THE SECURITY FOR LIBRARYTHE SECURITY FOR LIBRARY
Presentation OutlinePresentation Outline
To Educate and Inform You
1. About RFID system
2. How does RFID works
3. Why RFID
4. Agenda & Concern
5. Implementation
6. Benefit
7. Conclusion
1. About RFID system
 Brief HistoryBrief History
 What is RFID systemWhat is RFID system
 RFID Architecture & Key ComponentsRFID Architecture & Key Components
 StandardsStandards
 Key Agenda & Concern for LibraryKey Agenda & Concern for Library
Brief HistoryBrief History
RFID (Radio Frequency Identifier) an Auto-ID dataRFID (Radio Frequency Identifier) an Auto-ID data
collection system surveillance, using RF waves forcollection system surveillance, using RF waves for
Identifying, Tracking and doing Management ofIdentifying, Tracking and doing Management of
material flow.material flow.
Basic concept behind RFID is same as “Mirror-Sunlight-
Reflection theory ”
Invented and used from (Early 1940’s)
Commercial Operation begun from 1960’s …
In 1970s developers, inventors, companies, academic
institution and government sectors were actively worked on
RFID
Most common application were tracked person and objects, identified
goods in supply chain, reusable container, high value tools, security,
controlling access to building, networks, payment systems and other
assets.
What is RFID systemWhat is RFID system
RFID is an acronymRFID is an acronym
forfor radio frequencyradio frequency
identificationidentification..
Briefly theBriefly the RFRF
stand for “stand for “radio-radio-
frequencyfrequency” and” and IDID
means “means “identifieridentifier””
that allows an item,that allows an item,
for instance afor instance a
library book, to belibrary book, to be
identified,identified,
accessed, stored,accessed, stored,
reprogrammed andreprogrammed and
communicated bycommunicated by
using radio wavesusing radio waves
A method for controlling inventory
Automatically identify objects
An AUTO-ID based System
Offering Self Check out/in
Saving Time and Money
Gathering statistics on used Items
Minimize Work Stress of Staff
Easily Prevent Theft
Improve Customer Services And
Non-Line-Sight Communication
RFID ArchitectureRFID Architecture
Tags Reader
Gateway
Database
Database
Application
User
Interface
Backend
Fig.1. A General Overview of RFID
Architecture
Scanned
As depicted in figure.1 the whole operation are worked under
three key phases.
 Firstly items-tag are
scanned by reader;
 Secondly in backend
transmitted data coming
through antenna (RF-
wave) are being recognized
by RFID-based system PC.
It acts as a middleware
communication gateway
among items, reader and
system database;
 And at the end it filters
out and store data in
RFID-databases for
checking the data fault and
relevant operation.
Key ComponentsKey Components TAGS
 READER
 SELF CHECK-OUT/IN
 INVENTORY READER
BOOK DROP READER
MIDDLEWARE (PC)
SECURITY GATE
LABEL PRINTER
 SORTER
TAGSTAGSPaper thin 2X2inch
in size.
Read-only or
Read/writable
Storage capacity
of 2KB data that
contain 96bits
serial number.
Tags come in many
flavors: passive, battery
assisted, active, different
frequencies, various anti-
collision technologies,
printed/wire wounded
antenna etc.
READER
 A device that is used to
interrogate an Tag.
 Basic components are
 A scanning Antenna
 A transceiver with a
decoder to interpret data
 helps in personalize &
read data.
SELF CHECK-OUT/IN
 Dual Function(rfid & barcode)
 Store information about item.
 Performance statistics
 Multiple items can be checked
out at a time
 Easier to Use.
INVENTORY READER
 A compact and light weight
hand held device
 Comfortable to use
 High storage capacity
 Multi Functional (such as
shelving, sorting, searching,
weeding and reading)
 Enhanced Security.
BOOK DROP READER
Self Checks-in
books when
patrons drop
them in book-
drop …..
MIDDLE WAREMIDDLE WARE
 Provide reader connectivity to other systems on the
network.
Translate data and transmit to its other application
SECURITY GATE
 Verify that all books
leaving the library have been
checked out.
 Detect Theft and
 Prevent unauthorized
removal of material
Key Agenda & Concern forKey Agenda & Concern for
LibraryLibraryAGENDAAGENDA
 Material securityMaterial security
 Financial LiabilitiesFinancial Liabilities
 Personal Comfort andPersonal Comfort and
SafetySafety
 Privacy andPrivacy and
 Problem patronsProblem patrons
CONCERN
 To Increase productivity
 Improve customer services
 Maintain current staff level
How does RFID works
RFID-READER RFID-TAG
PERSONALIZER (Application Device)
DATA FLOW
RF COUPLING
Time
Energy
Up-to-date
Fig.1. Items personalized model for RFID system
PC
Why RFID
I. Barcode Vs RFID
II. Inventory Management
III. Economic Facts
IV. Customer Satisfaction
Barcode Vs RFID
Inventory Management
 Read/WriteRead/Write
- Ability to add information directly to tags enables each- Ability to add information directly to tags enables each
unique asset to carry its own unique historyunique asset to carry its own unique history
 Non-contact ReadsNon-contact Reads
- Ability to read tags at a distance, under a variety of- Ability to read tags at a distance, under a variety of
environmental conditions, without physicalenvironmental conditions, without physical
manipulation of the assetmanipulation of the asset
 Fast ReadFast Read
- Ability to simultaneously read large numbers (1000-- Ability to simultaneously read large numbers (1000-
1750 tags/sec) of items1750 tags/sec) of items
 AutomationAutomation
- Requires less human intervention- Requires less human intervention
 AuthenticityAuthenticity
- Each RFID chip is unique and can not be replicated- Each RFID chip is unique and can not be replicated
Economic FactsIncrease SecurityIncrease Security
 Security of material is automatic without staff intervention.Security of material is automatic without staff intervention.
 Automatic items check out/ check in and sorting can beAutomatic items check out/ check in and sorting can be
accomplished with LMS circulation software, thereforeaccomplished with LMS circulation software, therefore
eliminating extra processing time of staff and make iteliminating extra processing time of staff and make it
economically viable.economically viable.
Cost AvoidanceCost Avoidance
 Currently Missing Items statisticsCurrently Missing Items statistics
 Replacement costReplacement cost
 Selection, classification, processing, cost of searching,Selection, classification, processing, cost of searching,
notification etc. is improved onenotification etc. is improved one
 Existing Material Management systemExisting Material Management system
 Staff cost (manual way to do house keeping job)Staff cost (manual way to do house keeping job)
 Eliminates the time consuming process of barcodeEliminates the time consuming process of barcode
scanning and reading.scanning and reading.
 High speed InventoryingHigh speed Inventorying
High ReliabilityHigh Reliability
 The RFID readers are highly reliable, almost 100%The RFID readers are highly reliable, almost 100%
detection rate.detection rate.
 Multiple items can be checked out/ checked in at a time.Multiple items can be checked out/ checked in at a time.
 Make library staff free from the risk of repetitive stressMake library staff free from the risk of repetitive stress
injuries.injuries.
LongevityLongevity
 RFID tags last longer than barcodesRFID tags last longer than barcodes
COST FACTORS
Implementation cost
• Cost of RFID tags
• Reader
• Hand held device
• software interface
• Others
On going system Cost
• System maintenance
• Security system cost
• Work station maintenance
• Technical staff
Customer Satisfaction
 Materials control,Materials control,
 Security,Security,
 High speed Inventorying,High speed Inventorying,
 Faster Check-out/-in,Faster Check-out/-in,
 Longevity of Tags,Longevity of Tags,
 Reduce staff stress,Reduce staff stress,
 Prevent Theft,Prevent Theft,
 Searching, notifying andSearching, notifying and
 Gathering statistics on items become easy.Gathering statistics on items become easy.
---------- It Made Sense!!---------- It Made Sense!!
Implementation
Start
Identify
Plan
Implementation
Why you want
RFID?
Begin with
your goals.
Where RFID will deliver value
to your Library and its
Customers.
Ready your organization for
change.
Benefit Better Collection Management
 Shelves rectification and Verification
 Improved Productivity and Services
 Wireless inventory management
 Faster Checked Out/In
 Prevent Theft
 Quick Searching, Weeding & inventory audit
 Cost Avoidance
 Eliminate Manual Labor Cost.
 Improve automation process
 Reduce Repetitive Stress Injury
Conclusion
RFID technology is taking off in libraries at an increasinglyRFID technology is taking off in libraries at an increasingly
rapid pace. Though there are few libraries employing thisrapid pace. Though there are few libraries employing this
technology today, but due to its customizable feature andtechnology today, but due to its customizable feature and
continuing improvement the library communities arecontinuing improvement the library communities are
beginning to get involved in its development. It is easy tobeginning to get involved in its development. It is easy to
envision that, theenvision that, the RFID tags contents will increase in powerRFID tags contents will increase in power,,
prices are expected to declineprices are expected to decline andand tag will dramaticallytag will dramatically
improve its efficiency, security and accuracyimprove its efficiency, security and accuracy. Also major. Also major
concerns need to be addressed for successfully implementingconcerns need to be addressed for successfully implementing
this technology. So that it will change our personal and workthis technology. So that it will change our personal and work
lives in library and adorns the conventional librarylives in library and adorns the conventional library
management with a new idea and usher for a bright future.management with a new idea and usher for a bright future.
RFID IS A SUPPORTING TECHNOLOGY--- NOT A COMPETING !!
3M-LIBRARY SYSTEM
THANKTHANK
“YOU”“YOU”

RFID-SECURITY_Vatsalya

  • 1.
    THE SECURITY FORLIBRARYTHE SECURITY FOR LIBRARY
  • 2.
    Presentation OutlinePresentation Outline ToEducate and Inform You 1. About RFID system 2. How does RFID works 3. Why RFID 4. Agenda & Concern 5. Implementation 6. Benefit 7. Conclusion
  • 3.
    1. About RFIDsystem  Brief HistoryBrief History  What is RFID systemWhat is RFID system  RFID Architecture & Key ComponentsRFID Architecture & Key Components  StandardsStandards  Key Agenda & Concern for LibraryKey Agenda & Concern for Library
  • 4.
    Brief HistoryBrief History RFID(Radio Frequency Identifier) an Auto-ID dataRFID (Radio Frequency Identifier) an Auto-ID data collection system surveillance, using RF waves forcollection system surveillance, using RF waves for Identifying, Tracking and doing Management ofIdentifying, Tracking and doing Management of material flow.material flow. Basic concept behind RFID is same as “Mirror-Sunlight- Reflection theory ” Invented and used from (Early 1940’s) Commercial Operation begun from 1960’s … In 1970s developers, inventors, companies, academic institution and government sectors were actively worked on RFID Most common application were tracked person and objects, identified goods in supply chain, reusable container, high value tools, security, controlling access to building, networks, payment systems and other assets.
  • 5.
    What is RFIDsystemWhat is RFID system RFID is an acronymRFID is an acronym forfor radio frequencyradio frequency identificationidentification.. Briefly theBriefly the RFRF stand for “stand for “radio-radio- frequencyfrequency” and” and IDID means “means “identifieridentifier”” that allows an item,that allows an item, for instance afor instance a library book, to belibrary book, to be identified,identified, accessed, stored,accessed, stored, reprogrammed andreprogrammed and communicated bycommunicated by using radio wavesusing radio waves A method for controlling inventory Automatically identify objects An AUTO-ID based System Offering Self Check out/in Saving Time and Money Gathering statistics on used Items Minimize Work Stress of Staff Easily Prevent Theft Improve Customer Services And Non-Line-Sight Communication
  • 6.
    RFID ArchitectureRFID Architecture TagsReader Gateway Database Database Application User Interface Backend Fig.1. A General Overview of RFID Architecture Scanned As depicted in figure.1 the whole operation are worked under three key phases.  Firstly items-tag are scanned by reader;  Secondly in backend transmitted data coming through antenna (RF- wave) are being recognized by RFID-based system PC. It acts as a middleware communication gateway among items, reader and system database;  And at the end it filters out and store data in RFID-databases for checking the data fault and relevant operation.
  • 7.
    Key ComponentsKey ComponentsTAGS  READER  SELF CHECK-OUT/IN  INVENTORY READER BOOK DROP READER MIDDLEWARE (PC) SECURITY GATE LABEL PRINTER  SORTER
  • 8.
    TAGSTAGSPaper thin 2X2inch insize. Read-only or Read/writable Storage capacity of 2KB data that contain 96bits serial number. Tags come in many flavors: passive, battery assisted, active, different frequencies, various anti- collision technologies, printed/wire wounded antenna etc.
  • 9.
    READER  A devicethat is used to interrogate an Tag.  Basic components are  A scanning Antenna  A transceiver with a decoder to interpret data  helps in personalize & read data.
  • 10.
    SELF CHECK-OUT/IN  DualFunction(rfid & barcode)  Store information about item.  Performance statistics  Multiple items can be checked out at a time  Easier to Use.
  • 11.
    INVENTORY READER  Acompact and light weight hand held device  Comfortable to use  High storage capacity  Multi Functional (such as shelving, sorting, searching, weeding and reading)  Enhanced Security.
  • 12.
    BOOK DROP READER SelfChecks-in books when patrons drop them in book- drop …..
  • 13.
    MIDDLE WAREMIDDLE WARE Provide reader connectivity to other systems on the network. Translate data and transmit to its other application
  • 14.
    SECURITY GATE  Verifythat all books leaving the library have been checked out.  Detect Theft and  Prevent unauthorized removal of material
  • 15.
    Key Agenda &Concern forKey Agenda & Concern for LibraryLibraryAGENDAAGENDA  Material securityMaterial security  Financial LiabilitiesFinancial Liabilities  Personal Comfort andPersonal Comfort and SafetySafety  Privacy andPrivacy and  Problem patronsProblem patrons CONCERN  To Increase productivity  Improve customer services  Maintain current staff level
  • 16.
    How does RFIDworks RFID-READER RFID-TAG PERSONALIZER (Application Device) DATA FLOW RF COUPLING Time Energy Up-to-date Fig.1. Items personalized model for RFID system PC
  • 17.
    Why RFID I. BarcodeVs RFID II. Inventory Management III. Economic Facts IV. Customer Satisfaction
  • 18.
  • 19.
    Inventory Management  Read/WriteRead/Write -Ability to add information directly to tags enables each- Ability to add information directly to tags enables each unique asset to carry its own unique historyunique asset to carry its own unique history  Non-contact ReadsNon-contact Reads - Ability to read tags at a distance, under a variety of- Ability to read tags at a distance, under a variety of environmental conditions, without physicalenvironmental conditions, without physical manipulation of the assetmanipulation of the asset  Fast ReadFast Read - Ability to simultaneously read large numbers (1000-- Ability to simultaneously read large numbers (1000- 1750 tags/sec) of items1750 tags/sec) of items  AutomationAutomation - Requires less human intervention- Requires less human intervention  AuthenticityAuthenticity - Each RFID chip is unique and can not be replicated- Each RFID chip is unique and can not be replicated
  • 20.
    Economic FactsIncrease SecurityIncreaseSecurity  Security of material is automatic without staff intervention.Security of material is automatic without staff intervention.  Automatic items check out/ check in and sorting can beAutomatic items check out/ check in and sorting can be accomplished with LMS circulation software, thereforeaccomplished with LMS circulation software, therefore eliminating extra processing time of staff and make iteliminating extra processing time of staff and make it economically viable.economically viable. Cost AvoidanceCost Avoidance  Currently Missing Items statisticsCurrently Missing Items statistics  Replacement costReplacement cost  Selection, classification, processing, cost of searching,Selection, classification, processing, cost of searching, notification etc. is improved onenotification etc. is improved one  Existing Material Management systemExisting Material Management system  Staff cost (manual way to do house keeping job)Staff cost (manual way to do house keeping job)  Eliminates the time consuming process of barcodeEliminates the time consuming process of barcode scanning and reading.scanning and reading.  High speed InventoryingHigh speed Inventorying High ReliabilityHigh Reliability  The RFID readers are highly reliable, almost 100%The RFID readers are highly reliable, almost 100% detection rate.detection rate.  Multiple items can be checked out/ checked in at a time.Multiple items can be checked out/ checked in at a time.  Make library staff free from the risk of repetitive stressMake library staff free from the risk of repetitive stress injuries.injuries. LongevityLongevity  RFID tags last longer than barcodesRFID tags last longer than barcodes COST FACTORS Implementation cost • Cost of RFID tags • Reader • Hand held device • software interface • Others On going system Cost • System maintenance • Security system cost • Work station maintenance • Technical staff
  • 21.
    Customer Satisfaction  Materialscontrol,Materials control,  Security,Security,  High speed Inventorying,High speed Inventorying,  Faster Check-out/-in,Faster Check-out/-in,  Longevity of Tags,Longevity of Tags,  Reduce staff stress,Reduce staff stress,  Prevent Theft,Prevent Theft,  Searching, notifying andSearching, notifying and  Gathering statistics on items become easy.Gathering statistics on items become easy. ---------- It Made Sense!!---------- It Made Sense!!
  • 22.
    Implementation Start Identify Plan Implementation Why you want RFID? Beginwith your goals. Where RFID will deliver value to your Library and its Customers. Ready your organization for change.
  • 23.
    Benefit Better CollectionManagement  Shelves rectification and Verification  Improved Productivity and Services  Wireless inventory management  Faster Checked Out/In  Prevent Theft  Quick Searching, Weeding & inventory audit  Cost Avoidance  Eliminate Manual Labor Cost.  Improve automation process  Reduce Repetitive Stress Injury
  • 24.
    Conclusion RFID technology istaking off in libraries at an increasinglyRFID technology is taking off in libraries at an increasingly rapid pace. Though there are few libraries employing thisrapid pace. Though there are few libraries employing this technology today, but due to its customizable feature andtechnology today, but due to its customizable feature and continuing improvement the library communities arecontinuing improvement the library communities are beginning to get involved in its development. It is easy tobeginning to get involved in its development. It is easy to envision that, theenvision that, the RFID tags contents will increase in powerRFID tags contents will increase in power,, prices are expected to declineprices are expected to decline andand tag will dramaticallytag will dramatically improve its efficiency, security and accuracyimprove its efficiency, security and accuracy. Also major. Also major concerns need to be addressed for successfully implementingconcerns need to be addressed for successfully implementing this technology. So that it will change our personal and workthis technology. So that it will change our personal and work lives in library and adorns the conventional librarylives in library and adorns the conventional library management with a new idea and usher for a bright future.management with a new idea and usher for a bright future. RFID IS A SUPPORTING TECHNOLOGY--- NOT A COMPETING !! 3M-LIBRARY SYSTEM
  • 25.