.
# Relies on some formatting of Sun's results page, which may vary someday.
# Always tests the md5 executable, also.
# fixed 20/0 matches oops - multiple matches appear for same exe in multiple
# Sol versions
# added -l libs flag so you can check lib files (not executables)

require LWP::UserAgent;
use Getopt::Std;
use strict;

my $debug = 0;
my $md5 = "/usr2/local/bin/md5­";
my $request;
my $output_all = 0;
my $errors_only = 0;
my $un_html = 1;
# Sun's fingerprint site
my $request_http = "http://sunsolve.Sun­.COM/pub-cgi/fileFin­";
my $Usage = "Usage: $0 [-d X|-l|-e|-h|-o X] file_list
file_list: a text file w/ full path names for the files to be viewed
use - to use stdin, e.g.: find /bin -print | $0
-d X debug level X
-h   leave html tags in output
-e   errors only
-l   libs, ignore executable status
-o X output level X (0 matches only, 1 Sun results,
2 full text, 3 full html page)

my %opts;
# must have a file list
die "$Usage" unless @ARGV;
getopts('lho:d:e',\%­opts) or die "$Usage";
$debug = $opts{d} ? $opts{d} : 0;
$errors_only = 1 if $opts{e};
$un_html = 0 if $opts{h};
$output_all = $opts{o} ? $opts{o} : 0;
$output_all = 0 if $errors_only;

my $mdlist;
my %mdlist;
my %matches;
my $mdhash;

# read input, check file's existence/executable
while (<>) {
next unless /^\s+\//;
$mdlist{$_} = "Not Found!";
if ( -s $_ ) {
$mdlist .= "$_ " ;
$mdlist{$_} = "Found";
if ( ! -x $_ ) {
$mdlist{$_} .= ", Not Executable" unless $opts{l};
}    # if ! -x
}      # if -s
}        # while <>

# add md5 exe to list
$mdlist .= "$md5";
# ugly hack
$mdlist{$md5} = "Found";

# md5 the files
open(MD5, "$md5 $mdlist | ") or die "can't open md5 $md5: $!";
while (<MD5>) {
$mdhash .= "$_";
close MD5;

# fetch the cgi results from sun
my $ua = LWP::UserAgent->new;
print STDERR "POSTing $mdhash to $request_http\n" if $debug > 20;
if ( $mdhash ) {
#$request = new HTTP::Request POST => $request_http;
$request = HTTP::Request->new('­POST', $request_http);
} else {
die "$Usage";

print STDERR "Request: ", $request->content, "\n" if $debug > 20;
my $response = $ua->request($reques­t); #  actually fetch the doc

if ( $response->is_succes­s ) {
# split up the html return and process the lines between the
# "Results ..." line and the end of the list </dl>
my $pr = 0;
my $file_path;
print STDERR "Success\n" if $debug > 10;
foreach ( split(/\n/, $response->content) ) {
next if /^\s*$/;
if ( $pr ) {
last if /<\/DL>/;
s/<[ =#\/\w]+>//g if $un_html;
# line w/ sun's response:
# 36e7b0c2c6b2b391722c­2471688a060b - (/usr/bin/ls) - 1 match(es)
if ( /match/ ) {
print STDERR "match: $_\n" if $debug > 2;
# get file name and matches
/\((\S+)\) - (.*)/;
$file_path = $1;
# add Sun's response
$mdlist{$file_path} .= ", $2 w/ Sun";
$matches{$file_path} = "$_\n" if  $output_all;
} else {
$matches{$file_path} .= "$_\n" if  $output_all > 1 and $file_path;
}           # if pr
# start printing
$pr++ if /Results of Last Search/i;
}             # foreach content

# output the final data, input files and any results
if ( $output_all != 3 ) {
foreach my $file ( sort keys %mdlist ) {
if ( $errors_only ) {
$_ = $mdlist{$file};
print "$file: $mdlist{$file}\n" if /Not/ or / 0 match/;
} else {
if ( $matches{$file} ) {
print "$file: $matches{$file}\n";
} else {
print "$file: $mdlist{$file}\n\n";
}    # if matches
}      # if errors_only
}        # foreach file
} else {
# dump the whole page, if wanted
print "Content: ", $response->content, "\n";
}          # if output_all == 3
} else {
print STDERR "Result: cgi request failed! $request_http\n";

As described brief description of the following examples from the program: “Frank J Tobin> GnuPG-Interface-0:33> GnuPG:: Fingerprint.
1. Name
GnuPG:: Fingerprint – Fingerprint Objects GnuPG
2. Summary
# Assumes a GnuPG:: Key in $ key
my $ fingerprint = $ key-> fingerprint-> as_hex_string ();
3. Description
Gnupg:: Fingerprint Object is usually part of GnuPG:: Key Object, and not created on top of their own.
4. Method Object
Inisilisasi the method
new (% initialization_args)
This method creates a new object. Initialisasi optional argument is the data member, initialisasi conducted in a manner according to the method described it creates “new_hash_init” in Class:: MethodMaker
hash_init (% args).
This method works as described “new_hash_init” in Class:: MethodMaker
5. Object-related data
Note that this data member associated with each other via a reject methods that were created using a method other than the method described “get_set” in Class:: MethodMaker, or “object” in Class:: MethodMaker.
This is the value of the fingerprint grooves that tangible objects, in the format string
In addition, the method is still a lot of other method of supporting the fingerprint program.

The fingerprint biometric techniques are seven forms of papillary ridge that is:
Loop, Arch, whorl, Tented Arch, Double Loop, Central Loop Pocked, and accidental. Besides, there is some measure of anatomical fingerprints, among others;
Ridge, Evading Ends, Bifurcation, Hook, Fork, Dot, Eye, Island, Enclosed Ridge, Specialties, Enclosed Loop, each of which has been described in atsas.
Fingerprinting techniques can be categorized into two methods; minutae-based and correlation-based, both have kelibihan and deficiencies in the correlation-based applications can provide better benefits than the minutae-based applications. Besides those in the fingerprint can also be classified based on the assignment of the fingerprint into a pre-specified types of five-class problem and four-class problem.
In the use of passwords with fingerprint biometric can provide better security, because passwords are not easily forged or lost because its existence inherent in human limbs that can not be changed except for injury or other damage insident bored.
As an illustration of programming can be seen in the source code quoted from “PerlMonks” and described briefly on the program quoted from “Frank J Tobin> GnuPG-Interface-0:33> GnuPG:: Fingerprint.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s