Lesson Plan in TLE8-TC ICT
Lesson Plan in TLE8-TC ICT
S.Y. 2019-2020
TOPIC : AUTHENTICATION / COMPUTER PRIVACY
DISCUSSANT : Santiago, Franco L.
PROFESSOR : Ma’am Angeline Villareal.
SUBJECT : Teaching Common Competencies in information and
Communication Technology
YR. & MAJOR : 2ND YEAR, BTVTE/CSS
SECTION : PCED-13-401A
I. OBJECTIVES
At the end of the lesson, the students should be able to:
a. Define Authentication
b. Define Verification
c. Enumerate the different Biometric Devices
d. Method of Verification
AUTHENTICATION IN COMPUTER
Reference:
1. http://www.slideshare.net/mobile/kwongliik/ict-topic-1
IV. PRELIMENARIES
A. Preparation:
1. Prayer
2. Greetings
3. Checking of
Attendance
Cleanliness
Assignment
4. Test the knowledge of the students
What is Privacy?
What is important of Privacy?
5. Motivation
HIT THE WOAH GAME
The Teacher will group the students into two (2) groups. The mechanics of the game is
simple each students will face each other and when the music start (music: HIT THE
WOAH) you need to capture your opponent using the your hand pointer in each WOAH
in the music. The first group to complete the music will win the game.
B. Presentation:
TEACHING CONTENT
AUTHENTICAITON
Authentication is a process where users verify that they are
who they say they are. The users who attempts to perform
functions in a system is in fact the users who is authorized to
do so.
AUTHENTICATION
Identification
Present what the user has ( e.g smart
card)
Identification
Present what the users is (e.g Biometric)
False
Authenticat
e who the
user is
True
Access Granted
METHOD OF AUTHENTICATION
There are two commonly used authentication method, which are biometric device and
callback system.
Biometric device is a device that translate personal characteristics into a digital code
that is compared with a digital code stored in the data base.
BIOMETRIC DEVICE
FINGER PRINT RECOGNITION
In order to prevent fake finger from
being used, many biometric fingerprint
system also measure blood flow or
check for correctly arrayed ridge at the
edges of the fingers.
FACIAL RECOGNITION
Face recognition analyses the
characteristic of an individual face
image captured though a digital video
camera. Facial recognition is widely
used touted as a fantastic system for
recognizing potential threats (weather,
terrorist, scam artist, or known
criminal)
IRIS SCANNING
Iris scanning analyses the feature that
exist in the coloured tissues
surrounding the pupil which has more
than 200 points that can be used for
comparison, including rings, furrows
and freckles.
RETINAL SCANNING
Retinal Biometric involves the
scanning of retina and analysis the
layer of blood vessels at the back of
the eyes.
VOICE RECOGNITION
Voice recognition system compares a
person live speech with their stored
voice pattern
Voice recognition Biometric requires
user to speak into a microphone.
What he speaks can be his password
or an access phrase.
SIGNATURE VERIFICATION
SYSTEM
Signature verification system uses
special pen and tablet. After pre-
processing the signature, several
feature are extracted.
The authenticity of a writer is
determined by comparing an input
signature to a stored reference set
( templates ) consisting of three
signature.
CALLBACK SYSTEM
The callback system is commonly
used in the bank operation and
business transaction.
Ex. When you look when you book for
the taxi service, the operator will ask
you to hang up and she will call you
back to confirm for the service
required.
C. SUMMARY
The teacher will call some of the students to summarize the newly discussed lesson.
AUTHENTICATION is a process where users verify that they are who they say they
are. The user attempts to perform function in a system is in fact the user who is
authorized to do so.
VERIFICATION Is the act of proving or disproving the correctness of a system with
the respect.
D. APPLICATION
With the guidance of the teacher some of the student will recite the procedure of
authentication and different types of Biometric Devices.
E. EVALUATION
Without the guidance of the teacher, the student will give a quiz with 15 items. They will
be given 30 minutes to finish their quiz.
Criteria of grading
Attitude 10%
Accuracy 30%
Delivery 30%
Time Management 30%
Total 100%
V. ASSIGNMENT
Research for:
1. Android authentication
2. Authentication for IOS
3. Authentication for C++
References:
1. http://www.slideshare.net/mobile/kwongliik/ict-topic-1