31
THE SECURITY FOR LIBRARY THE SECURITY FOR LIBRARY Mr. Bibhuti bhusan Pattanaik (Asst. Mr. Bibhuti bhusan Pattanaik (Asst. Librarian), Librarian), I.T.S - IM Library, Greater Noida, I.T.S - IM Library, Greater Noida, Email: Email: [email protected] Ms. Babita Pattanaik (Lecturer), Ms. Babita Pattanaik (Lecturer), North Orissa University, Baripada North Orissa University, Baripada Email: Email: [email protected]

THE SECURITY FOR LIBRARY Mr. Bibhuti bhusan Pattanaik (Asst. Librarian), I.T.S - IM Library, Greater Noida, Email: [email protected] Ms. Babita Pattanaik

Embed Size (px)

Citation preview

THE SECURITY FOR LIBRARYTHE SECURITY FOR LIBRARY

Mr. Bibhuti bhusan Pattanaik (Asst. Mr. Bibhuti bhusan Pattanaik (Asst. Librarian),Librarian),

I.T.S - IM Library, Greater Noida, I.T.S - IM Library, Greater Noida, Email: Email: [email protected]

Ms. Babita Pattanaik (Lecturer), Ms. Babita Pattanaik (Lecturer), North Orissa University, BaripadaNorth Orissa University, Baripada

Email: Email: [email protected]

Presentation OutlinePresentation OutlineTo Educate and Inform

You

1. About RFID system

2. How does RFID works

3. Why RFID

4. Agenda & Concern

5. Implementation

6. Benefit

7. Conclusion

1. About RFID system

Brief HistoryBrief History What is RFID systemWhat is RFID system RFID Architecture & Key RFID Architecture & Key

Components Components StandardsStandards Key Agenda & Concern for Key Agenda & Concern for

LibraryLibrary

Brief HistoryBrief HistoryRFID (Radio Frequency Identifier) an Auto-ID data RFID (Radio Frequency Identifier) an Auto-ID data collection system surveillance, using RF waves for collection system surveillance, using RF waves for Identifying, Tracking and doing Management of Identifying, Tracking and doing Management of material flow. material flow.

Basic concept behind RFID is same as “Mirror-Sunlight-Reflection theory ”

Invented and used from (Early 1940’s)

Commercial Operation begun from 1960’s …

In 1970s developers, inventors, companies, academic institution and government sectors were actively worked on RFID

Most common application were tracked person and objects, identified goods in supply chain, reusable container, high value tools, security, controlling access to building, networks, payment systems and other assets.

What is RFID systemWhat is RFID system

RFID is an RFID is an acronym for acronym for radio frequency radio frequency identificationidentification. . Briefly the Briefly the RF RF stand for “stand for “radio-radio-frequencyfrequency” and ” and IDID means means ““identifieridentifier” that ” that allows an item, allows an item, for instance a for instance a library book, to library book, to be identified, be identified, accessed, stored, accessed, stored, reprogrammed reprogrammed and and communicated communicated by using radio by using radio waves waves

A method for controlling inventory

Automatically identify objects

An AUTO-ID based System

Offering Self Check out/in

Saving Time and Money

Gathering statistics on used Items

Minimize Work Stress of Staff

Easily Prevent Theft

Improve Customer Services And

Non-Line-Sight Communication

RFID RFID ArchitectureArchitecture

Tags Reader

Gateway

Database

Database

Application

User Interface

Backend

Fig.1. A General Overview of RFID Architecture

Scanned

As depicted in figure.1 the whole operation are worked under three key phases. Firstly items-tag are scanned by reader;

Secondly in backend transmitted data coming through antenna (RF-wave) are being recognized by RFID-based system PC. It acts as a middleware communication gateway among items, reader and system database;

And at the end it filters out and store data in RFID-databases for checking the data fault and relevant operation.

Key Key ComponentsComponents

TAGS

READER

SELF CHECK-OUT/IN

INVENTORY READER

BOOK DROP READER

MIDDLEWARE (PC)

SECURITY GATE

LABEL PRINTER

SORTER

TAGSTAGSPaper thin 2X2inch in size.

Read-only or Read/writable

Storage capacity of 2KB data that contain 96bits serial number.

Tags come in many flavors: passive, battery assisted, active, different frequencies, various anti-collision technologies, printed/wire wounded antenna etc.

TAG-TYPES FOR LIBRARY TAG-TYPES FOR LIBRARY ITEMSITEMS

Type:Type: Contact less Read/WriteContact less Read/Write

Operating Operating Frequency: Frequency:

13.56 MHz. (HF-High Frequency).13.56 MHz. (HF-High Frequency).

Capacity: Capacity: 512 bit up to 10Kbits512 bit up to 10Kbits

Common Usage: Common Usage: Ticketing, Library Management, anti-counterfeitingTicketing, Library Management, anti-counterfeiting

Standard Standard Deployment: Deployment:

Electronic label application, Electronic Article Electronic label application, Electronic Article SurveillanceSurveillance

Tested Read Tested Read Range: Range:

Maximum 10cm  Read, and Write 5cm Detection Maximum 10cm  Read, and Write 5cm Detection (The distance may vary depend upon the (The distance may vary depend upon the environment)environment)

Multi-Detection: Multi-Detection: Yes Yes

Max read Max read quantity: quantity:

30 labels/sec 30 labels/sec

Size: Size: 82mm x 49mm 82mm x 49mm

Material: Material: Opaque matt paper 79Opaque matt paper 79

Color: Color: WhiteWhite

Weight: Weight: 0.5g0.5g

Compliance:Compliance: ICODE, SLIICODE, SLI

Regulatory Regulatory SpecificationSpecifications:s:

ISO 15693ISO 15693

OperatingOperatingSpecifications:Specifications:

Waterproof and dustproofWaterproof and dustproof

READER A device that is used to interrogate an Tag.

Basic components are

A scanning Antenna

A transceiver with a decoder to interpret data

helps in personalize & read data.

SELF CHECK-OUT/IN

Dual Function(rfid & barcode)

Store information about item.

Performance statistics

Multiple items can be checked out at a time

Easier to Use.

INVENTORY READER A compact and light weight hand held device

Comfortable to use

High storage capacity

Multi Functional (such as shelving, sorting, searching, weeding and reading)

Enhanced Security.

BOOK DROP READER

Self Checks-in books when patrons drop them in book-drop …..

MIDDLE WAREMIDDLE WARE

Provide reader connectivity to other systems on the network.

Translate data and transmit to its other application

SECURITY GATE

Verify that all books leaving the library have been checked out. Detect Theft and Prevent unauthorized removal of material

StandardStandard

RFID STANDARD USED FOR LIBRARY:

Standard : ISO-15693

Frequency: 13.56 MHZ

Dimension : 400mm X 200mm X 120mm

Housing : Metal

Data Interface: RS 232

Protocol : SIP and/or API (presently using STX/ETX communication protocol)

Indicator : Tag Data LED and Power LED

Voltage : 230 Volt

Certification : CE and Radio Approval

Frequency: 13.56 MHZ

Key feature of 13.56Mhz isKey feature of 13.56Mhz is Tags are less expensive due to Tags are less expensive due to

their limited coil required.their limited coil required. Read range about 1-2feet.Read range about 1-2feet. Some tags are anti collision Some tags are anti collision collects, uses, stores and collects, uses, stores and

broadcast data broadcast data Controlled all conveyor settingControlled all conveyor setting

Key Agenda & Concern for Key Agenda & Concern for LibraryLibraryAGENDAAGENDA

Material securityMaterial security Financial LiabilitiesFinancial Liabilities Personal Comfort Personal Comfort

and Safetyand Safety Privacy andPrivacy and Problem patronsProblem patrons

CONCERN To Increase productivity

Improve customer services

Maintain current staff level

AGENDAAGENDAMaterial Material Security:Security:

Use of Hardware Use of Hardware and Softwareand Software

Reader RangeReader Range Read QualityRead Quality Data IntegrityData Integrity FrequencyFrequency

Personal Personal Safety:Safety:

Staff stressStaff stress Theft detectionTheft detection PrivacyPrivacy

Financial Liabilities:Financial Liabilities: One Time Implementation One Time Implementation

costscosts System maintenance & System maintenance &

LicensingLicensing Security system costsSecurity system costs Tags costTags cost

Problem Patrons:Problem Patrons: Block the RF-WaveBlock the RF-Wave Items with Odd Items with Odd

shape & metal shape & metal componentcomponent

Doc.like pamphlet, Doc.like pamphlet, sheet music, sheet music, magazine etc.magazine etc.

Staff & Patron Staff & Patron interactioninteraction

PRIVACY & PRIVACY & SECURITY:SECURITY:

Tracking IndividualsTracking Individuals Inappropriate use of Inappropriate use of

personal datapersonal data Theft of InformationTheft of Information Ownership and Legal Ownership and Legal

issueissue Inadequate EncryptionInadequate Encryption Database hackedDatabase hacked

Increase productivityIncrease productivity More accurate More accurate

shelvingshelving Time saving, speedyTime saving, speedy Provide security and Provide security and

material controlsmaterial controls More opportunity for More opportunity for

enhanced servicesenhanced services Durability, longevity Durability, longevity

and Insuranceand Insurance

Improve customer Improve customer servicesservices

Materials more readily Materials more readily availableavailable

Less time wasted in Less time wasted in line to check out/ line to check out/ check incheck in

Fewer items remain Fewer items remain charged to accountscharged to accounts

Improved privacy since Improved privacy since staff never sees what’s staff never sees what’s being checked outbeing checked out

CONCERN

Maintain current staff Maintain current staff levellevel

Repetitive StressRepetitive Stress Reduce handling of Reduce handling of

item with RFIDitem with RFID

How does RFID works

RFID-READER RFID-TAG

PERSONALIZER (Application Device)

DATA FLOW

RF COUPLING

Time

Energy

Up-to-date

Fig.1. Items personalized model for RFID system

PC

Why RFID

I. Barcode Vs RFID

II. Inventory Management

III. Economic Facts

IV. Customer Satisfaction

Barcode Vs RFID

Inventory Management

Read/Write Read/Write - Ability to add information directly to tags enables - Ability to add information directly to tags enables each unique asset to carry its own unique historyeach unique asset to carry its own unique history

Non-contact ReadsNon-contact Reads - Ability to read tags at a distance, under a variety - Ability to read tags at a distance, under a variety

of environmental conditions, without physical of environmental conditions, without physical manipulation of the assetmanipulation of the asset

Fast ReadFast Read - Ability to simultaneously read large numbers - Ability to simultaneously read large numbers

(1000-1750 tags/sec) of items(1000-1750 tags/sec) of items AutomationAutomation

- Requires less human intervention- Requires less human intervention AuthenticityAuthenticity - Each RFID chip is unique and can not be - Each RFID chip is unique and can not be

replicatedreplicated

Economic FactsIncrease SecurityIncrease Security

Security of material is automatic without staff Security of material is automatic without staff intervention.intervention.

Automatic items check out/ check in and Automatic items check out/ check in and sorting can be accomplished with LMS sorting can be accomplished with LMS circulation software, therefore eliminating circulation software, therefore eliminating extra processing time of staff and make it extra processing time of staff and make it economically viable.economically viable.

Cost AvoidanceCost Avoidance Currently Missing Items statisticsCurrently Missing Items statistics Replacement costReplacement cost Selection, classification, processing, cost of Selection, classification, processing, cost of

searching, notification etc. is improved onesearching, notification etc. is improved one Existing Material Management systemExisting Material Management system Staff cost (manual way to do house keeping Staff cost (manual way to do house keeping

job)job) Eliminates the time consuming process of Eliminates the time consuming process of

barcode scanning and reading.barcode scanning and reading. High speed InventoryingHigh speed Inventorying

High ReliabilityHigh Reliability The RFID readers are highly reliable, almost The RFID readers are highly reliable, almost

100% detection rate.100% detection rate. Multiple items can be checked out/ checked in Multiple items can be checked out/ checked in

at a time.at a time. Make library staff free from the risk of Make library staff free from the risk of

repetitive stress injuries.repetitive stress injuries.

LongevityLongevity RFID tags last longer than barcodesRFID tags last longer than barcodes

COST FACTORS

Implementation cost

• Cost of RFID tags

• Reader

• Hand held device

• software interface

• Others

On going system Cost

• System maintenance

• Security system cost

• Work station maintenance

• Technical staff

Customer Satisfaction Materials control, Materials control, Security, Security, High speed Inventorying,High speed Inventorying, Faster Check-out/-in,Faster Check-out/-in, Longevity of Tags,Longevity of Tags, Reduce staff stress,Reduce staff stress, Prevent Theft,Prevent Theft, Searching, notifying and Searching, notifying and Gathering statistics on items become easy. Gathering statistics on items become easy.

---------- It Made ---------- It Made

Sense!!Sense!!

ImplementationStart

Identify

Plan

Implementation

Why you want RFID?

Begin with your goals.

Where RFID will deliver value to your Library and its Customers.

Ready your organization for change.

Benefit Better Collection Management

Shelves rectification and Verification

Improved Productivity and Services

Wireless inventory management

Faster Checked Out/In

Prevent Theft

Quick Searching, Weeding & inventory audit

Cost Avoidance

Eliminate Manual Labor Cost.

Improve automation process

Reduce Repetitive Stress Injury

ConclusionRFID technology is taking off in libraries at an RFID technology is taking off in libraries at an increasingly rapid pace. Though there are few increasingly rapid pace. Though there are few libraries employing this technology today, but libraries employing this technology today, but due to its customizable feature and continuing due to its customizable feature and continuing improvement the library communities are improvement the library communities are beginning to get involved in its development. beginning to get involved in its development. It is easy to envision that, the It is easy to envision that, the RFID tags RFID tags contents will increase in powercontents will increase in power, , prices are prices are expected to declineexpected to decline and and tag will dramatically tag will dramatically improve its efficiency, security and accuracyimprove its efficiency, security and accuracy. . Also major concerns need to be addressed for Also major concerns need to be addressed for successfully implementing this technology. So successfully implementing this technology. So that it will change our personal and work lives that it will change our personal and work lives in library and adorns the conventional library in library and adorns the conventional library management with a new idea and usher for a management with a new idea and usher for a bright future. bright future.

RFID IS A SUPPORTING TECHNOLOGY--- NOT A COMPETING !!

3M-LIBRARY SYSTEM

THANK THANK “YOU”“YOU”