Download presentation
Presentation is loading. Please wait.
Published byἨλύσια Ταρσούλη Modified over 5 years ago
1
THE SECURITY FOR LIBRARY Mr. Bibhuti bhusan Pattanaik (Asst
THE SECURITY FOR LIBRARY Mr. Bibhuti bhusan Pattanaik (Asst. Librarian), I.T.S - IM Library, Greater Noida, Ms. Babita Pattanaik (Lecturer), North Orissa University, Baripada
2
Presentation Outline To Educate and Inform You How does RFID works
About RFID system How does RFID works Why RFID Agenda & Concern Implementation Benefit Conclusion
3
1. About RFID system Brief History What is RFID system
RFID Architecture & Key Components Standards Key Agenda & Concern for Library
4
Brief History RFID (Radio Frequency Identifier) an Auto-ID data collection system surveillance, using RF waves for Identifying, Tracking and doing Management of material flow. Basic concept behind RFID is same as “Mirror-Sunlight-Reflection theory ” Invented and used from (Early 1940’s) Commercial Operation begun from 1960’s … In 1970s developers, inventors, companies, academic institution and government sectors were actively worked on RFID Most common application were tracked person and objects, identified goods in supply chain, reusable container, high value tools, security, controlling access to building, networks, payment systems and other assets.
5
What is RFID system An AUTO-ID based System
RFID is an acronym for radio frequency identification. Briefly the RF stand for “radio-frequency” and ID means “identifier” that allows an item, for instance a library book, to be identified, accessed, stored, reprogrammed and communicated by using radio waves A method for controlling inventory Automatically identify objects Saving Time and Money Non-Line-Sight Communication Minimize Work Stress of Staff Offering Self Check out/in Gathering statistics on used Items Improve Customer Services And Easily Prevent Theft
6
Fig.1. A General Overview of RFID Architecture
As depicted in figure.1 the whole operation are worked under three key phases. Firstly items-tag are scanned by reader; Secondly in backend transmitted data coming through antenna (RF-wave) are being recognized by RFID-based system PC. It acts as a middleware communication gateway among items, reader and system database; And at the end it filters out and store data in RFID-databases for checking the data fault and relevant operation. Tags Reader Gateway Database Application User Interface Backend Fig.1. A General Overview of RFID Architecture Scanned
7
Key Components TAGS READER SELF CHECK-OUT/IN INVENTORY READER
BOOK DROP READER MIDDLEWARE (PC) SECURITY GATE LABEL PRINTER SORTER Key Components
8
TAGS Paper thin 2X2inch in size. Read-only or Read/writable
Storage capacity of 2KB data that contain 96bits serial number. Tags come in many flavors: passive, battery assisted, active, different frequencies, various anti-collision technologies, printed/wire wounded antenna etc.
9
TAG-TYPES FOR LIBRARY ITEMS
10
Type: Contact less Read/Write Operating Frequency: 13.56 MHz. (HF-High Frequency). Capacity: 512 bit up to 10Kbits Common Usage: Ticketing, Library Management, anti-counterfeiting Standard Deployment: Electronic label application, Electronic Article Surveillance Tested Read Range: Maximum 10cm Read, and Write 5cm Detection (The distance may vary depend upon the environment) Multi-Detection: Yes Max read quantity: 30 labels/sec Size: 82mm x 49mm Material: Opaque matt paper 79 Color: White Weight: 0.5g Compliance: ICODE, SLI Regulatory Specifications: ISO 15693 Operating Specifications: Waterproof and dustproof
11
READER A device that is used to interrogate an Tag.
Basic components are A scanning Antenna A transceiver with a decoder to interpret data helps in personalize & read data.
12
SELF CHECK-OUT/IN Dual Function(rfid & barcode)
Store information about item. Performance statistics Multiple items can be checked out at a time Easier to Use.
13
INVENTORY READER Comfortable to use High storage capacity
A compact and light weight hand held device Comfortable to use High storage capacity Multi Functional (such as shelving, sorting, searching, weeding and reading) Enhanced Security.
14
BOOK DROP READER Self Checks-in books when patrons drop them in book-drop …..
15
MIDDLE WARE Provide reader connectivity to other systems on the network. Translate data and transmit to its other application
16
SECURITY GATE Verify that all books leaving the library have been checked out. Detect Theft and Prevent unauthorized removal of material
17
Standard RFID STANDARD USED FOR LIBRARY: Standard : ISO-15693
Frequency: MHZ Dimension : 400mm X 200mm X 120mm Housing : Metal Data Interface: RS 232 Protocol : SIP and/or API (presently using STX/ETX communication protocol) Indicator : Tag Data LED and Power LED Voltage : 230 Volt Certification : CE and Radio Approval
18
Frequency: 13.56 MHZ Key feature of 13.56Mhz is
Tags are less expensive due to their limited coil required. Read range about 1-2feet. Some tags are anti collision collects, uses, stores and broadcast data Controlled all conveyor setting
19
Key Agenda & Concern for Library
Material security Financial Liabilities Personal Comfort and Safety Privacy and Problem patrons CONCERN To Increase productivity Improve customer services Maintain current staff level
20
AGENDA Material Security: Personal Safety: Staff stress
Use of Hardware and Software Reader Range Read Quality Data Integrity Frequency AGENDA Personal Safety: Staff stress Theft detection Privacy PRIVACY & SECURITY: Tracking Individuals Inappropriate use of personal data Theft of Information Ownership and Legal issue Inadequate Encryption Database hacked Problem Patrons: Block the RF-Wave Items with Odd shape & metal component Doc.like pamphlet, sheet music, magazine etc. Staff & Patron interaction Financial Liabilities: One Time Implementation costs System maintenance & Licensing Security system costs Tags cost
21
CONCERN Increase productivity More accurate shelving
Time saving, speedy Provide security and material controls More opportunity for enhanced services Durability, longevity and Insurance CONCERN Improve customer services Materials more readily available Less time wasted in line to check out/ check in Fewer items remain charged to accounts Improved privacy since staff never sees what’s being checked out Maintain current staff level Repetitive Stress Reduce handling of item with RFID
22
PERSONALIZER (Application Device)
How does RFID works RFID-READER RFID-TAG PERSONALIZER (Application Device) DATA FLOW RF COUPLING Time Energy Up-to-date Fig.1. Items personalized model for RFID system PC
23
Why RFID Barcode Vs RFID Inventory Management Economic Facts
Customer Satisfaction
24
Barcode Vs RFID
25
Inventory Management Read/Write
- Ability to add information directly to tags enables each unique asset to carry its own unique history Non-contact Reads - Ability to read tags at a distance, under a variety of environmental conditions, without physical manipulation of the asset Fast Read - Ability to simultaneously read large numbers ( tags/sec) of items Automation - Requires less human intervention Authenticity - Each RFID chip is unique and can not be replicated
26
Economic Facts Increase Security Cost Avoidance High Reliability
Security of material is automatic without staff intervention. Automatic items check out/ check in and sorting can be accomplished with LMS circulation software, therefore eliminating extra processing time of staff and make it economically viable. Cost Avoidance Currently Missing Items statistics Replacement cost Selection, classification, processing, cost of searching, notification etc. is improved one Existing Material Management system Staff cost (manual way to do house keeping job) Eliminates the time consuming process of barcode scanning and reading. High speed Inventorying High Reliability The RFID readers are highly reliable, almost 100% detection rate. Multiple items can be checked out/ checked in at a time. Make library staff free from the risk of repetitive stress injuries. Longevity RFID tags last longer than barcodes COST FACTORS Implementation cost Cost of RFID tags Reader Hand held device software interface Others On going system Cost System maintenance Security system cost Work station maintenance Technical staff
27
Customer Satisfaction
Materials control, Security, High speed Inventorying, Faster Check-out/-in, Longevity of Tags, Reduce staff stress, Prevent Theft, Searching, notifying and Gathering statistics on items become easy. It Made Sense!!
28
Implementation Start Why you want RFID? Begin with your goals.
Identify Where RFID will deliver value to your Library and its Customers. Plan Implementation Ready your organization for change.
29
Benefit Better Collection Management
Shelves rectification and Verification Improved Productivity and Services Wireless inventory management Faster Checked Out/In Prevent Theft Quick Searching, Weeding & inventory audit Cost Avoidance Eliminate Manual Labor Cost. Improve automation process Reduce Repetitive Stress Injury
30
Conclusion RFID technology is taking off in libraries at an increasingly rapid pace. Though there are few libraries employing this technology today, but due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development. It is easy to envision that, the RFID tags contents will increase in power, prices are expected to decline and tag will dramatically improve its efficiency, security and accuracy. Also major concerns need to be addressed for successfully implementing this technology. So that it will change our personal and work lives in library and adorns the conventional library management with a new idea and usher for a bright future. RFID IS A SUPPORTING TECHNOLOGY--- NOT A COMPETING !! 3M-LIBRARY SYSTEM
31
THANK “YOU”
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.