View
222
Download
0
Category
Preview:
Citation preview
8/2/2019 Rfid Security Bibhuti
1/29
THE SECURITY FOR LIBRARY
Mr. Bibhuti bhusan Pattanaik (Asst. Librarian),
I.T.S - IM Library, Greater Noida,
Email: bibhu15july@yahoo.co.inMs. Babita Pattanaik (Lecturer), North Orissa
University, Baripada
Email: babitapattanaik@rediffmail.com
mailto:bibhu15july@yahoo.co.inmailto:babitapattanaik@rediffmail.commailto:babitapattanaik@rediffmail.commailto:bibhu15july@yahoo.co.in8/2/2019 Rfid Security Bibhuti
2/29
Presentation OutlineTo Educate and Inform You
1. About RFID system
2. How does RFID works
3. Why RFID
4. Agenda & Concern
5. Implementation6. Benefit
7. Conclusion
8/2/2019 Rfid Security Bibhuti
3/29
1. About RFID system
Brief History
What is RFID system
RFID Architecture & Key Components
Standards
Key Agenda & Concern for Library
8/2/2019 Rfid Security Bibhuti
4/29
Brief History
RFID (Radio Frequency Identifier) an Auto-ID data
collection system surveillance, using RF waves forIdentifying, Tracking and doing Management ofmaterial flow.
Basic concept behind RFID is same as Mirror-Sunlight-
Reflection theory
Invented and used from (Early 1940s)
Commercial Operation begun from 1960s
In 1970s developers, inventors, companies, academicinstitution and government sectors were actively worked on
RFIDMost common application were tracked person and objects, identified
goods in supply chain, reusable container, high value tools, security,
controlling access to building, networks, payment systems and other assets.
8/2/2019 Rfid Security Bibhuti
5/29
What is RFID system
RFID is an acronymfor radio frequencyidentification.Briefly the RFstand for radio-frequency and ID
means identifierthat allows an item,for instance alibrary book, to beidentified,accessed, stored,
reprogrammed andcommunicated byusing radio waves
A method for controlling inventory
Automatically identify objects
An AUTO-ID based System
Offering Self Check out/in
Saving Time and Money
Gathering statistics on used Items
Minimize Work Stress of Staff
Easily Prevent Theft
Improve Customer Services And
Non-Line-Sight Communication
8/2/2019 Rfid Security Bibhuti
6/29
RFID Architecture
Tags Reader
Gateway
Database
Database
Application
UserInterface
Backend
Fig.1. A General Overview of RFID
Architecture
Scanned
As depicted in figure.1 the whole operation are worked under
three key phases.
Firstly items-tag arescanned by reader;
Secondly in backend
transmitted data coming
through antenna (RF-wave)
are being recognized by
RFID-based system PC. It
acts as a middleware
communication gateway
among items, reader and
system database;
And at the endit filters out
and store data in RFID-
databases for checking the
data fault and relevant
operation.
8/2/2019 Rfid Security Bibhuti
7/29
Key Components TAGS
READER
SELF CHECK-OUT/IN
INVENTORY READER
BOOK DROP READER
MIDDLEWARE (PC)
SECURITY GATE
LABEL PRINTER
SORTER
8/2/2019 Rfid Security Bibhuti
8/29
TAGSPaper thin 2X2inchin size.
Read-only or
Read/writable
Storage capacity
of 2KB data thatcontain 96bits
serial number.
Tags come in many
flavors: passive, battery
assisted, active, differentfrequencies, various anti-
collision technologies,
printed/wire wounded
antenna etc.
8/2/2019 Rfid Security Bibhuti
9/29
READER
A device that is used tointerrogate an Tag.
Basic components are
A scanning Antenna
A transceiver with a
decoder to interpret data helps in personalize &
read data.
http://www.gaorfid.com/images/rfid_readers_902_236002.jpg8/2/2019 Rfid Security Bibhuti
10/29
SELF CHECK-OUT/IN
Dual Function(rfid & barcode)
Store information about item.
Performance statistics
Multiple items can be checked
out at a time
Easier to Use.
8/2/2019 Rfid Security Bibhuti
11/29
INVENTORY READER
A compact and light weight
hand held device
Comfortable to use
High storage capacity
Multi Functional (such as
shelving, sorting, searching,
weeding and reading)
Enhanced Security.
8/2/2019 Rfid Security Bibhuti
12/29
BOOK DROP READER
Self Checks-in
books when
patrons dropthem in book-
drop ..
8/2/2019 Rfid Security Bibhuti
13/29
MIDDLE WARE
Provide reader connectivity to other systems on the
network.
Translate data and transmit to its other application
8/2/2019 Rfid Security Bibhuti
14/29
SECURITY GATE
Verify that all books
leaving the library have been
checked out. Detect Theft and
Prevent unauthorized
removal of material
8/2/2019 Rfid Security Bibhuti
15/29
Standard
RFID STANDARD USED FOR LIBRARY:Standard : ISO-15693
Frequency: 13.56 MHZ
Dimension : 400mm X 200mm X 120mm
Housing : Metal
Data Interface: RS 232
Protocol : SIP and/or API (presently usingSTX/ETX communication protocol)
Indicator : Tag Data LED and Power LED
Voltage : 230 Volt
Certification : CE and Radio Approval
8/2/2019 Rfid Security Bibhuti
16/29
Frequency: 13.56 MHZ
Key feature of 13.56Mhz is
Tags are less expensive due to their
limited coil required.
Read range about 1-2feet.
Some tags are anti collision
collects, uses, stores and broadcast data
Controlled all conveyor setting
8/2/2019 Rfid Security Bibhuti
17/29
Key Agenda & Concern for
LibraryAGENDA Material security
Financial Liabilities
Personal Comfort andSafety
Privacy and
Problem patrons
CONCERN To Increase productivity
Improve customer services
Maintain current staff level
8/2/2019 Rfid Security Bibhuti
18/29
AGENDAMaterial Security: Use of Hardware and
Software Reader Range
Read Quality Data Integrity Frequency
Personal Safety: Staff stress Theft detection Privacy
Financial Liabilities: One Time Implementation costs System maintenance & Licensing Security system costs
Tags cost
Problem Patrons: Block the RF-Wave
Items with Odd shape &metal component Doc.like pamphlet, sheet
music, magazine etc. Staff & Patron
interaction
PRIVACY & SECURITY: Tracking Individuals Inappropriate use of
personal data Theft of Information Ownership and Legal issue Inadequate Encryption Database hacked
8/2/2019 Rfid Security Bibhuti
19/29
Increase productivity
More accurate shelving
Time saving, speedy
Provide security andmaterial controls
More opportunity forenhanced services
Durability, longevity andInsurance
Improve customer services
Materials more readilyavailable
Less time wasted in line tocheck out/ check in
Fewer items remain charged toaccounts
Improved privacy since staff
never sees whats beingchecked out
CONCERN
Maintain current staff level
Repetitive Stress
Reduce handling of item withRFID
8/2/2019 Rfid Security Bibhuti
20/29
How does RFID works
RFID-READER RFID-TAG
PERSONALIZER (Application Device)
DATA FLOW
RF COUPLING
Time
Energy
Up-to-date
Fig.1. Items personalized model for RFID system
PC
8/2/2019 Rfid Security Bibhuti
21/29
Why RFID
I. Barcode Vs RFID
II. Inventory Management
III. Economic Facts
IV. Customer Satisfaction
8/2/2019 Rfid Security Bibhuti
22/29
Barcode Vs RFID
8/2/2019 Rfid Security Bibhuti
23/29
Inventory Management
Read/Write
- Ability to add information directly to tags enables eachunique asset to carry its own unique history
Non-contact Reads
- Ability to read tags at a distance, under a variety of
environmental conditions, without physicalmanipulation of the asset
Fast Read
- Ability to simultaneously read large numbers (1000-1750 tags/sec) of items
Automation- Requires less human intervention
Authenticity
- Each RFID chip is unique and can not be replicated
8/2/2019 Rfid Security Bibhuti
24/29
Economic FactsIncrease Security Security of material is automatic without staff intervention.
Automatic items check out/ check in and sorting can beaccomplished with LMS circulation software, therefore
eliminating extra processing time of staff and make iteconomically viable.
Cost Avoidance Currently Missing Items statistics
Replacement cost
Selection, classification, processing, cost of searching,notification etc. is improved one
Existing Material Management system
Staff cost (manual way to do house keeping job)
Eliminates the time consuming process of barcodescanning and reading.
High speed Inventorying
High Reliability
The RFID readers are highly reliable, almost 100%detection rate.
Multiple items can be checked out/ checked in at a time.
Make library staff free from the risk of repetitive stressinjuries.
Longevity RFID tags last longer than barcodes
COST FACTORS
Implementation cost
Cost of RFID tags
Reader
Hand held device
software interface
Others
On going system Cost
System maintenance
Security system cost
Work station maintenance
Technical staff
8/2/2019 Rfid Security Bibhuti
25/29
Customer Satisfaction
Materials control, Security,
High speed Inventorying,
Faster Check-out/-in,
Longevity of Tags,
Reduce staff stress,
Prevent Theft,
Searching, notifying and Gathering statistics on items become easy.
---------- It Made Sense!!
8/2/2019 Rfid Security Bibhuti
26/29
Implementation
Start
Identify
Plan
Implementation
Why you want
RFID?Begin with
your goals.
Where RFID will deliver value
to your Library and its
Customers.
Ready your organization for
change.
8/2/2019 Rfid Security Bibhuti
27/29
BenefitBetter Collection Management
Shelves rectification and Verification Improved Productivity and Services
Wireless inventory management
Faster Checked Out/In Prevent Theft Quick Searching, Weeding & inventory audit
Cost Avoidance Eliminate Manual Labor Cost. Improve automation process
Reduce Repetitive Stress Injury
8/2/2019 Rfid Security Bibhuti
28/29
Conclusion
RFID technology is taking off in libraries at an increasingly
rapid pace. Though there are few libraries employing this
technology today, but due to its customizable feature and
continuing improvement the library communities are
beginning to get involved in its development. It is easy to
envision that, the RFID tags contents will increase in power,
prices are expected to decline and tag will dramaticallyimprove its efficiency, security and accuracy. Also major
concerns need to be addressed for successfully implementing
this technology. So that it will change our personal and work
lives in library and adorns the conventional library
management with a new idea and usher for a bright future.
RFID IS A SUPPORTING TECHNOLOGY--- NOT A COMPETING !!
3M-LIBRARY SYSTEM
8/2/2019 Rfid Security Bibhuti
29/29
THANK
YOU
Recommended