Dr. Vinod Chachra Chairman, NISO Standards Committee on Library Applications of RFID CEO, VTLS Inc. CEO, VTLS Inc. A Report on NISO A Report on NISO ’ ’ s work on s work on RFID Standards in Libraries RFID Standards in Libraries
Jun 21, 2015
Dr. Vinod ChachraChairman, NISO Standards Committee on Library Applications of RFID
CEO, VTLS Inc.CEO, VTLS Inc.
A Report on NISOA Report on NISO’’s work on s work on
RFID Standards in LibrariesRFID Standards in Libraries
Visionary Technology in Library Solutions
VTLS Products Main VTLS Other In Beta TestProducts VTLS Products
Related to Virtua: 1. FRBR 2. URL Checker 3. SRU/SRW 4. Union Catalogs and Consortium Databases5. Aqua Browser and other partner products
Visionary Technology in Library Solutions
Visionary Technology in Library Solutions
VTLS is the first spin-off corporation from Virginia Tech
VTLS does business in 36 countries
VTLS has been working with RFID solutions for libraries for over eight years
VTLS RFID library management software is now RFID hardware and tag supplier independent.
www.vtls.com
Visionary Technology in Library Solutions
NISO RFID Standards Committee
Following types of organizations are participating in the working group:
1. RFID hardware manufacturers
2. RFID solution providers (software and integration)
3. RFID Library users
4. Book jobbers/ book processors
5. Other related organizations
Visionary Technology in Library Solutions
Focus of NISO RFID Standards
• RFID solutions run at several frequencies –Low – from 125KHz to 134KHz
High – 13.56MHz
Ultra High – 860-960 MHz
Micro Wave – 2.45 GHz
• NISO’s work is limited to Tags used in libraries –that is, tags operating at 13.56 MHz
Visionary Technology in Library Solutions
Focus of NISO Standards Group
Four issues of importance were identified:
1. Privacy Issues and concerns
2. Support of functional capabilities
3. Performance efficiency
4. Cost considerations (total cost of ownership)
Items 2 , 3 and 4 are linked and interdependent.
Visionary Technology in Library Solutions
First of Two Objectives
Interoperability (from Whatis.com)Interoperability (pronounced IHN-tuhr-AHP-uhr-uh-BIHL-ih-tee)
is the ability of a system or a product to work with other systems or products without special effort on the part of the customer. Interoperability becomes a quality of increasing importance for information technology products as the concept that "The network is the computer" becomes a reality. For this reason, the term is widely used in product marketing descriptions.
Yesterday you heard about some of the interoperability concerns from Livia Bitner from Baker & Taylor.
Visionary Technology in Library Solutions
First of Two Objectives
How is interoperability achieved? (whatis.com)
Products achieve interoperability with other products using either or both of two approaches:
By adhering to published interface standards
By making use of a "broker" of services that can convert one product's interface into another product's interface "on the fly”.
The first option is preferred.
Visionary Technology in Library Solutions
Second of Two Objectives
IsolationMore specifically, Vertical Application Isolation
We do not want CDs purchased at a store trigger library security gates and library books to set off alarms at grocery stores.
Application Family Identifiers may be useful here
Visionary Technology in Library Solutions
Approach taken by NISO
Examine existing standards; Adopt what can be adopted
Examine existing data models
Address the four issues previously mentioned keeping the objectives in mind
Create a “Best Practices” document by the end of 2006.
Visionary Technology in Library Solutions
ISO 18000 Standards
18000-1 Part 1 – Generic Parameters for the Air Interface for Globally Accepted Frequencies
18000-2 Part 2 – Parameters for Air Interface Communications below 135 kHz
18000-3 Part 3 – Parameters for Air Interface Communications at 13.56 MHz
18000-4 Part 4 – Parameters for Air Interface Communications at 2.45 GHz
18000-5 Part 5 – Parameters for Air Interface Communications at 5.8 GHz (Withdrawn)
18000-6 Part 6 – Parameters for Air Interface Communications at 860 to 930 MHz
18000-7 Part 7 – Parameters for Air Interface Communications at 433 MHz
Visionary Technology in Library Solutions
Scope of ISO 18000-3
““The scope of the ISO 18000The scope of the ISO 18000--3 standard is to provide 3 standard is to provide Physical Layer, Collision management System and Physical Layer, Collision management System and Protocol Values for RFID Systems for Item Protocol Values for RFID Systems for Item Identification operating at 13.56 MHz in accordance Identification operating at 13.56 MHz in accordance with the requirements of ISO 18000with the requirements of ISO 18000--11””
Some library vendors say they are ISO 18000 or ISO Some library vendors say they are ISO 18000 or ISO 1800018000--1 compliant instead of the more specific ISO 1 compliant instead of the more specific ISO 1800018000--3 compliant, but they mean the same thing.3 compliant, but they mean the same thing.
Visionary Technology in Library Solutions
ISO 15693The ISO 15693 specification has three main parts:The ISO 15693 specification has three main parts:
Physical characteristicsPhysical characteristics
Signal Interface and Signal Interface and
Transmission ProtocolTransmission Protocol
It holds the promise of interoperability (at the technical It holds the promise of interoperability (at the technical level as mentioned by Alastair McArthur, TagSys) level as mentioned by Alastair McArthur, TagSys) among different suppliers of RFID solutionsamong different suppliers of RFID solutions
ISO 15693 is not to be confused with ISO 15963 which ISO 15693 is not to be confused with ISO 15963 which is used for is used for RFID for Item Management RFID for Item Management -- Unique Unique Identification of RF TagIdentification of RF Tag (also read 15961 & 15962)(also read 15961 & 15962)
Visionary Technology in Library Solutions
Privacy ConcernsProper caution and concern raised by some privacy Proper caution and concern raised by some privacy
advocates advocates …… including EFF (Electronic Frontier including EFF (Electronic Frontier Foundation) and by Deirdre Mulligan at the RFID Foundation) and by Deirdre Mulligan at the RFID meeting in Texas.meeting in Texas.
Exaggerated concerns raised by some librarians.Exaggerated concerns raised by some librarians.
Issue is very sensitive for it can Issue is very sensitive for it can potentially cause privacy problems and/orpotentially cause privacy problems and/orpossibly derail or slow down RFID implementations and/or possibly derail or slow down RFID implementations and/or add to the implementation costsadd to the implementation costs
Organizations like BISG, EFF and American Library Organizations like BISG, EFF and American Library Association, Association, Center for Democracy and Technology (CDT Center for Democracy and Technology (CDT Group)Group) are providing leadership in this area.are providing leadership in this area.
Visionary Technology in Library Solutions
Book Industry Study Group (BISG)
RFID Privacy Principles RFID Privacy Principles
(This is a direct quote from the BISG web site)(This is a direct quote from the BISG web site)All businesses, organizations, libraries, educational institutioAll businesses, organizations, libraries, educational institutions and nonns and non--profits that buy, sell, loan, or otherwise make available books profits that buy, sell, loan, or otherwise make available books and other and other content to the public utilizing RFID technologies shall:content to the public utilizing RFID technologies shall:
1) Implement and enforce an up1) Implement and enforce an up--toto--date organizational privacy policy that date organizational privacy policy that gives notice and full disclosure as to the use, terms of use, angives notice and full disclosure as to the use, terms of use, and any d any change in the terms of use for data collected via new technologichange in the terms of use for data collected via new technologies and es and processes, including RFID.processes, including RFID.
2) Ensure that no personal information is recorded on RFID tags 2) Ensure that no personal information is recorded on RFID tags which, which, however, may contain a variety of transactional data.however, may contain a variety of transactional data.
Visionary Technology in Library Solutions
Book Industry Study Group (BISG)
3) Protect data by reasonable security safeguards against interp3) Protect data by reasonable security safeguards against interpretation by retation by any unauthorized third party.any unauthorized third party.
4) Comply with relevant federal, state , and local laws as well 4) Comply with relevant federal, state , and local laws as well as industry as industry best practices and policies.best practices and policies.
5) Ensure that the four principles outlined above must be verifi5) Ensure that the four principles outlined above must be verifiable by an able by an independent audit.independent audit.
This policy has been developed and released by the Book IndustryThis policy has been developed and released by the Book Industry Study Study Group in cooperation with the American Library Association, OffiGroup in cooperation with the American Library Association, Office of ce of Information Technology and the Office for Intellectual Freedom, Information Technology and the Office for Intellectual Freedom, as well as as well as the National Information Standards Organizationthe National Information Standards Organization
Visionary Technology in Library Solutions
Potential exposure from ILS
In my opinion there is potentially greater exposure In my opinion there is potentially greater exposure from ILS systems than from RFID systems from ILS systems than from RFID systems (see (see paper paper ““Personal Privacy and Use of RFID Personal Privacy and Use of RFID Technology in LibrariesTechnology in Libraries”” at www.vtls.com) at www.vtls.com)
This exposure comes when circulation links between This exposure comes when circulation links between book and patron are not erased in order tobook and patron are not erased in order to
a. gather library statisticsa. gather library statisticsb. record unpaid finesb. record unpaid finesc. provide c. provide ““value added servicesvalue added services””
d. support recovery functionsd. support recovery functions
Visionary Technology in Library Solutions
RFID function related concerns
Functions supported by RFID systems in librariesFunctions supported by RFID systems in libraries
Self Checkouts including bulk checkoutsSelf Checkouts including bulk checkouts
Checkins and book dropsCheckins and book drops
Security functions (EAS Gates)Security functions (EAS Gates)
Sortation functionsSortation functions
Inventory functionsInventory functions
Visionary Technology in Library Solutions
RFID Security and Interoperability
Three security methods used todayThree security methods used today
AFI (Application Family Identifier) based securityAFI (Application Family Identifier) based security
EAS (Electronic Article Surveillance) bitEAS (Electronic Article Surveillance) bit
Database lookupDatabase lookup
Which method is NISO going to recommend? Which method is NISO going to recommend? (STC)(STC)Allow all three methods to be usedAllow all three methods to be usedInsist on Interoperability RequirementsInsist on Interoperability RequirementsLeave security as a place of differentiation among Leave security as a place of differentiation among vendorsvendors
Visionary Technology in Library Solutions
L ib ra rie s & IS O R F ID S ta n d a rd s Ju n e 2 0 0 6C o p yrig h t p ra x is co n su lta n ts ,2 00 6
T h e A F I: A P o w e rfu l T o o l to S e le c t O n ly R e le va n t T a g s
R e a d e r
Importance of AFI
Visionary Technology in Library Solutions
RFID Security and Interoperability
Requirements for interoperabilityRequirements for interoperability
Standard AFI Code for library applications for Standard AFI Code for library applications for books checked out books checked out -- code assigned by code assigned by
Keep the AFI code unlockedKeep the AFI code unlocked
Standard AFI Code for library applications for Standard AFI Code for library applications for books checked in (checked in books can use a books checked in (checked in books can use a locally assigned (locally as in USA) locally assigned (locally as in USA) –– but standard but standard AFI code)AFI code)
Visionary Technology in Library Solutions
Joint Application for AFI Code
EDItEUR, NISO and Danish National Library are EDItEUR, NISO and Danish National Library are filing a joint application to JTC1/SC31 WG4 for the filing a joint application to JTC1/SC31 WG4 for the assignment and registration for a library specific assignment and registration for a library specific AFI code to be used for books that are checked AFI code to be used for books that are checked out. out.
(Already done earlier this month (Already done earlier this month –– June 2006)June 2006)
Visionary Technology in Library Solutions
The Data Model
How much data should be placed on the RFID tags?How much data should be placed on the RFID tags?There are two schools of thought There are two schools of thought ----
1. As little as possible (just an ID)1. As little as possible (just an ID)2. More in support of efficiency & performance2. More in support of efficiency & performance
-- security data security data -- sorting and shelving datasorting and shelving data-- last use data for weeding and inventorylast use data for weeding and inventory-- book title for finding lost books or for book title for finding lost books or for
checkouts checkouts 3. The more the data the slower the tag read!3. The more the data the slower the tag read!
Visionary Technology in Library Solutions
The Danish Data Model
It is an RFID data model for libraries.
The data model has four parts:
1. Data elements
2. Values and range
3. Encoding and
4. Physical mapping.
Click here to read the model
Visionary Technology in Library Solutions
NISO WG and the Danish ModelCopy of the data model is available on the internetNISO working group is now studying the data model to see if
The model meets the needs of USA RFID applicationsThe models meets the needs of USA applications with some modificationsA new model will have to be developed to meet our needs.
Based on the outcome of the study a course of action for the future will be defined.This project in ongoing.
Visionary Technology in Library Solutions
Outline of NISO report
Click here for Outline
Visionary Technology in Library Solutions
Thanks
• To the conference organizers for inviting me here
• To all of you for being here, being attentive and staying awake!!
Parting thought“Go as far as you can see
for you will be able to see farther when you get there”
Source unknown