RFID PPT - E-LIS
Download
Report
Transcript RFID PPT - E-LIS
THE SECURITY FOR LIBRARY
Mr. Bibhuti bhusan Pattanaik (Asst. Librarian),
I.T.S - IM Library, Greater Noida,
Email: [email protected]
Ms. Babita Pattanaik (Lecturer), North Orissa
University, Baripada
Email: [email protected]
Presentation Outline
To Educate and Inform You
1.
About RFID system
2. How does RFID works
3. Why RFID
4. Agenda & Concern
5. Implementation
6. Benefit
7. Conclusion
1. About RFID system
Brief History
What is RFID system
RFID Architecture & Key Components
Standards
Key Agenda & Concern for Library
Brief History
RFID (Radio Frequency Identifier) an Auto-ID data
collection system surveillance, using RF waves for
Identifying, Tracking and doing Management of
material flow.
Basic concept behind RFID is same as “Mirror-SunlightReflection theory ”
Invented and used from (Early 1940’s)
Commercial Operation begun from 1960’s …
In 1970s developers, inventors, companies, academic
institution and government sectors were actively worked on
RFID
Most common application were tracked person and objects, identified
goods in supply chain, reusable container, high value tools, security,
controlling access to building, networks, payment systems and other assets.
What is RFID system
An AUTO-ID based System
RFID is an acronym
for radio frequency
identification.
Briefly
the
RF
stand for “radiofrequency” and ID
means
“identifier”
that allows an item,
for
instance
a
library book, to be
identified,
accessed,
stored,
reprogrammed and
communicated
by
using radio waves
A method for controlling inventory
Automatically identify objects
Saving Time and Money
Non-Line-Sight Communication
Minimize Work Stress of Staff
Offering Self Check out/in
Gathering statistics on used Items
Improve Customer Services And
Easily Prevent Theft
RFID Architecture
As depicted in figure.1 the whole operation are worked under
three key phases.
Firstly
items-tag
scanned by reader;
are
Backend
Database
Secondly
in backend
transmitted data coming
through antenna (RF-wave)
are being recognized by
RFID-based system PC. It
acts as a middleware
communication
gateway
among items, reader and
system database;
And at the end it filters out
and store data in RFIDdatabases for checking the
data fault and relevant
operation.
Tags
Reader
Application
Gatewa
y
Scanned
Database
User
Interface
Fig.1. A General Overview of RFID
Architecture
TAGS
Key Components
READER
SELF CHECK-OUT/IN
INVENTORY READER
BOOK DROP READER
MIDDLEWARE (PC)
SECURITY GATE
LABEL PRINTER
SORTER
Paper thin 2X2inch
in size.
Read-only or
Read/writable
Storage capacity
of 2KB data that
contain 96bits
serial number.
Tags come in many
flavors: passive, battery
assisted, active, different
frequencies, various anticollision technologies,
printed/wire wounded
antenna etc.
TAGS
TAG-TYPES FOR LIBRARY
ITEMS
Type:
Contact less Read/Write
Operating
Frequency:
13.56 MHz. (HF-High Frequency).
Capacity:
512 bit up to 10Kbits
Common Usage:
Ticketing, Library Management, anti-counterfeiting
Standard
Deployment:
Electronic label application, Electronic Article Surveillance
Tested Read
Range:
Maximum 10cm Read, and Write 5cm Detection (The
distance may vary depend upon the environment)
Multi-Detection:
Yes
Max read
quantity:
30 labels/sec
Size:
82mm x 49mm
Material:
Opaque matt paper 79
Color:
White
Weight:
0.5g
Compliance:
ICODE, SLI
Regulatory
Specifications:
ISO 15693
Operating
Specifications:
Waterproof and dustproof
READER
A device that is used to
interrogate an Tag.
Basic components are
A scanning Antenna
A transceiver with a
decoder to interpret data
helps in personalize &
read data.
SELF CHECK-OUT/IN
Dual Function(rfid & barcode)
Store information about item.
Performance statistics
Multiple items can be checked
out at a time
Easier to Use.
INVENTORY READER
A compact and light weight
hand held device
Comfortable to use
High storage capacity
Multi Functional (such as
shelving, sorting, searching,
weeding and reading)
Enhanced Security.
BOOK DROP READER
Self Checks-in
books
when
patrons
drop
them in bookdrop …..
MIDDLE WARE
Provide reader connectivity to other systems on the
network.
Translate data and transmit to its other application
SECURITY GATE
Verify that all books
leaving the library have been
checked out.
Detect Theft and
Prevent unauthorized
removal of material
Standard
RFID STANDARD USED FOR LIBRARY:
Standard : ISO-15693
Frequency: 13.56 MHZ
Dimension : 400mm X 200mm X 120mm
Housing
: Metal
Data Interface: RS 232
Protocol : SIP and/or API (presently using
STX/ETX communication protocol)
Indicator : Tag Data LED and Power LED
Voltage : 230 Volt
Certification : CE and Radio Approval
Frequency: 13.56 MHZ
Key feature of 13.56Mhz is
Tags are less expensive due to their
limited coil required.
Read range about 1-2feet.
Some tags are anti collision
collects, uses, stores and broadcast data
Controlled all conveyor setting
Key Agenda & Concern for
Library
AGENDA
Material security
Financial Liabilities
Personal Comfort and
Safety
CONCERN
Privacy and
Problem patrons To Increase productivity
Improve customer services
Maintain current staff level
Material Security:
AGENDA
Use of Hardware and
Software
Personal Safety:
Reader Range
Read Quality
Staff stress
Data Integrity
Theft detection
Frequency PRIVACY & SECURITY:
Privacy
Tracking Individuals
Inappropriate use of
personal data
Theft of Information
Ownership and Legal issue
Problem Patrons:
Inadequate Encryption
Block the RF-Wave
Database hacked
Items with Odd shape &
metal component
Financial Liabilities:
Doc.like pamphlet, sheet
One Time Implementation costs
music, magazine etc.
System maintenance & Licensing
Staff & Patron
Security system costs
interaction
Tags cost
CONCERN
Increase productivity
More accurate shelving
Time saving, speedy
Provide security and
material controls
More opportunity for
enhanced services
Durability, longevity and
Insurance
Improve customer services
Materials more readily
available
Less time wasted in line to
check out/ check in
Fewer items remain charged to
accounts
Improved privacy since staff
never sees what’s being
Maintain current staff level
checked out
Repetitive Stress
Reduce handling of item with
RFID
How does RFID works
PC
Up-to-date
Time
DATA FLOW
RFID-READER
RFID-TAG
RF COUPLING
Energy
PERSONALIZER (Application Device)
Fig.1. Items personalized model for RFID system
Why RFID
I. Barcode Vs RFID
II. Inventory Management
III. Economic Facts
IV. Customer Satisfaction
Barcode Vs RFID
Inventory Management
Read/Write
- Ability to add information directly to tags enables each
unique asset to carry its own unique history
Non-contact Reads
- Ability to read tags at a distance, under a variety of
environmental conditions, without physical
manipulation of the asset
Fast Read
- Ability to simultaneously read large numbers (10001750 tags/sec) of items
Automation
- Requires less human intervention
Authenticity
- Each RFID chip is unique and can not be replicated
Increase Security
Economic Facts
Security of material is automatic without staff intervention.
Automatic items check out/ check in and sorting can be
COST FACTORS
accomplished with LMS circulation software, therefore
eliminating extra processing time of staff and make it
Implementation cost
economically viable.
Cost Avoidance
Currently Missing Items statistics
Replacement cost
Selection, classification, processing, cost of searching,
notification etc. is improved one
Existing Material Management system
Staff cost (manual way to do house keeping job)
Eliminates the time consuming process of barcode
scanning and reading.
High speed Inventorying
High Reliability
The RFID readers are highly reliable, almost 100%
detection rate.
Multiple items can be checked out/ checked in at a time.
Make library staff free from the risk of repetitive stress
injuries.
Longevity
RFID tags last longer than barcodes
• Cost of RFID tags
• Reader
• Hand held device
• software interface
• Others
On going system Cost
• System maintenance
• Security system cost
• Work station maintenance
• Technical staff
Customer Satisfaction
Materials control,
Security,
High speed Inventorying,
Faster Check-out/-in,
Longevity of Tags,
Reduce staff stress,
Prevent Theft,
Searching, notifying and
Gathering statistics on items become easy.
---------- It Made Sense!!
Implementation
Start
Begin with
your goals.
Why you want
RFID?
Identify
Where RFID will deliver value
to your Library and its
Customers.
Plan
Implementation
Ready your organization for
change.
Benefit
Better Collection Management
Shelves rectification and Verification
Improved Productivity and Services
Wireless inventory management
Faster Checked Out/In
Prevent Theft
Quick Searching, Weeding & inventory audit
Cost Avoidance
Eliminate Manual Labor Cost.
Improve automation process
Reduce Repetitive Stress Injury
Conclusion
RFID technology is taking off in libraries at an increasingly
rapid pace. Though there are few libraries employing this
technology today, but due to its customizable feature and
continuing improvement the library communities are
beginning to get involved in its development. It is easy to
envision that, the RFID tags contents will increase in power,
prices are expected to decline and tag will dramatically
improve its efficiency, security and accuracy. Also major
concerns need to be addressed for successfully implementing
this technology. So that it will change our personal and work
lives in library and adorns the conventional library
management with a new idea and usher for a bright future.
RFID IS A SUPPORTING TECHNOLOGY--- NOT A COMPETING !!
3M-LIBRARY SYSTEM
THANK
“YOU”