Post on 16-Jan-2015
description
transcript
RFID Systems in LibrariesPart Two: Standards for RFID Systems
April 20, 2011
Speakers: Vinod Chachra, Matt Bellamy, and Dan Walters
http://www.niso.org/news/events/2011/nisowebinars/rfidparttwo/
Vinod Chachra, CEO, VTLS Inc.Co-chair, NISO RFID Revision Working Group for U.S.A. Libraries
NISO RFID Systems in Libraries (Part 2) Webinar April 20, 2011 at 1:00 PM
Visionary Technology in Library Solutions
Intent of this Section
The intent of this section of the Webinar is to present the NISO Data Model and U. S. Profile for ISO 28560-2
The main goal of the Data Model is to provide interoperability for libraries and efficiencies for distributors of RFID products and service.
The idea is to help create an environment that allows libraries to invest in this technology with confidence and with some assurance that they will have choices now, and in the future, without being locked into any one supplier or vendor.
The model dictates a certain amount of consistency in support of interoperability but also provides flexibility to suppliers to be creative in providing new and different solutions to the library industry.
The ultimate intention is that RFID tags programmed by one vendor in compliance with the data model will be usable by another RFID vendor without any reprogramming.
Visionary Technology in Library Solutions
Background on NISO work In 2008 NISO published a report --NISO RP-6-2008 -- RFID in U.S. Libraries.
At the National Level: The 2008 report –
was the result of deliberations by a working group which I chaired.
outlined best practices for RFID in US Libraries.
presented a data model for use in US libraries.
At the International Level: ISO TC 46/SC 4/WG 11 for ISO-28560 was formed
Vinod Chachra and Paul Sevcik were US representatives to ISO.
Standard was published in March 2011.
In anticipation of ISO-28560 -- New NISO RFID Revision Group was formed
Co-chaired by Vinod Chachra and Paul Sevcik
Goal: revise 2008 report to conform with the requirements of ISO 28560
Status: Work on report is almost complete;
Report will be ready for public comment very soon.
Visionary Technology in Library Solutions
Goals of 2008 RFID Working Group
To review existing RFID standards… and promote its use where appropriate;
To examine and assess privacy concerns;
To investigate the way RFID is used in the United States and identify best practices in standards development and implementation;
To focus on security and data models for RFID tags, along with issues of interoperability and privacy;
To create a “best practices” document for libraries … and help safeguard library investments in RFID and minimize the cost of obsolescence.
Visionary Technology in Library Solutions
Scope of 2008 Working Group
RFID solutions run at several frequencies –
Low – from 125KHz to 134KHz
High – 13.56MHz
Ultra High – 860-960 MHz
Micro Wave – 2.45 GHz
NISO’s work is limited to Tags used in libraries
Note: At present, these tags operate at 13.56 MHz, though this may change in the future
Visionary Technology in Library Solutions
NISO Revision Working Group
1. Co-Chairs Vinod Chachra (VTLS) and Paul Sevcik (3M)2. Goal – Revise best practices document NISO RP-6-20083. Objectives –
a. Make the US data model consistent with the proposed ISO 28650 data model (Part 1)
b. Determine if USA will recommend Part 2 or Part 3 of the ISO 28560 standard for implementation.
c. More broadly, determine if a US National Profile is necessary and if necessary, develop it.
d. Review and update the original documente. Consider new items
Visionary Technology in Library Solutions
ISO 28560 Parts 1, 2 & 3Technical Committee TC46 (Information and Documentation) Subcommittee SC4 (Technical Interoperability) Working Group WG11 (RFID in Libraries) … ISO TC46/SC4/WG11
ISO 28560-1 : Part 1: Data Elements and general guidelines for implementation, deals with the definitions of the data elements that may be encoded onto RFID tags in the library application. ISO 28560-2: Part 2: Encoding based on ISO/IEC 15962, defines an encoding method for compacting data elements into objects and placing them on RFID tags for use in libraries which utilizes the encoding rules defined in the existing standard, ISO/IEC 15962.
ISO 28560-3: Part 3: Fixed Length Encoding, defines an encoding method for placing data elements on RFID tags for use in libraries which has its basis in the Danish Data Model.
Visionary Technology in Library Solutions
Questions for Revision Working Group
1. Do we need a national profile? Yes2. Do we recommend a preferred encoding scheme for USA?
a. Should we follow ISO 28560 Part 2 specifications? Or, b. Should we follow ISO 28560 Part 3 specifications?
Part 23. Do we limit our discussion to 13.56 MHz tags? Yes Or,
a. Should we include UHF tags? For information onlyb. UHF tags are not currently part of the Standard.
4. Do we include a Section on “state of the industry”. No5. Other items as may come up
Visionary Technology in Library Solutions
USA National Profile for RFID
Within the framework of ISO 28560 a US National Profile may define-- which data elements are mandatory (versus optional)-- which encoding scheme is to be used for the tag-- which data elements are to be locked or left unlocked-- which encoding values to be used for specific data elements-- other considerations for interoperability
Visionary Technology in Library Solutions
US Profile for ISO 28560 -- 1 of 3
`
Data ObjectRelative
OIDFormatting Category
Main Purpose orCodes Used
LockedIf Used?
Primary Item ID (unique item identifier)
01Variable length
Alphanumeric. Character set = ISO/IEC 646 IRV
Mandatory Item Identification Optional
Tag Content Key 02 Bit mapped codeMandatory
*
Determining what other data is on the
tagNo
Owner Library/Institution
03Variable length field
Max: 16 bytesOptional
(1)Use ISIL code (ISO
15511)Optional
Set Info (number of parts; ordinal part number)
04{Total in Set / Part
Number} structure. Maximum size 255
Optional (2)
Item Properties Optional
Type of Usage: Circulating? Reference?
05Fixed
1 byteOptional
(3)Item Usage (coded
list)Optional
U.S. Profile for ISO 28560 – RFID in U. S. Libraries
Visionary Technology in Library Solutions
US Profile for ISO 28560 -- 2 of 3
`
Shelf Location 06Variable length
Alphanumeric. Character set = ISO/IEC 646 IRV
Optional (4)
Support
Inventory–
(LC Call Number, Dewey)
Optional
ONIX Media Format 07 Fixed length – 2 uppercase chars
Optional (5)Item Properties (ONIX
code list)Optional
MARC Media Format 08Fixed length – 2 lowercase
charsExcluded (6)
Item Properties (MARC code list)
N/A
Supplier Identifier 09Variable length
Alphanumeric. Character set = ISO/IEC 646 IRV
Optional (7) Acquisitions ProcessingNot
recommended
Order Number 10Variable length
Alphanumeric. Character set = ISO/IEC 646 IRV
Optional (8) Acquisitions ProcessingNot
recommended
ILL Borrowing Institution
11Variable length field
Max: 16 bytesOptional (9)
Support ILL – Use ISIL code (ISO 15511)
No
ILL Borrowing Transaction ID
12Variable length
Alphanumeric. Character set = ISO/IEC 646 IRV
Optional (10) ILL Transaction tracking
No
GS1-13 (including ISBN)
13Fixed length numeric field
– 13 digitsOptional
(11)Identification
Optional
Alternative unique item identifier – Reserved
14
Optional – Should not
be used until defined by ISO 28560
IdentificationNot
recommended
Data ObjectRelative
OIDFormatting
Category
Main Purpose orCodes Used
LockedIf Used?
Visionary Technology in Library Solutions
US Profile for ISO 28560 -- 3 of 3
`Data ObjectRelative
OIDFormatting Category
Main Purpose orCodes Used
LockedIf Used?
Local Data – A 15Variable length Alphanumeric. Character set = ISO/IEC 646
IRV, or UTF-8Optional (13)
For Local or Regional Use Optional
Local Data – B 16Variable length Alphanumeric. Character set = ISO/IEC 646
IRV, or UTF-8Optional (14)
For Local or Regional Use Optional
Title 17Variable length Alphanumeric. Character set = ISO/IEC 646
IRV, or UTF-8Optional (15) Identification Optional
Product Identifier (local) 18
Variable length Alphanumeric. Character set = ISO/IEC 646
IRVOptional (16) Identification Optional
Media Format (other)
19 Single Octet (coded list) Optional (17)Item Properties
(no code list defined)
Optional
Supply Chain Stage 20
Fixed1 Byte
Optional (18)For multi use (coded list) No
Supplier Invoice Number 21
Variable length Alphanumeric. Character set = ISO/IEC 646
IRVExcluded (19) Acquisitions N/A
Alternative Item Identifier 22
Variable length Alphanumeric. Character set = ISO/IEC 646
IRVOptional (20)
Item Identification Optional
Alterative Owner Library Identifier 23
Variable length Alphanumeric. Character set = ISO/IEC 646
IRVOptional (21)
Item Identification –
for codes not ISIL compliant
Optional
Subsidiary of an Owner Library 24
Variable length Alphanumeric. Character set = ISO/IEC 646
IRVOptional (22)
Item Identification Optional
Alternative ILL Borrowing Institution
25Variable length Alphanumeric. Character set = ISO/IEC 646
IRVOptional (23) Support ILL – For
non-ISIL codeNo
Local Data – C 26Variable length Alphanumeric. Character set = ISO/IEC 646
IRV, or UTF-8Optional (24)
For Local or Regional Use Optional
Visionary Technology in Library Solutions
Interoperability
Interoperability (from Whatis.com)
Interoperability (pronounced IHN-tuhr-AHP-uhr-uh-BIHL-ih-tee) is the ability of a system or a product to work with other systems or products without special effort on the part of the customer. Interoperability becomes a quality of increasing importance for information technology products as the concept that "The network is the computer" becomes a reality. For this reason, the term is widely used in product marketing descriptions.
Visionary Technology in Library Solutions
Four Levels of Interoperability
Level 1: Within the Library
Level 2: Within the community
Level 3: For ILL purposes
Level 4: Within the Supply Chain
Visionary Technology in Library Solutions
Other Considerations :Data encoding
Using ISO 28560-2 requires that data be encoded using ISO 15962.
Appendix D of the report shows exactly how the data should be encoded providing numerous examples.
This is not a simple process – however, there is good news. The encoding scheme optimizes the storage of data on the tag – so you get greater efficiency. It has to be done once (correctly) by your software or hardware supplier and then you can essentially forget about it.
See next slide as an example of some of the complexity.
Visionary Technology in Library Solutions
Data Encoding: Compaction Schemes
ISO/IEC 15962 compaction schemes
Code Name Description000 Application-defined As presented by the application001 Integer Integer010 Numeric Numeric string (from "0" to "9")011 5 bit code Uppercase alphabetic100 6 bit code Uppercase, numeric, etc101 7 bit code US ASCII110 Octet string Unaltered 8-bit (default = ISO/IEC 8859-1)111 UTF-8 string External compaction to ISO/IEC 10646
Note 1: There are 8 different compaction schemes and all may be used on the same tag.
Note 2: RFID users will not have to worry about this. It will be a part of the software provided by your RFID Software Supplier
Note3: See Appendix D of the NISO document for details on usage and implementation.
Visionary Technology in Library Solutions
Other Considerations
1.How soon will the standard be implemented?
2.What is minimum implementation requirement for me to be complaint?
3.What does the library have to do migrate to the new environment?
4.How do I know that the tag I am getting is an ISO 18000-3 Mode 1 tag?
5.How can I confirm/verify that my supplier is following the standard and has implemented it correctly?
6.Do we need a US certification process for compliant RFID systems/ suppliers?
Visionary Technology in Library Solutions
Report Outline & Todays Presentations
ForwardSection 1 – Use of RFID Section 2 – Data Model & US Profile Vinod ChachraSection 3 – Security Matthew BellamySection 4 – Migration to ISO Tags Section 5 – Supply Chain Section 6 – Privacy Daniel WaltersSection 7 – Vandalism Daniel Walters
Appendix A: RFID Technology Basics Appendix B: Interoperability CharacteristicsAppendix C: UHF RFID in LibrariesAppendix D: Encoding Data on the RFID Tag
Thanks to all the individuals who have generously shared their time and expertise for this project.
Visionary Technology in Library Solutions
Closing Comments
Exciting times ahead!
Thanks to all the individuals named below who have generously shared their time and expertise for this project.
Livia Bitner Corrie MarshVinod Chachra, co-chair Paul Sevcik, co-chairAlan Gray Paul SimonMargaret hazel Robert WalshGretchen Herman Dan WaltersNancy Kress Karen Wetzel
21
NISO RFID in Libraries
© 3M 2010. All Rights Reserved.
Solutions TechnologiesNISO RFID Systems in Libraries – RFID Security
Library Systems
+
22
NISO RFID in Libraries
Hello
© 3M 2010. All Rights Reserved.
Matthew Bellamy3M Library Systems
3M employee since 2001 Current responsibilities
Lead new product development teams Support 3M’s global library business
3M Library Systems for nearly 10 years and has worked with hundreds libraries to help them improve SelfCheck™ System usage and leverage technology to provide enhanced customer service.
23
NISO RFID in Libraries
Today’s Objectives
© 3M 2010. All Rights Reserved.
Aspects of RFID security Methods of security Variables that Impact RFID Security Threats to RFID Security What the standards say about security Interlibrary loan and how it relates to
security
24
NISO RFID in Libraries
Aspects of Security
ROI What is the loss or potential loss Does it justify the expense Does it come as an extra with other uses (RFID for materials handling)
Psychological Fake detection systems Guilt
Enhanced Security Behind the counter Items checked at the door EM with RFID
25
NISO RFID in Libraries
Aspects of Security – Disc Media
Demand and popularity drive theft CDs/DVDs are popular and attract thieves
They also tend to be more difficult to protect except by using physical behind the counter or dispensing solutions
Metal in the media interferes with RFID
Cost of materials may justify different security solution levels Dispensing systems Locked cases Behind the counter
26
NISO RFID in Libraries
The Methods for RFID Security
AFI – Application Family Identifier Part of the ISO 18000-3 Mode 1 Standard Original use was not intended for security Each industry and application allocated unique
value ISO Recommended Values
• 07hex = secure, C2hex. = unsecure
EAS – Electronic Article Surveillance Proprietary solution from NXP Single bit – 1 = secure, 0 = unsecure
Virtual Security – Database of security values Security status is maintained in an online
database Typically keyed using the Unique ID on the tag Typically cannot be tampered with because the
Unique ID cannot be changed
27
NISO RFID in Libraries
Detection system Antenna and reader design Proximity and number of pedestals
RFID Tag Antenna / chip design not necessarily total tag size Composition of tagged material
Environmental variables Presence of other RFID equipment Proximity of Detection System to metal
Patron characteristics Carrying position- location and orientation (low/high, backpacks) Other things in their possession (laptops, etc.) Number of items with tags- single versus multiple
What variables impact RFID Detection System Performance?
28
NISO RFID in Libraries
Identification During Detection
Provide the item ID of the object as it moves through the corridor May be limited by:
Multiple item interference Throughput if many items are present Detection system reader and antenna design
Tag impact: Tag performance and design Tag placement
User Impact Carrying position Speed of travel
29
NISO RFID in Libraries
Threats to RFID security
Vandalism Tags ripped out of or off of materials
Shielding Tags Booster Bags Covering in foil
Electronic alteration Rewriting of data on the tag
Other Kids fascination with taking things apart or picking at labels
30
NISO RFID in Libraries
What do the standards say about security?
The standards do not mandate a particular method of security If AFI is used for security,
Checked - out value is C2hex.
Checked - in value is 07hex.
AFI must always be programmed to C2hex when the item is not physically inside the library regardless of security method
Recommendation is to avoid locking the AFI, so it can be used later for security. This future need could arise in your library or at an ILL borrowing library.
Informatively, the standards documentation notes that EAS implementations are typically proprietary and may inhibit a library’s ability to change chip providers in the future, should there be a desire to change.
31
NISO RFID in Libraries
Inter-library loan and how it affects security
Host library is responsible for supporting security method When checked in, the host library would set the appropriate security method AFI or EAS
Lending library is responsible for re-securing the item when it returns.
© 3M 2010. All Rights Reserved.
32
NISO RFID in Libraries
Thank you
If you have any questions please don’t hesitate to contact me
Matthew BellamyGlobal RFID Product Marketing Manager3M Track & Trace Solutions - Library Systems3M Center, Building 225-04-N-14 | St. Paul, MN 55144Office: 651-733-5373 | Mobile: 612-414-1809 | Fax: 651-732-8246mbellamy2@mmm.com | www.3m.com/us/library
© 3M 2010. All Rights Reserved.
NISO Recommended Practice Sections 6 & 7: Privacy and
Vandalism
Dan Walters, Retired
Patron Privacy & RFID
• Privacy & RFID discussion context– Institutional and patron orientations regarding
privacy issues– Professional and trade association orientations
regarding privacy• ALA & BISG began work in 2003 on RFID privacy
– Vendor and technology issues and constraints• RFID privacy strategies share approaches of ILS and
other legacy systems to protect PII
ALA, BISG & RFID• Privacy and Confidentiality – ALA document
– http://www.ala.org/ala/aboutala/offices/oif/ifissues/privacyconfidentiality.cfm
• Questions and Answers on Privacy and Confidentiality– http://www.ala.org/ala/issuesadvocacy/intfreedom/librarybill/interpretations/qa-privacy.cfm
• Book Industry Study Group RFID Policy Statement, September 2004– http://www.bisg.org/docs/BISG_Policy_002.pdf
• Resolution on Radio Frequency Identification (RFID) Technology and Privacy Principles – ALA Council, January 2005
– http://www.ala.org/template.cfm?section=ifresolutions&template=/contentmanagement/contentdisplay.cfm&contentid=85331
• RFID in Libraries: Privacy and Confidentiality Guidelines –ALA Intellectual Freedom Committee, June 2006
– http://www.ala.org/template.cfm?section=otherpolicies&template=/contentmanagement/contentdisplay.cfm&contentid=130851
Resolution on Radio Frequency Identification (RFID) Technology and Privacy Principles
• Acknowledges longstanding privacy and confidentiality• Five main policy tenets
– Implement & enforce privacy policy that discloses all uses and changes of new RFID system
– No Personally Identifiable Information (PII) but transactional data is permitted
– Protect data by reasonable security safeguards against interpretation by any unauthorized third party
– Comply with applicable law and follow best practices– Ensure that above four principles are verifiable by audit
RFID in Libraries: Privacy and Confidentiality Guidelines
• Policy Guidelines– Use RFID selection and procurement process to
educate users and staff– Consider using two systems for circulation – RFID
or no RFID– Update privacy policies /procedures in accordance
with critical ALA policies– Assure appropriate configurations of RFID system– Notify public about Library’s use of RFID
RFID in Libraries: Privacy and Confidentiality Guidelines
• Best Practices– Continue practices securing bibliographic and patron
databases from unauthorized use– Limit the bibliographic information stored on a tag
to a unique identifier; store no PII – Block public from searching by unique RFID
identifier• Talking To Vendors about RFID
– Provides guidelines to determine vendors approach to privacy
Vandalism
• Acknowledge limits to preventing vandalism and theft in public lending institution
• Technical modification of data using RFID readers– Security data– Tag contents– RFID Viruses– Detuning a tag
• Physical defacing or removal of tag– Children play with stickers!