THE SECURITY FOR LIBRARY Mr. Bibhuti bhusan Pattanaik (Asst. Librarian), I.T.S - IM Library, Greater Noida, Email: bibhu15july@yahoo.co.in Ms. Babita Pattanaik (Lecturer), North Orissa University, Baripada Email: babitapattanaik@rediffmail.com Presentation Outline To Educate and Inform You 1. About RFID system 2. How does RFID works 3. Why RFID 4. Agenda & Concern 5. Implementation 6. Benefit 7. Conclusion 1. About RFID system Brief History What is RFID system RFID Architecture & Key Components Standards Key Agenda & Concern for Library Brief History RFID (Radio Frequency Identifier) an Auto-ID data collection system surveillance, using RF waves for Identifying, Tracking and doing Management of material flow. Basic concept behind RFID is same as “Mirror-SunlightReflection theory ” Invented and used from (Early 1940’s) Commercial Operation begun from 1960’s … In 1970s developers, inventors, companies, academic institution and government sectors were actively worked on RFID Most common application were tracked person and objects, identified goods in supply chain, reusable container, high value tools, security, controlling access to building, networks, payment systems and other assets. What is RFID system An AUTO-ID based System RFID is an acronym for radio frequency identification. Briefly the RF stand for “radiofrequency” and ID means “identifier” that allows an item, for instance a library book, to be identified, accessed, stored, reprogrammed and communicated by using radio waves A method for controlling inventory Automatically identify objects Saving Time and Money Non-Line-Sight Communication Minimize Work Stress of Staff Offering Self Check out/in Gathering statistics on used Items Improve Customer Services And Easily Prevent Theft RFID Architecture As depicted in figure.1 the whole operation are worked under three key phases. Firstly items-tag scanned by reader; are Backend Database Secondly in backend transmitted data coming through antenna (RF-wave) are being recognized by RFID-based system PC. It acts as a middleware communication gateway among items, reader and system database; And at the end it filters out and store data in RFIDdatabases for checking the data fault and relevant operation. Tags Reader Application Gatewa y Scanned Database User Interface Fig.1. A General Overview of RFID Architecture TAGS Key Components READER SELF CHECK-OUT/IN INVENTORY READER BOOK DROP READER MIDDLEWARE (PC) SECURITY GATE LABEL PRINTER SORTER Paper thin 2X2inch in size. Read-only or Read/writable Storage capacity of 2KB data that contain 96bits serial number. Tags come in many flavors: passive, battery assisted, active, different frequencies, various anticollision technologies, printed/wire wounded antenna etc. TAGS TAG-TYPES FOR LIBRARY ITEMS Type: Contact less Read/Write Operating Frequency: 13.56 MHz. (HF-High Frequency). Capacity: 512 bit up to 10Kbits Common Usage: Ticketing, Library Management, anti-counterfeiting Standard Deployment: Electronic label application, Electronic Article Surveillance Tested Read Range: Maximum 10cm Read, and Write 5cm Detection (The distance may vary depend upon the environment) Multi-Detection: Yes Max read quantity: 30 labels/sec Size: 82mm x 49mm Material: Opaque matt paper 79 Color: White Weight: 0.5g Compliance: ICODE, SLI Regulatory Specifications: ISO 15693 Operating Specifications: Waterproof and dustproof READER A device that is used to interrogate an Tag. Basic components are A scanning Antenna A transceiver with a decoder to interpret data helps in personalize & read data. SELF CHECK-OUT/IN Dual Function(rfid & barcode) Store information about item. Performance statistics Multiple items can be checked out at a time Easier to Use. INVENTORY READER A compact and light weight hand held device Comfortable to use High storage capacity Multi Functional (such as shelving, sorting, searching, weeding and reading) Enhanced Security. BOOK DROP READER Self Checks-in books when patrons drop them in bookdrop ….. MIDDLE WARE Provide reader connectivity to other systems on the network. Translate data and transmit to its other application SECURITY GATE Verify that all books leaving the library have been checked out. Detect Theft and Prevent unauthorized removal of material Standard RFID STANDARD USED FOR LIBRARY: Standard : ISO-15693 Frequency: 13.56 MHZ Dimension : 400mm X 200mm X 120mm Housing : Metal Data Interface: RS 232 Protocol : SIP and/or API (presently using STX/ETX communication protocol) Indicator : Tag Data LED and Power LED Voltage : 230 Volt Certification : CE and Radio Approval Frequency: 13.56 MHZ Key feature of 13.56Mhz is Tags are less expensive due to their limited coil required. Read range about 1-2feet. Some tags are anti collision collects, uses, stores and broadcast data Controlled all conveyor setting Key Agenda & Concern for Library AGENDA Material security Financial Liabilities Personal Comfort and Safety CONCERN Privacy and Problem patrons To Increase productivity Improve customer services Maintain current staff level Material Security: AGENDA Use of Hardware and Software Personal Safety: Reader Range Read Quality Staff stress Data Integrity Theft detection Frequency PRIVACY & SECURITY: Privacy Tracking Individuals Inappropriate use of personal data Theft of Information Ownership and Legal issue Problem Patrons: Inadequate Encryption Block the RF-Wave Database hacked Items with Odd shape & metal component Financial Liabilities: Doc.like pamphlet, sheet One Time Implementation costs music, magazine etc. System maintenance & Licensing Staff & Patron Security system costs interaction Tags cost CONCERN Increase productivity More accurate shelving Time saving, speedy Provide security and material controls More opportunity for enhanced services Durability, longevity and Insurance Improve customer services Materials more readily available Less time wasted in line to check out/ check in Fewer items remain charged to accounts Improved privacy since staff never sees what’s being Maintain current staff level checked out Repetitive Stress Reduce handling of item with RFID How does RFID works PC Up-to-date Time DATA FLOW RFID-READER RFID-TAG RF COUPLING Energy PERSONALIZER (Application Device) Fig.1. Items personalized model for RFID system Why RFID I. Barcode Vs RFID II. Inventory Management III. Economic Facts IV. Customer Satisfaction Barcode Vs RFID Inventory Management Read/Write - Ability to add information directly to tags enables each unique asset to carry its own unique history Non-contact Reads - Ability to read tags at a distance, under a variety of environmental conditions, without physical manipulation of the asset Fast Read - Ability to simultaneously read large numbers (10001750 tags/sec) of items Automation - Requires less human intervention Authenticity - Each RFID chip is unique and can not be replicated Increase Security Economic Facts Security of material is automatic without staff intervention. Automatic items check out/ check in and sorting can be COST FACTORS accomplished with LMS circulation software, therefore eliminating extra processing time of staff and make it Implementation cost economically viable. Cost Avoidance Currently Missing Items statistics Replacement cost Selection, classification, processing, cost of searching, notification etc. is improved one Existing Material Management system Staff cost (manual way to do house keeping job) Eliminates the time consuming process of barcode scanning and reading. High speed Inventorying High Reliability The RFID readers are highly reliable, almost 100% detection rate. Multiple items can be checked out/ checked in at a time. Make library staff free from the risk of repetitive stress injuries. Longevity RFID tags last longer than barcodes • Cost of RFID tags • Reader • Hand held device • software interface • Others On going system Cost • System maintenance • Security system cost • Work station maintenance • Technical staff Customer Satisfaction Materials control, Security, High speed Inventorying, Faster Check-out/-in, Longevity of Tags, Reduce staff stress, Prevent Theft, Searching, notifying and Gathering statistics on items become easy. ---------- It Made Sense!! Implementation Start Begin with your goals. Why you want RFID? Identify Where RFID will deliver value to your Library and its Customers. Plan Implementation Ready your organization for change. Benefit Better Collection Management Shelves rectification and Verification Improved Productivity and Services Wireless inventory management Faster Checked Out/In Prevent Theft Quick Searching, Weeding & inventory audit Cost Avoidance Eliminate Manual Labor Cost. Improve automation process Reduce Repetitive Stress Injury Conclusion RFID technology is taking off in libraries at an increasingly rapid pace. Though there are few libraries employing this technology today, but due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development. It is easy to envision that, the RFID tags contents will increase in power, prices are expected to decline and tag will dramatically improve its efficiency, security and accuracy. Also major concerns need to be addressed for successfully implementing this technology. So that it will change our personal and work lives in library and adorns the conventional library management with a new idea and usher for a bright future. RFID IS A SUPPORTING TECHNOLOGY--- NOT A COMPETING !! 3M-LIBRARY SYSTEM THANK “YOU”