One Phone to Rule Them All A Case Study Sarah-Jane Saravani Learning Hub Manager Waikato Institute of Technology, New Zealand

Slides:



Advertisements
Similar presentations
Context & Dataflow Diagrams.
Advertisements

Android Smart Card ID Checker UHCL Capstone Team 6 Michael Woodruff Raymond Nnodim Faisal Moiz.
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
NFC Devices: Security and Privacy
5Ws on NFC Andrea Vitaletti. Overview What Where Why When Who 5Ws.
Library Online Catalog Tutorial Pentagon Library Last Updated March 2008.
Overseas Library Catalog – Request Item Overseas Library Catalog Request loaned item.
COMP106 Assignment 2 Proposal 11. The Choice of Metaphor The metaphor that I am going to chose is the library. I have decided to use this metaphor because.
Your library record in TAFECAT Using the My Account function in the library catalogue to manage your loans.
Near Field Communication By Van Logan HTM 304. What is Near Field Communication Short range wireless communication technology between electronic devices.
Information for students Welcome to the S 3 P system. Login to the system by entering your User ID and password. The User ID is the same as your normal.
How to Renew A Book Online…. For students, please login with your Student ID number and password for student portal. For staff, please login with your.
BPOINT for Schools Information Guide for Parents.
RFID What is RFID? The Georgetown Experience Technical Considerations
LMS/RFID (Dis)integration Why Standards Matter Mick Fortune.
Isis Secure Room Booking Isis Secure Room Booking is an add on module to the latest version of the Sentry Access Control System. It is primarily intended.
Introduction to Mobile Applications. Wireless Applications Personal Time and KnowledgeManagemnt Personal Health & Security PersonalNavigation Remote Monitoring.
University of Minnesota MOBILE PAYMENTS [1] CSCI )Tootu kurra 2)Kaustubh Rawoorkar.
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
Wegner Health Science Information Center Weekend and Evening Circulation Staff Training.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
Laura Hartley Kaci Resau LS560 USING QR CODES FOR LIBRARIANS 2014 TRAINING.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
University of Kentucky Proxy Service Presentation By Kelly Vickery
Why Open-Source? No Vendor-Locking In a proprietary software --- Your supports lock with it. freedom to customize and improvements in software needs,
The physical parts of a computer are called hardware.
Patron Self-Registration. Self-Registration As of September 2014, patrons may register for a PINES library card through the PINES web site at:
NEAR FIELD COMMUNICATION. WHAT IS NFC??? NFC or Near Field Communication is a short range high frequency wireless communication technology. A radio communication.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
A questionnaire is a effective way of gaining information quickly and directly from an audience, and the results from a questionnaire can be displayed.
® Features and Benefits V3.1. TurboTag ® Features Temperature logger size of credit card Uses RFID reading protocols with EPC product codes More accurate.
Section 4 – Computer Networks Setting up a small network.
DATA COLLECTION METHODS CONTENT PAGE How data is collected via questionnaires. How data is collected via questionnaires. How data is collected with mark.
Transparent to the User: User-Initiated and Mediated Resource Sharing Services Mary E. Jackson Product Manager, Resource Sharing Northwest ILL & Resource.
System Initialization 1)User starts application. 2)Client loads settings. 3)Client loads contact address book. 4)Client displays contact list. 5)Client.
authenticated networked guided environment for learning - secure integration of learning environments with digital libraries - Current.
Near Field Communication Systems Patras, July 2006.
Ignite Presentation: Near Field Communication Harry Yang.
Emergencies Computer Crash. There are several different types of computer-problem scenarios, with different appropriate responses:  When the Voyager.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
By : Fiona Minear. What is a networks ? A network is a group of two or more computer systems linked together.
Telenor R&DMobile Terminals Group 1 Four-in-one: Your mobile integrates them all Security Requirement Nice to know Need to know Have to know Examples:
INTERNET. Objectives Explain the origin of the Internet and describe how the Internet works. Explain the difference between the World Wide Web and the.
Cuallet step by step guide. Step 1 From the Cuallet home page, click the “Sign Up Now” button. New user / Register.
Requisition The Requisitions are created from the Users PC. The Requisitions are created from the Users PC. The Requisition can request delivery of Materials.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
UB & UC An Update on Resource Sharing Developments.
12 Basic IQ Skills: Online Information about your Library Transactions.
Tutorial for Circulation Staff FIU Library
Printing and Processing INNReach Paging Slips INNReach Training : SearchOhio and OhioLink.
Revised: 12/16/2015 Prepared by the Computer Lab Montgomery County-Norristown Public Library.
How to Renew A Book Online…. Go To Patron Account Type Patron ID & Password here Your Patron ID is the User ID (printed below the barcode in the Student/Staff.
Requisition The Requisitions are created from the Users PC. The Requisitions are created from the Users PC. The Requisition can request delivery of Materials.
Payment systems. Debit or Credit cards  Let the customers pay by taking money directly form their account  Allow the money to borrow the money and the.
How to use the Offline Circulation Version 16 Yoel Kortick.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Modified from slides provided by Joseph Sant & Ann Cadger.
Chapter 3 Application Software. Application Software What is application software?  Programs that perform specific tasks for users p. 132 Fig. 3-1 Next.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
English for Advance Learners I
RFID In Alma.
Apple Pay Research on NFC and the security threat
OCR GCSE ICT Data capture methods.
OCR GCSE ICT Data capture methods.
Mike Pappas, Nigel Himmelreich, Eric Anderson
Mike Pappas, Nigel Himmelreich, Eric Anderson
Near field communication (NFC)
Smart Business for eGeneration Companies
Presentation transcript:

One Phone to Rule Them All A Case Study Sarah-Jane Saravani Learning Hub Manager Waikato Institute of Technology, New Zealand

Connection? 4th m-libraries Conference, The Open University, 25 September 2012

Near Field Communication (NFC) NFC builds upon RFID systems by allowing two-way communication between endpoints Due to short transmission range, NFC- based transactions are possibly secure The basic NFC communication operation became an accepted ISO standard (ISO/IEC 18092) in th m-libraries Conference, The Open University, 25 September 2012

Connecting systems Library Management System RFID SIP 2 protocol Application to allow communication 4th m-libraries Conference, The Open University, 25 September 2012

Design Creation of web service to Voyager using SIP 2 protocol JSON communication standard for transfer of package information using XML Build application to communicate with JSON through to Voyager to request patron information 4th m-libraries Conference, The Open University, 25 September 2012

Application Application created and published to PlayStore – mimics existing links to information Preliminary interface design 4th m-libraries Conference, The Open University, 25 September 2012

2 Phases 1 – Application opened on smart phone – user asked to enter library barcode, barcode retained in memory 2. Scan the RFID tag - Screen displays book information - If item able to be borrowed, a button available “Borrow This Book” - “Please Keep the Phone on the RFID Tag” 4th m-libraries Conference, The Open University, 25 September 2012

Phases cont. - Information goes to the server with the RFID information - Book barcode is linked with user barcode “Do You Wish to Issue?” - Item may or may not be issued depending on circumstances – a message will display upon completion of action 4th m-libraries Conference, The Open University, 25 September 2012

One phone that rules them all Near Field Communication technology - lets smartphones communicate with other devices containing a NFC tag NFC smart phone Library Room access Load credit ID card Fees