Presentation is loading. Please wait.

Presentation is loading. Please wait.

THE SECURITY FOR LIBRARY Mr. Bibhuti bhusan Pattanaik (Asst. Librarian), I.T.S - IM Library, Greater Noida, Ms. Babita Pattanaik.

Similar presentations


Presentation on theme: "THE SECURITY FOR LIBRARY Mr. Bibhuti bhusan Pattanaik (Asst. Librarian), I.T.S - IM Library, Greater Noida, Ms. Babita Pattanaik."— Presentation transcript:

1 THE SECURITY FOR LIBRARY Mr. Bibhuti bhusan Pattanaik (Asst. Librarian), I.T.S - IM Library, Greater Noida, Ms. Babita Pattanaik (Lecturer), North Orissa University, Baripada

2 Presentation Outline To Educate and Inform You 1. About RFID system 2. How does RFID works 3. Why RFID 4. Agenda & Concern 5. Implementation 6. Benefit 7. Conclusion

3 1. About RFID system Brief History Brief History What is RFID system What is RFID system RFID Architecture & Key Components RFID Architecture & Key Components Standards Standards Key Agenda & Concern for Library Key Agenda & Concern for Library

4 Brief History RFID (Radio Frequency Identifier) an Auto-ID data collection system surveillance, using RF waves for Identifying, Tracking and doing Management of material flow. Basic concept behind RFID is same as “Mirror-Sunlight- Reflection theory ” Invented and used from (Early 1940’s) Commercial Operation begun from 1960’s … In 1970s developers, inventors, companies, academic institution and government sectors were actively worked on RFID Most common application were tracked person and objects, identified goods in supply chain, reusable container, high value tools, security, controlling access to building, networks, payment systems and other assets.

5 What is RFID system RFID is an acronym for radio frequency identification. Briefly the RF stand for “radio- frequency” and ID means “identifier” that allows an item, for instance a library book, to be identified, accessed, stored, reprogrammed and communicated by using radio waves A method for controlling inventory Automatically identify objects An AUTO-ID based System Offering Self Check out/in Saving Time and Money Gathering statistics on used Items Minimize Work Stress of Staff Easily Prevent Theft Improve Customer Services And Non-Line-Sight Communication

6 RFID Architecture RFID Architecture Tags Reader Gatewa y Database Application User Interface Backend Fig.1. A General Overview of RFID Architecture Scanned As depicted in figure.1 the whole operation are worked under three key phases.  F F irstly items-tag are scanned by reader;  S S econdly in backend transmitted data coming through antenna (RF-wave) are being recognized by RFID-based system PC. It acts as a middleware communication gateway among items, reader and system database;  A A nd at the end it filters out and store data in RFID- databases for checking the data fault and relevant operation.

7 Key Components  TAGS  READER  SELF CHECK-OUT/IN  INVENTORY READER  BOOK DROP READER  MIDDLEWARE (PC)  SECURITY GATE  LABEL PRINTER  SORTER

8 TAGS Paper thin 2X2inch in size. Read-only or Read/writable Storage capacity of 2KB data that contain 96bits serial number. Tags come in many flavors: passive, battery assisted, active, different frequencies, various anti- collision technologies, printed/wire wounded antenna etc.

9 TAG-TYPES FOR LIBRARY ITEMS

10 Type: Contact less Read/Write Operating Frequency: MHz. (HF-High Frequency). Capacity: 512 bit up to 10Kbits Common Usage: Ticketing, Library Management, anti-counterfeiting Standard Deployment: Electronic label application, Electronic Article Surveillance Tested Read Range: Maximum 10cm Read, and Write 5cm Detection (The distance may vary depend upon the environment) Multi-Detection:Yes Max read quantity: 30 labels/sec Size: 82mm x 49mm Material: Opaque matt paper 79 Color:White Weight:0.5g Compliance: ICODE, SLI Regulatory Specifications: ISO OperatingSpecifications: Waterproof and dustproof Waterproof and dustproof

11 READER A device that is used to interrogate an Tag. Basic components are  A scanning Antenna  A transceiver with a decoder to interpret data  helps in personalize & read data.

12 SELF CHECK-OUT/IN  Dual Function(rfid & barcode)  Store information about item.  Performance statistics  Multiple items can be checked out at a time  Easier to Use.

13 INVENTORY READER  A compact and light weight hand held device  Comfortable to use  High storage capacity  Multi Functional (such as shelving, sorting, searching, weeding and reading)  Enhanced Security.

14 BOOK DROP READER Self Checks-in books when patrons drop them in book- drop …..

15 MIDDLE WARE  Provide reader connectivity to other systems on the network.  Translate data and transmit to its other application

16 SECURITY GATE  Verify that all books leaving the library have been checked out.  Detect Theft and  Prevent unauthorized removal of material

17 Standard RFID STANDARD USED FOR LIBRARY:  Standard : ISO  Frequency: MHZ  Dimension : 400mm X 200mm X 120mm  Housing : Metal  Data Interface: RS 232  Protocol : SIP and/or API (presently using STX/ETX communication protocol)  Indicator : Tag Data LED and Power LED  Voltage : 230 Volt  Certification : CE and Radio Approval

18 Frequency: MHZ Key feature of 13.56Mhz is Key feature of 13.56Mhz is Tags are less expensive due to their limited coil required. Tags are less expensive due to their limited coil required. Read range about 1-2feet. Read range about 1-2feet. Some tags are anti collision Some tags are anti collision collects, uses, stores and broadcast data collects, uses, stores and broadcast data Controlled all conveyor setting Controlled all conveyor setting

19 Key Agenda & Concern for Library AGENDA Material security Material security Financial Liabilities Financial Liabilities Personal Comfort and Safety Personal Comfort and Safety Privacy and Privacy and Problem patrons Problem patrons CONCERN To Increase productivity Improve customer services Maintain current staff level

20 AGENDA Material Security: Use of Hardware and Software Use of Hardware and Software Reader Range Reader Range Read Quality Read Quality Data Integrity Data Integrity Frequency Frequency Personal Safety: Staff stress Staff stress Theft detection Theft detection Privacy Privacy Financial Liabilities: One Time Implementation costs One Time Implementation costs System maintenance & Licensing System maintenance & Licensing Security system costs Security system costs Tags cost Tags cost Problem Patrons: Block the RF-Wave Block the RF-Wave Items with Odd shape & metal component Items with Odd shape & metal component Doc.like pamphlet, sheet music, magazine etc. Doc.like pamphlet, sheet music, magazine etc. Staff & Patron interaction Staff & Patron interaction PRIVACY & SECURITY: Tracking Individuals Tracking Individuals Inappropriate use of personal data Inappropriate use of personal data Theft of Information Theft of Information Ownership and Legal issue Ownership and Legal issue Inadequate Encryption Inadequate Encryption Database hacked Database hacked

21 Increase productivity More accurate shelving More accurate shelving Time saving, speedy Time saving, speedy Provide security and material controls Provide security and material controls More opportunity for enhanced services More opportunity for enhanced services Durability, longevity and Insurance Durability, longevity and Insurance Improve customer services Materials more readily available Materials more readily available Less time wasted in line to check out/ check in Less time wasted in line to check out/ check in Fewer items remain charged to accounts Fewer items remain charged to accounts Improved privacy since staff never sees what’s being checked out Improved privacy since staff never sees what’s being checked out CONCERN Maintain current staff level Repetitive Stress Repetitive Stress Reduce handling of item with RFID Reduce handling of item with RFID

22 How does RFID works RFID-READERRFID-TAG PERSONALIZER (Application Device) DATA FLOW RF COUPLING Time Energy Up-to-date Fig.1. Items personalized model for RFID system PC

23 Why RFID I. Barcode Vs RFID II. Inventory Management III. Economic Facts IV. Customer Satisfaction

24 Barcode Vs RFID

25 Inventory Management Read/Write Read/Write - Ability to add information directly to tags enables each unique asset to carry its own unique history Non-contact Reads Non-contact Reads - Ability to read tags at a distance, under a variety of environmental conditions, without physical manipulation of the asset - Ability to read tags at a distance, under a variety of environmental conditions, without physical manipulation of the asset Fast Read Fast Read - Ability to simultaneously read large numbers ( tags/sec) of items - Ability to simultaneously read large numbers ( tags/sec) of items Automation Automation - Requires less human intervention Authenticity Authenticity - Each RFID chip is unique and can not be replicated - Each RFID chip is unique and can not be replicated

26 Economic Facts Increase Security Security of material is automatic without staff intervention. Security of material is automatic without staff intervention. Automatic items check out/ check in and sorting can be accomplished with LMS circulation software, therefore eliminating extra processing time of staff and make it economically viable. Automatic items check out/ check in and sorting can be accomplished with LMS circulation software, therefore eliminating extra processing time of staff and make it economically viable. Cost Avoidance Currently Missing Items statistics Currently Missing Items statistics Replacement cost Replacement cost Selection, classification, processing, cost of searching, notification etc. is improved one Selection, classification, processing, cost of searching, notification etc. is improved one Existing Material Management system Existing Material Management system Staff cost (manual way to do house keeping job) Staff cost (manual way to do house keeping job) Eliminates the time consuming process of barcode scanning and reading. Eliminates the time consuming process of barcode scanning and reading. High speed Inventorying High speed Inventorying High Reliability The RFID readers are highly reliable, almost 100% detection rate. The RFID readers are highly reliable, almost 100% detection rate. Multiple items can be checked out/ checked in at a time. Multiple items can be checked out/ checked in at a time. Make library staff free from the risk of repetitive stress injuries. Make library staff free from the risk of repetitive stress injuries.Longevity RFID tags last longer than barcodes RFID tags last longer than barcodes COST FACTORS Implementation cost Cost of RFID tags Reader Hand held device software interface Others On going system Cost System maintenance Security system cost Work station maintenance Technical staff

27 Customer Satisfaction Materials control, Materials control, Security, Security, High speed Inventorying, High speed Inventorying, Faster Check-out/-in, Faster Check-out/-in, Longevity of Tags, Longevity of Tags, Reduce staff stress, Reduce staff stress, Prevent Theft, Prevent Theft, Searching, notifying and Searching, notifying and Gathering statistics on items become easy. Gathering statistics on items become easy It Made Sense!! It Made Sense!!

28 Implementation Start Identify Plan Implementation Why you want RFID? Begin with your goals. Where RFID will deliver value to your Library and its Customers. Ready your organization for change.

29 Benefit  B Better Collection Management  Shelves rectification and Verification  Improved Productivity and Services  Wireless inventory management  Faster Checked Out/In  Prevent Theft  Quick Searching, Weeding & inventory audit  Cost Avoidance  Eliminate Manual Labor Cost.  Improve automation process  Reduce Repetitive Stress Injury

30 Conclusion RFID technology is taking off in libraries at an increasingly rapid pace. Though there are few libraries employing this technology today, but due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development. It is easy to envision that, the RFID tags contents will increase in power, prices are expected to decline and tag will dramatically improve its efficiency, security and accuracy. Also major concerns need to be addressed for successfully implementing this technology. So that it will change our personal and work lives in library and adorns the conventional library management with a new idea and usher for a bright future. RFID IS A SUPPORTING TECHNOLOGY--- NOT A COMPETING !! 3M-LIBRARY SYSTEM

31 THANK “YOU”


Download ppt "THE SECURITY FOR LIBRARY Mr. Bibhuti bhusan Pattanaik (Asst. Librarian), I.T.S - IM Library, Greater Noida, Ms. Babita Pattanaik."

Similar presentations


Ads by Google