The use of computers for tests either in college or remotely, reduces the administrative burden and speeds up the onset of both the test and marks it. A student would have his examination after entering his details, as well as teacher would have all the tests after students finished them. How to improve security in this new environment? Understood that the level of cheating or not is more a work of the staff in the classroom and the use of a controlled and limited computer should not vary the level of cheating. So our research is based on examinations by computer and how to add features to our application to verify the identity of the students.

At present there are many technologies that run about as perfect security to be given to sending data over the Internet but even more so knowing that the person who sends it’s who claims to be and not an imposter. The method of password and username is inadequate for the rigours of identification it must give. The methods of identification are:

  • Something the user knows – password
  • Something that the user owns – smart cards
  • Something that the user is – quantitative data that identifies a person of rest, biometric characteristics

The use of biometric [2] techniques eliminates having to memorize or carry a card because it is something that will always possess. The selection or use of a method of identification was based on an evaluation of the strengths and weaknesses of each one of the biometric techniques.

For the characteristics that have such data and information that can shed it becomes necessary to the delimitation of what is seen as biometric data, the treatment being given, as well as legal protection that should have.

As it is well known biometrics is the technique used to measure physical and biological features of the human body. It is worth noting that the biological and physical characteristics are different for each person and to distinguish certain peculiarities that take part in the aspects analyzed, which made it impossible coincidence in the two individuals, once processed, allowing serve to identify the individual concerned.

For a biometric data is named as such it is necessary that becomes apparent concurrence of certain elements that distinguish it from another category of data. Therefore biometric data should be universal, unique and permanent.

Biometric data can be obtained on the basis not only in the physical and biological constitution of the individual, but also in specific actions and behaviours that the person takes a step towards the achievement of his activities within his place in society. According to the class sample is collected, physical-biological or social action, the biometric data may be static or dynamic category.

The use of this new identification technology is given more priority to the biometric static [3] by its margin of error to almost nothing that the biometric dynamic in the doubt that these originate in their reliability. Anyway, both static biometrics as the dynamic cover personal aspects of every individual as are in the private sphere of him, although some of these biometric data, depending on their nature, are closer than others to the private sphere, individual intimate and highly personal.

The fingerprint [4] biometrics static par excellence is used to identify persons. Fingerprints are shaped by some grooves or ridges on the surface of the phalanx of finger on his unique position makes it is different and distinctive in each person. The main varieties, which generally have ridges papillary, by their morphology, branching, orientation and interruptions are commonly known as “minutiae” or points characteristic. These characteristics are different points and are in a different percentage for each person and among the most common are the abrupt, fork, convergence, fragment, eyelet, point, among others.