0% found this document useful (0 votes)
148 views7 pages

Lesson Plan in TLE8-TC ICT

This lesson plan discusses authentication and computer privacy. The objectives are to define authentication, verification, enumerate biometric devices, and discuss verification methods. The lesson will involve a game to engage students, a presentation on authentication processes and biometric devices like fingerprint recognition and facial recognition. Students will summarize the lesson and complete a quiz to evaluate their understanding. They are assigned to research authentication methods for different operating systems.

Uploaded by

Farren Santiago
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
148 views7 pages

Lesson Plan in TLE8-TC ICT

This lesson plan discusses authentication and computer privacy. The objectives are to define authentication, verification, enumerate biometric devices, and discuss verification methods. The lesson will involve a game to engage students, a presentation on authentication processes and biometric devices like fingerprint recognition and facial recognition. Students will summarize the lesson and complete a quiz to evaluate their understanding. They are assigned to research authentication methods for different operating systems.

Uploaded by

Farren Santiago
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Lesson Plan in TLE8- TC ICT

S.Y. 2019-2020
TOPIC : AUTHENTICATION / COMPUTER PRIVACY
DISCUSSANT : Santiago, Franco L.
PROFESSOR : Ma’am Angeline Villareal.
SUBJECT : Teaching Common Competencies in information and
Communication Technology
YR. & MAJOR : 2ND YEAR, BTVTE/CSS
SECTION : PCED-13-401A

I. OBJECTIVES
At the end of the lesson, the students should be able to:
a. Define Authentication
b. Define Verification
c. Enumerate the different Biometric Devices
d. Method of Verification

II. SUBJECT MATTER

AUTHENTICATION IN COMPUTER

Reference:
1. http://www.slideshare.net/mobile/kwongliik/ict-topic-1

III. TOOLS AND MATERIALS


 Power Point Presentation
 Laptop
 Projector
 Blackboard
 Chalk

IV. PRELIMENARIES
A. Preparation:
1. Prayer
2. Greetings
3. Checking of
 Attendance
 Cleanliness
 Assignment
4. Test the knowledge of the students
 What is Privacy?
 What is important of Privacy?
5. Motivation
HIT THE WOAH GAME
The Teacher will group the students into two (2) groups. The mechanics of the game is
simple each students will face each other and when the music start (music: HIT THE
WOAH) you need to capture your opponent using the your hand pointer in each WOAH
in the music. The first group to complete the music will win the game.

B. Presentation:

Teaching Aids and


Teaching Content Devices Instructional Strategies/Methods
Media

TEACHING CONTENT
 AUTHENTICAITON
Authentication is a process where users verify that they are
who they say they are. The users who attempts to perform
functions in a system is in fact the users who is authorized to
do so.
 AUTHENTICATION

 Identification
 Present what the user has ( e.g smart
card)

Not Valid (F)


 Verifica Access
tion Denied
 Verify
the
Valid (T)

Identification
Present what the users is (e.g Biometric)

False
Authenticat
e who the
user is

True

Access Granted

METHOD OF AUTHENTICATION
There are two commonly used authentication method, which are biometric device and
callback system.
Biometric device is a device that translate personal characteristics into a digital code
that is compared with a digital code stored in the data base.

BIOMETRIC DEVICE
 FINGER PRINT RECOGNITION
 In order to prevent fake finger from
being used, many biometric fingerprint
system also measure blood flow or
check for correctly arrayed ridge at the
edges of the fingers.


 FACIAL RECOGNITION
 Face recognition analyses the
characteristic of an individual face
image captured though a digital video
camera. Facial recognition is widely
used touted as a fantastic system for
recognizing potential threats (weather,
terrorist, scam artist, or known
criminal)

 HAND GEOMETRY SCANNING


 Hand scanning involves the
measurement and analysis of the
shape of one hand.

 IRIS SCANNING
 Iris scanning analyses the feature that
exist in the coloured tissues
surrounding the pupil which has more
than 200 points that can be used for
comparison, including rings, furrows
and freckles.
 RETINAL SCANNING
 Retinal Biometric involves the
scanning of retina and analysis the
layer of blood vessels at the back of
the eyes.

 VOICE RECOGNITION
 Voice recognition system compares a
person live speech with their stored
voice pattern
Voice recognition Biometric requires
user to speak into a microphone.
What he speaks can be his password
or an access phrase.

 SIGNATURE VERIFICATION
SYSTEM
 Signature verification system uses
special pen and tablet. After pre-
processing the signature, several
feature are extracted.
The authenticity of a writer is
determined by comparing an input
signature to a stored reference set
( templates ) consisting of three
signature.
 CALLBACK SYSTEM
 The callback system is commonly
used in the bank operation and
business transaction.
Ex. When you look when you book for
the taxi service, the operator will ask
you to hang up and she will call you
back to confirm for the service
required.

C. SUMMARY
 The teacher will call some of the students to summarize the newly discussed lesson.
AUTHENTICATION is a process where users verify that they are who they say they
are. The user attempts to perform function in a system is in fact the user who is
authorized to do so.
VERIFICATION Is the act of proving or disproving the correctness of a system with
the respect.
D. APPLICATION
With the guidance of the teacher some of the student will recite the procedure of
authentication and different types of Biometric Devices.
E. EVALUATION
Without the guidance of the teacher, the student will give a quiz with 15 items. They will
be given 30 minutes to finish their quiz.

Criteria of grading
Attitude 10%
Accuracy 30%
Delivery 30%
Time Management 30%
Total 100%
V. ASSIGNMENT
Research for:
1. Android authentication
2. Authentication for IOS
3. Authentication for C++

References:
1. http://www.slideshare.net/mobile/kwongliik/ict-topic-1

Prepared by: Prepared for:

Franco L. Santiago Prof. Angeline V. Villareal

You might also like