+ All Categories
Home > Documents > Rfid Security Bibhuti

Rfid Security Bibhuti

Date post: 05-Apr-2018
Category:
Upload: shivam-jaiswal
View: 222 times
Download: 0 times
Share this document with a friend

of 29

Transcript
  • 8/2/2019 Rfid Security Bibhuti

    1/29

    THE SECURITY FOR LIBRARY

    Mr. Bibhuti bhusan Pattanaik (Asst. Librarian),

    I.T.S - IM Library, Greater Noida,

    Email: [email protected]. Babita Pattanaik (Lecturer), North Orissa

    University, Baripada

    Email: [email protected]

    mailto:[email protected]:[email protected]:[email protected]:[email protected]
  • 8/2/2019 Rfid Security Bibhuti

    2/29

    Presentation OutlineTo Educate and Inform You

    1. About RFID system

    2. How does RFID works

    3. Why RFID

    4. Agenda & Concern

    5. Implementation6. Benefit

    7. Conclusion

  • 8/2/2019 Rfid Security Bibhuti

    3/29

    1. About RFID system

    Brief History

    What is RFID system

    RFID Architecture & Key Components

    Standards

    Key Agenda & Concern for Library

  • 8/2/2019 Rfid Security Bibhuti

    4/29

    Brief History

    RFID (Radio Frequency Identifier) an Auto-ID data

    collection system surveillance, using RF waves forIdentifying, Tracking and doing Management ofmaterial flow.

    Basic concept behind RFID is same as Mirror-Sunlight-

    Reflection theory

    Invented and used from (Early 1940s)

    Commercial Operation begun from 1960s

    In 1970s developers, inventors, companies, academicinstitution and government sectors were actively worked on

    RFIDMost common application were tracked person and objects, identified

    goods in supply chain, reusable container, high value tools, security,

    controlling access to building, networks, payment systems and other assets.

  • 8/2/2019 Rfid Security Bibhuti

    5/29

    What is RFID system

    RFID is an acronymfor radio frequencyidentification.Briefly the RFstand for radio-frequency and ID

    means identifierthat allows an item,for instance alibrary book, to beidentified,accessed, stored,

    reprogrammed andcommunicated byusing radio waves

    A method for controlling inventory

    Automatically identify objects

    An AUTO-ID based System

    Offering Self Check out/in

    Saving Time and Money

    Gathering statistics on used Items

    Minimize Work Stress of Staff

    Easily Prevent Theft

    Improve Customer Services And

    Non-Line-Sight Communication

  • 8/2/2019 Rfid Security Bibhuti

    6/29

    RFID Architecture

    Tags Reader

    Gateway

    Database

    Database

    Application

    UserInterface

    Backend

    Fig.1. A General Overview of RFID

    Architecture

    Scanned

    As depicted in figure.1 the whole operation are worked under

    three key phases.

    Firstly items-tag arescanned by reader;

    Secondly in backend

    transmitted data coming

    through antenna (RF-wave)

    are being recognized by

    RFID-based system PC. It

    acts as a middleware

    communication gateway

    among items, reader and

    system database;

    And at the endit filters out

    and store data in RFID-

    databases for checking the

    data fault and relevant

    operation.

  • 8/2/2019 Rfid Security Bibhuti

    7/29

    Key Components TAGS

    READER

    SELF CHECK-OUT/IN

    INVENTORY READER

    BOOK DROP READER

    MIDDLEWARE (PC)

    SECURITY GATE

    LABEL PRINTER

    SORTER

  • 8/2/2019 Rfid Security Bibhuti

    8/29

    TAGSPaper thin 2X2inchin size.

    Read-only or

    Read/writable

    Storage capacity

    of 2KB data thatcontain 96bits

    serial number.

    Tags come in many

    flavors: passive, battery

    assisted, active, differentfrequencies, various anti-

    collision technologies,

    printed/wire wounded

    antenna etc.

  • 8/2/2019 Rfid Security Bibhuti

    9/29

    READER

    A device that is used tointerrogate an Tag.

    Basic components are

    A scanning Antenna

    A transceiver with a

    decoder to interpret data helps in personalize &

    read data.

    http://www.gaorfid.com/images/rfid_readers_902_236002.jpg
  • 8/2/2019 Rfid Security Bibhuti

    10/29

    SELF CHECK-OUT/IN

    Dual Function(rfid & barcode)

    Store information about item.

    Performance statistics

    Multiple items can be checked

    out at a time

    Easier to Use.

  • 8/2/2019 Rfid Security Bibhuti

    11/29

    INVENTORY READER

    A compact and light weight

    hand held device

    Comfortable to use

    High storage capacity

    Multi Functional (such as

    shelving, sorting, searching,

    weeding and reading)

    Enhanced Security.

  • 8/2/2019 Rfid Security Bibhuti

    12/29

    BOOK DROP READER

    Self Checks-in

    books when

    patrons dropthem in book-

    drop ..

  • 8/2/2019 Rfid Security Bibhuti

    13/29

    MIDDLE WARE

    Provide reader connectivity to other systems on the

    network.

    Translate data and transmit to its other application

  • 8/2/2019 Rfid Security Bibhuti

    14/29

    SECURITY GATE

    Verify that all books

    leaving the library have been

    checked out. Detect Theft and

    Prevent unauthorized

    removal of material

  • 8/2/2019 Rfid Security Bibhuti

    15/29

    Standard

    RFID STANDARD USED FOR LIBRARY:Standard : ISO-15693

    Frequency: 13.56 MHZ

    Dimension : 400mm X 200mm X 120mm

    Housing : Metal

    Data Interface: RS 232

    Protocol : SIP and/or API (presently usingSTX/ETX communication protocol)

    Indicator : Tag Data LED and Power LED

    Voltage : 230 Volt

    Certification : CE and Radio Approval

  • 8/2/2019 Rfid Security Bibhuti

    16/29

    Frequency: 13.56 MHZ

    Key feature of 13.56Mhz is

    Tags are less expensive due to their

    limited coil required.

    Read range about 1-2feet.

    Some tags are anti collision

    collects, uses, stores and broadcast data

    Controlled all conveyor setting

  • 8/2/2019 Rfid Security Bibhuti

    17/29

    Key Agenda & Concern for

    LibraryAGENDA Material security

    Financial Liabilities

    Personal Comfort andSafety

    Privacy and

    Problem patrons

    CONCERN To Increase productivity

    Improve customer services

    Maintain current staff level

  • 8/2/2019 Rfid Security Bibhuti

    18/29

    AGENDAMaterial Security: Use of Hardware and

    Software Reader Range

    Read Quality Data Integrity Frequency

    Personal Safety: Staff stress Theft detection Privacy

    Financial Liabilities: One Time Implementation costs System maintenance & Licensing Security system costs

    Tags cost

    Problem Patrons: Block the RF-Wave

    Items with Odd shape &metal component Doc.like pamphlet, sheet

    music, magazine etc. Staff & Patron

    interaction

    PRIVACY & SECURITY: Tracking Individuals Inappropriate use of

    personal data Theft of Information Ownership and Legal issue Inadequate Encryption Database hacked

  • 8/2/2019 Rfid Security Bibhuti

    19/29

    Increase productivity

    More accurate shelving

    Time saving, speedy

    Provide security andmaterial controls

    More opportunity forenhanced services

    Durability, longevity andInsurance

    Improve customer services

    Materials more readilyavailable

    Less time wasted in line tocheck out/ check in

    Fewer items remain charged toaccounts

    Improved privacy since staff

    never sees whats beingchecked out

    CONCERN

    Maintain current staff level

    Repetitive Stress

    Reduce handling of item withRFID

  • 8/2/2019 Rfid Security Bibhuti

    20/29

    How does RFID works

    RFID-READER RFID-TAG

    PERSONALIZER (Application Device)

    DATA FLOW

    RF COUPLING

    Time

    Energy

    Up-to-date

    Fig.1. Items personalized model for RFID system

    PC

  • 8/2/2019 Rfid Security Bibhuti

    21/29

    Why RFID

    I. Barcode Vs RFID

    II. Inventory Management

    III. Economic Facts

    IV. Customer Satisfaction

  • 8/2/2019 Rfid Security Bibhuti

    22/29

    Barcode Vs RFID

  • 8/2/2019 Rfid Security Bibhuti

    23/29

    Inventory Management

    Read/Write

    - Ability to add information directly to tags enables eachunique asset to carry its own unique history

    Non-contact Reads

    - Ability to read tags at a distance, under a variety of

    environmental conditions, without physicalmanipulation of the asset

    Fast Read

    - Ability to simultaneously read large numbers (1000-1750 tags/sec) of items

    Automation- Requires less human intervention

    Authenticity

    - Each RFID chip is unique and can not be replicated

  • 8/2/2019 Rfid Security Bibhuti

    24/29

    Economic FactsIncrease Security Security of material is automatic without staff intervention.

    Automatic items check out/ check in and sorting can beaccomplished with LMS circulation software, therefore

    eliminating extra processing time of staff and make iteconomically viable.

    Cost Avoidance Currently Missing Items statistics

    Replacement cost

    Selection, classification, processing, cost of searching,notification etc. is improved one

    Existing Material Management system

    Staff cost (manual way to do house keeping job)

    Eliminates the time consuming process of barcodescanning and reading.

    High speed Inventorying

    High Reliability

    The RFID readers are highly reliable, almost 100%detection rate.

    Multiple items can be checked out/ checked in at a time.

    Make library staff free from the risk of repetitive stressinjuries.

    Longevity RFID tags last longer than barcodes

    COST FACTORS

    Implementation cost

    Cost of RFID tags

    Reader

    Hand held device

    software interface

    Others

    On going system Cost

    System maintenance

    Security system cost

    Work station maintenance

    Technical staff

  • 8/2/2019 Rfid Security Bibhuti

    25/29

    Customer Satisfaction

    Materials control, Security,

    High speed Inventorying,

    Faster Check-out/-in,

    Longevity of Tags,

    Reduce staff stress,

    Prevent Theft,

    Searching, notifying and Gathering statistics on items become easy.

    ---------- It Made Sense!!

  • 8/2/2019 Rfid Security Bibhuti

    26/29

    Implementation

    Start

    Identify

    Plan

    Implementation

    Why you want

    RFID?Begin with

    your goals.

    Where RFID will deliver value

    to your Library and its

    Customers.

    Ready your organization for

    change.

  • 8/2/2019 Rfid Security Bibhuti

    27/29

    BenefitBetter Collection Management

    Shelves rectification and Verification Improved Productivity and Services

    Wireless inventory management

    Faster Checked Out/In Prevent Theft Quick Searching, Weeding & inventory audit

    Cost Avoidance Eliminate Manual Labor Cost. Improve automation process

    Reduce Repetitive Stress Injury

  • 8/2/2019 Rfid Security Bibhuti

    28/29

    Conclusion

    RFID technology is taking off in libraries at an increasingly

    rapid pace. Though there are few libraries employing this

    technology today, but due to its customizable feature and

    continuing improvement the library communities are

    beginning to get involved in its development. It is easy to

    envision that, the RFID tags contents will increase in power,

    prices are expected to decline and tag will dramaticallyimprove its efficiency, security and accuracy. Also major

    concerns need to be addressed for successfully implementing

    this technology. So that it will change our personal and work

    lives in library and adorns the conventional library

    management with a new idea and usher for a bright future.

    RFID IS A SUPPORTING TECHNOLOGY--- NOT A COMPETING !!

    3M-LIBRARY SYSTEM

  • 8/2/2019 Rfid Security Bibhuti

    29/29

    THANK

    YOU


Recommended