THE SECURITY FOR LIBRARY Mr. Bibhuti bhusan Pattanaik (Asst. Librarian), I.T.S - IM Library, Greater Noida, Ms. Babita Pattanaik.

Slides:



Advertisements
Similar presentations
RFID IN UNIVERSITY OF JAMMU RFID is used in libraries primarily to automate the book handling process including checkout, inventory maintenance, and check-in.
Advertisements

Cash Register Express POS Software. Why Computerize? ● Speed Customer Checkout (faster than a cash register) ● Reduce Theft (2 %) ● Reduce Shrinkage (2.
Follett 2500 RFID Training.
Speed to Market RFID at Liz Claiborne Solving an Internal Distribution Issue Brian O’Donnell 7/22/04.
RFID – Lessons Learned July 22, 2004 Russ Brown. Agenda vRFID Basics vRFID Vision vRFID Upside vRFID Concerns vRFID Lessons Learned vRFID Future State.
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
Wireless Networks for Multi- Robot Communications Creating a Sensor Network of Robots.
Rafrex LLC - RFID Solutions
Technology Update AVI Vehicle Management Systems Airport Ground Transportation Association Spring Conference April 8, 2008.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
AutoID Automatic Identification Technologies at the MIT Media Lab Gregory Chittim – ES 112 – 03S.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
8/2/2015RapidRadio Solutions Pvt. Ltd.1 RFID BASED LIBRARY MANAGEMENT SYSTEM.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
Lecture Notes #7 Radio Frequency Identification (RFID)
Radio-frequency identification (RFID)
RFID Implementation in IIT Madras: A Case Study Dr. Harish Chandra Librarian Indian Institute of Technology Madras URL:
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
Using Technology to Streamline the Inventory Process Sean Pugatch, AssetWorks ext
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Developing RFID Application In Supply Chain
ShopKeeper was designed from the ground up to manage your entire fleet maintenance operations … from 1 user to 100, including full security features that.
RFID Inventory Management And Tracking System Greg McDaniel Hashem Garner Adam Kesner Thomas Harris.
Khanh Huynh Project Leader Dat Tu Systems Analyst Sandy Fung Team Representative Patrick de Leon Lead Programmer Ching Fei Chan Documentation Specialist.
DESIGN & IMPLEMENTATION OF SMALL SCALE WIRELESS SENSOR NETWORK
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Radio Frequency.
Trends in apparel supply chain management. Supply chain Supply chain consists of all the parties involved directly or indirectly in fulfilling a customers.
RFID implementation in a multi-branch system Susanna Aakko, Helsinki Ewa Helgesson, Göteborg Public Libraries.
Radio Frequency IDentification RFID Technology Presented by Elaine Contant University of Arkansas Libraries – Fayetteville December, 2008.
Radio Frequency Identification The next thing…. Some definitions Self service –Patrons checking material in and / or out themselves either using barcode.
Radio Frequency Identification  RFID technology is made up of a tag and a reader.  Tags used in libraries are “passive” – they do not contain a battery.
مدیریت تولید پیشرفته جلسه پنجم : Introduction: CIM, RFID
A C JOSHI LIBRARY A C Joshi Library is considered to be one of the best libraries of India: Annual budget approx 5 Crores Annual budget approx 5 Crores.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
A SURVEY OF APPLICATIONS AND REQUIREMENTS OF UNIQUE IDENTIFICATION SYSTEMS AND RFID TECHNIQUES R 蘇昱彰 1.
RFID TECHNOLOGY IN BABARIA INSTITUTE OF TECHNNOLOGY (BIT):an OVERVIEW BY BINAL H JOSHI LIBRARIAN BABARIA INSTITUTE OF TECHNOLOGY VADODARA.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
Radio-Frequency Identification David Schroeder Bobby Miller B&D Grassroots Marketing.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
RFID (Radio Frequency Identification) T.F.G.P.POLYTECHNICH - ADIPUR (KUTCH) HITESH C.PATEL SHAHGULAM KHWAJAJI.
Radio Frequency Identification
June 5 – Orlando "Writing RFID Tags" Bob Brennan Technical Evangelist Integrated Manufacturing Systems, Inc.
The Supply Chain Doctors Warehousing Fundamentals The Supply Chain Doctors Kimball Bullington, Ph.D. Cliff Welborn, Ph.D.
E-BILLING MOTIVATION. Introduction  E-billing is the electronic delivery of financial documents to the customer, that represents and replaces the conventional.
Information Management System based on RFID technology in District Court in Warsaw Warsaw 2015.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Shaun McGorry Executive Briefing July 9,  Radio-frequency identification (RFID): the use of an object (typically referred to as an RFID tag) applied.
RFID Technology Lecture for week 5 Dhruba Sen
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-range.
LIBRARY AUTOMATION USING RFID LIBRARY AUTOMATION USING RFID Presented by; Joju Mohan -67 Ninitha Xavier -68 Priyanka C.P -69 Rahul K.Raj -70.
Introducing RFID system in BRAC University Library.
RADIO FREQUENCY IDENTIFICATION TECHNOLOGY. By Twesige Richard.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
RADIO FREQUENCY IDENTIFICATION (RFID) FOR LIBRARIES
Radio Frequency Identification (RFID)
Rhetorical SITUATION We are at a convention for Canadian retailers, transportation brokers and yard management companies. I am a representative from.
Radio Frequency IDentification
RFID BASED LIBRARY MANAGEMENT SYSTEM
RFID Technology & It’s Uses
Team 7 Technical Presentation
Radio Frequency Identification
Stallion Systems & Solution Pvt Ltd
TYRE MANAGEMENT SOLUTION
THE SECURITY FOR LIBRARY Mr. Bibhuti bhusan Pattanaik (Asst
Automatic Identification and Data Collection Technology
Mobile Computing Lecture Materials By Bintang Eka Putera.
Presentation transcript:

THE SECURITY FOR LIBRARY Mr. Bibhuti bhusan Pattanaik (Asst. Librarian), I.T.S - IM Library, Greater Noida, Ms. Babita Pattanaik (Lecturer), North Orissa University, Baripada

Presentation Outline To Educate and Inform You 1. About RFID system 2. How does RFID works 3. Why RFID 4. Agenda & Concern 5. Implementation 6. Benefit 7. Conclusion

1. About RFID system Brief History Brief History What is RFID system What is RFID system RFID Architecture & Key Components RFID Architecture & Key Components Standards Standards Key Agenda & Concern for Library Key Agenda & Concern for Library

Brief History RFID (Radio Frequency Identifier) an Auto-ID data collection system surveillance, using RF waves for Identifying, Tracking and doing Management of material flow. Basic concept behind RFID is same as “Mirror-Sunlight- Reflection theory ” Invented and used from (Early 1940’s) Commercial Operation begun from 1960’s … In 1970s developers, inventors, companies, academic institution and government sectors were actively worked on RFID Most common application were tracked person and objects, identified goods in supply chain, reusable container, high value tools, security, controlling access to building, networks, payment systems and other assets.

What is RFID system RFID is an acronym for radio frequency identification. Briefly the RF stand for “radio- frequency” and ID means “identifier” that allows an item, for instance a library book, to be identified, accessed, stored, reprogrammed and communicated by using radio waves A method for controlling inventory Automatically identify objects An AUTO-ID based System Offering Self Check out/in Saving Time and Money Gathering statistics on used Items Minimize Work Stress of Staff Easily Prevent Theft Improve Customer Services And Non-Line-Sight Communication

RFID Architecture RFID Architecture Tags Reader Gatewa y Database Application User Interface Backend Fig.1. A General Overview of RFID Architecture Scanned As depicted in figure.1 the whole operation are worked under three key phases.  F F irstly items-tag are scanned by reader;  S S econdly in backend transmitted data coming through antenna (RF-wave) are being recognized by RFID-based system PC. It acts as a middleware communication gateway among items, reader and system database;  A A nd at the end it filters out and store data in RFID- databases for checking the data fault and relevant operation.

Key Components  TAGS  READER  SELF CHECK-OUT/IN  INVENTORY READER  BOOK DROP READER  MIDDLEWARE (PC)  SECURITY GATE  LABEL PRINTER  SORTER

TAGS Paper thin 2X2inch in size. Read-only or Read/writable Storage capacity of 2KB data that contain 96bits serial number. Tags come in many flavors: passive, battery assisted, active, different frequencies, various anti- collision technologies, printed/wire wounded antenna etc.

TAG-TYPES FOR LIBRARY ITEMS

Type: Contact less Read/Write Operating Frequency: MHz. (HF-High Frequency). Capacity: 512 bit up to 10Kbits Common Usage: Ticketing, Library Management, anti-counterfeiting Standard Deployment: Electronic label application, Electronic Article Surveillance Tested Read Range: Maximum 10cm Read, and Write 5cm Detection (The distance may vary depend upon the environment) Multi-Detection:Yes Max read quantity: 30 labels/sec Size: 82mm x 49mm Material: Opaque matt paper 79 Color:White Weight:0.5g Compliance: ICODE, SLI Regulatory Specifications: ISO OperatingSpecifications: Waterproof and dustproof Waterproof and dustproof

READER A device that is used to interrogate an Tag. Basic components are  A scanning Antenna  A transceiver with a decoder to interpret data  helps in personalize & read data.

SELF CHECK-OUT/IN  Dual Function(rfid & barcode)  Store information about item.  Performance statistics  Multiple items can be checked out at a time  Easier to Use.

INVENTORY READER  A compact and light weight hand held device  Comfortable to use  High storage capacity  Multi Functional (such as shelving, sorting, searching, weeding and reading)  Enhanced Security.

BOOK DROP READER Self Checks-in books when patrons drop them in book- drop …..

MIDDLE WARE  Provide reader connectivity to other systems on the network.  Translate data and transmit to its other application

SECURITY GATE  Verify that all books leaving the library have been checked out.  Detect Theft and  Prevent unauthorized removal of material

Standard RFID STANDARD USED FOR LIBRARY:  Standard : ISO  Frequency: MHZ  Dimension : 400mm X 200mm X 120mm  Housing : Metal  Data Interface: RS 232  Protocol : SIP and/or API (presently using STX/ETX communication protocol)  Indicator : Tag Data LED and Power LED  Voltage : 230 Volt  Certification : CE and Radio Approval

Frequency: MHZ Key feature of 13.56Mhz is Key feature of 13.56Mhz is Tags are less expensive due to their limited coil required. Tags are less expensive due to their limited coil required. Read range about 1-2feet. Read range about 1-2feet. Some tags are anti collision Some tags are anti collision collects, uses, stores and broadcast data collects, uses, stores and broadcast data Controlled all conveyor setting Controlled all conveyor setting

Key Agenda & Concern for Library AGENDA Material security Material security Financial Liabilities Financial Liabilities Personal Comfort and Safety Personal Comfort and Safety Privacy and Privacy and Problem patrons Problem patrons CONCERN To Increase productivity Improve customer services Maintain current staff level

AGENDA Material Security: Use of Hardware and Software Use of Hardware and Software Reader Range Reader Range Read Quality Read Quality Data Integrity Data Integrity Frequency Frequency Personal Safety: Staff stress Staff stress Theft detection Theft detection Privacy Privacy Financial Liabilities: One Time Implementation costs One Time Implementation costs System maintenance & Licensing System maintenance & Licensing Security system costs Security system costs Tags cost Tags cost Problem Patrons: Block the RF-Wave Block the RF-Wave Items with Odd shape & metal component Items with Odd shape & metal component Doc.like pamphlet, sheet music, magazine etc. Doc.like pamphlet, sheet music, magazine etc. Staff & Patron interaction Staff & Patron interaction PRIVACY & SECURITY: Tracking Individuals Tracking Individuals Inappropriate use of personal data Inappropriate use of personal data Theft of Information Theft of Information Ownership and Legal issue Ownership and Legal issue Inadequate Encryption Inadequate Encryption Database hacked Database hacked

Increase productivity More accurate shelving More accurate shelving Time saving, speedy Time saving, speedy Provide security and material controls Provide security and material controls More opportunity for enhanced services More opportunity for enhanced services Durability, longevity and Insurance Durability, longevity and Insurance Improve customer services Materials more readily available Materials more readily available Less time wasted in line to check out/ check in Less time wasted in line to check out/ check in Fewer items remain charged to accounts Fewer items remain charged to accounts Improved privacy since staff never sees what’s being checked out Improved privacy since staff never sees what’s being checked out CONCERN Maintain current staff level Repetitive Stress Repetitive Stress Reduce handling of item with RFID Reduce handling of item with RFID

How does RFID works RFID-READERRFID-TAG PERSONALIZER (Application Device) DATA FLOW RF COUPLING Time Energy Up-to-date Fig.1. Items personalized model for RFID system PC

Why RFID I. Barcode Vs RFID II. Inventory Management III. Economic Facts IV. Customer Satisfaction

Barcode Vs RFID

Inventory Management Read/Write Read/Write - Ability to add information directly to tags enables each unique asset to carry its own unique history Non-contact Reads Non-contact Reads - Ability to read tags at a distance, under a variety of environmental conditions, without physical manipulation of the asset - Ability to read tags at a distance, under a variety of environmental conditions, without physical manipulation of the asset Fast Read Fast Read - Ability to simultaneously read large numbers ( tags/sec) of items - Ability to simultaneously read large numbers ( tags/sec) of items Automation Automation - Requires less human intervention Authenticity Authenticity - Each RFID chip is unique and can not be replicated - Each RFID chip is unique and can not be replicated

Economic Facts Increase Security Security of material is automatic without staff intervention. Security of material is automatic without staff intervention. Automatic items check out/ check in and sorting can be accomplished with LMS circulation software, therefore eliminating extra processing time of staff and make it economically viable. Automatic items check out/ check in and sorting can be accomplished with LMS circulation software, therefore eliminating extra processing time of staff and make it economically viable. Cost Avoidance Currently Missing Items statistics Currently Missing Items statistics Replacement cost Replacement cost Selection, classification, processing, cost of searching, notification etc. is improved one Selection, classification, processing, cost of searching, notification etc. is improved one Existing Material Management system Existing Material Management system Staff cost (manual way to do house keeping job) Staff cost (manual way to do house keeping job) Eliminates the time consuming process of barcode scanning and reading. Eliminates the time consuming process of barcode scanning and reading. High speed Inventorying High speed Inventorying High Reliability The RFID readers are highly reliable, almost 100% detection rate. The RFID readers are highly reliable, almost 100% detection rate. Multiple items can be checked out/ checked in at a time. Multiple items can be checked out/ checked in at a time. Make library staff free from the risk of repetitive stress injuries. Make library staff free from the risk of repetitive stress injuries.Longevity RFID tags last longer than barcodes RFID tags last longer than barcodes COST FACTORS Implementation cost Cost of RFID tags Reader Hand held device software interface Others On going system Cost System maintenance Security system cost Work station maintenance Technical staff

Customer Satisfaction Materials control, Materials control, Security, Security, High speed Inventorying, High speed Inventorying, Faster Check-out/-in, Faster Check-out/-in, Longevity of Tags, Longevity of Tags, Reduce staff stress, Reduce staff stress, Prevent Theft, Prevent Theft, Searching, notifying and Searching, notifying and Gathering statistics on items become easy. Gathering statistics on items become easy It Made Sense!! It Made Sense!!

Implementation Start Identify Plan Implementation Why you want RFID? Begin with your goals. Where RFID will deliver value to your Library and its Customers. Ready your organization for change.

Benefit  B Better Collection Management  Shelves rectification and Verification  Improved Productivity and Services  Wireless inventory management  Faster Checked Out/In  Prevent Theft  Quick Searching, Weeding & inventory audit  Cost Avoidance  Eliminate Manual Labor Cost.  Improve automation process  Reduce Repetitive Stress Injury

Conclusion RFID technology is taking off in libraries at an increasingly rapid pace. Though there are few libraries employing this technology today, but due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development. It is easy to envision that, the RFID tags contents will increase in power, prices are expected to decline and tag will dramatically improve its efficiency, security and accuracy. Also major concerns need to be addressed for successfully implementing this technology. So that it will change our personal and work lives in library and adorns the conventional library management with a new idea and usher for a bright future. RFID IS A SUPPORTING TECHNOLOGY--- NOT A COMPETING !! 3M-LIBRARY SYSTEM

THANK “YOU”