niso webinar: rfid systems in libraries part 2: standards

39
RFID Systems in Libraries Part Two: Standards for RFID Systems April 20, 2011 Speakers: Vinod Chachra, Matt Bellamy, and Dan Walters http://www.niso.org/news/events/2011/ nisowebinars/rfidparttwo/

Upload: national-information-standards-organization-niso

Post on 16-Jan-2015

1.107 views

Category:

Business


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: NISO Webinar: RFID Systems in Libraries Part 2: Standards

RFID Systems in LibrariesPart Two: Standards for RFID Systems

April 20, 2011

Speakers: Vinod Chachra, Matt Bellamy, and Dan Walters

http://www.niso.org/news/events/2011/nisowebinars/rfidparttwo/

Page 2: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Vinod Chachra, CEO, VTLS Inc.Co-chair, NISO RFID Revision Working Group for U.S.A. Libraries

NISO RFID Systems in Libraries (Part 2) Webinar April 20, 2011 at 1:00 PM

Page 3: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

Intent of this Section

The intent of this section of the Webinar is to present the NISO Data Model and U. S. Profile for ISO 28560-2

The main goal of the Data Model is to provide interoperability for libraries and efficiencies for distributors of RFID products and service.

The idea is to help create an environment that allows libraries to invest in this technology with confidence and with some assurance that they will have choices now, and in the future, without being locked into any one supplier or vendor.

The model dictates a certain amount of consistency in support of interoperability but also provides flexibility to suppliers to be creative in providing new and different solutions to the library industry.

The ultimate intention is that RFID tags programmed by one vendor in compliance with the data model will be usable by another RFID vendor without any reprogramming.

Page 4: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

Background on NISO work In 2008 NISO published a report --NISO RP-6-2008 -- RFID in U.S. Libraries.

At the National Level: The 2008 report –

was the result of deliberations by a working group which I chaired.

outlined best practices for RFID in US Libraries.

presented a data model for use in US libraries.

At the International Level: ISO TC 46/SC 4/WG 11 for ISO-28560 was formed

Vinod Chachra and Paul Sevcik were US representatives to ISO.

Standard was published in March 2011.

In anticipation of ISO-28560 -- New NISO RFID Revision Group was formed

Co-chaired by Vinod Chachra and Paul Sevcik

Goal: revise 2008 report to conform with the requirements of ISO 28560

Status: Work on report is almost complete;

Report will be ready for public comment very soon.

Page 5: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

Goals of 2008 RFID Working Group

To review existing RFID standards… and promote its use where appropriate;

To examine and assess privacy concerns;

To investigate the way RFID is used in the United States and identify best practices in standards development and implementation;

To focus on security and data models for RFID tags, along with issues of interoperability and privacy;

To create a “best practices” document for libraries … and help safeguard library investments in RFID and minimize the cost of obsolescence.

Page 6: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

Scope of 2008 Working Group

RFID solutions run at several frequencies –

Low – from 125KHz to 134KHz

High – 13.56MHz

Ultra High – 860-960 MHz

Micro Wave – 2.45 GHz

NISO’s work is limited to Tags used in libraries

Note: At present, these tags operate at 13.56 MHz, though this may change in the future

Page 7: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

NISO Revision Working Group

1. Co-Chairs Vinod Chachra (VTLS) and Paul Sevcik (3M)2. Goal – Revise best practices document NISO RP-6-20083. Objectives –

a. Make the US data model consistent with the proposed ISO 28650 data model (Part 1)

b. Determine if USA will recommend Part 2 or Part 3 of the ISO 28560 standard for implementation.

c. More broadly, determine if a US National Profile is necessary and if necessary, develop it.

d. Review and update the original documente. Consider new items

Page 8: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

ISO 28560 Parts 1, 2 & 3Technical Committee TC46 (Information and Documentation) Subcommittee SC4 (Technical Interoperability) Working Group WG11 (RFID in Libraries) … ISO TC46/SC4/WG11

ISO 28560-1 : Part 1: Data Elements and general guidelines for implementation, deals with the definitions of the data elements that may be encoded onto RFID tags in the library application. ISO 28560-2: Part 2: Encoding based on ISO/IEC 15962, defines an encoding method for compacting data elements into objects and placing them on RFID tags for use in libraries which utilizes the encoding rules defined in the existing standard, ISO/IEC 15962.

ISO 28560-3: Part 3: Fixed Length Encoding, defines an encoding method for placing data elements on RFID tags for use in libraries which has its basis in the Danish Data Model.

Page 9: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

Questions for Revision Working Group

1. Do we need a national profile? Yes2. Do we recommend a preferred encoding scheme for USA?

a. Should we follow ISO 28560 Part 2 specifications? Or, b. Should we follow ISO 28560 Part 3 specifications?

Part 23. Do we limit our discussion to 13.56 MHz tags? Yes Or,

a. Should we include UHF tags? For information onlyb. UHF tags are not currently part of the Standard.

4. Do we include a Section on “state of the industry”. No5. Other items as may come up

Page 10: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

USA National Profile for RFID

Within the framework of ISO 28560 a US National Profile may define-- which data elements are mandatory (versus optional)-- which encoding scheme is to be used for the tag-- which data elements are to be locked or left unlocked-- which encoding values to be used for specific data elements-- other considerations for interoperability

Page 11: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

US Profile for ISO 28560 -- 1 of 3

`

Data ObjectRelative

OIDFormatting Category

Main Purpose orCodes Used

LockedIf Used?

Primary Item ID (unique item identifier)

01Variable length

Alphanumeric. Character set = ISO/IEC 646 IRV

Mandatory Item Identification Optional

Tag Content Key 02 Bit mapped codeMandatory

*

Determining what other data is on the

tagNo

           

Owner Library/Institution

03Variable length field

Max: 16 bytesOptional

(1)Use ISIL code (ISO

15511)Optional

Set Info (number of parts; ordinal part number)

04{Total in Set / Part

Number} structure. Maximum size 255

Optional (2)

Item Properties Optional

Type of Usage: Circulating? Reference?

05Fixed

1 byteOptional

(3)Item Usage (coded

list)Optional

U.S. Profile for ISO 28560 – RFID in U. S. Libraries

Page 12: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

US Profile for ISO 28560 -- 2 of 3

`

Shelf Location 06Variable length

Alphanumeric. Character set = ISO/IEC 646 IRV

Optional (4)

Support

Inventory–

(LC Call Number, Dewey)

Optional

ONIX Media Format 07 Fixed length – 2 uppercase chars

Optional (5)Item Properties (ONIX

code list)Optional

MARC Media Format 08Fixed length – 2 lowercase

charsExcluded (6)

Item Properties (MARC code list)

N/A

Supplier Identifier 09Variable length

Alphanumeric. Character set = ISO/IEC 646 IRV

Optional (7) Acquisitions ProcessingNot

recommended

Order Number 10Variable length

Alphanumeric. Character set = ISO/IEC 646 IRV

Optional (8) Acquisitions ProcessingNot

recommended

ILL Borrowing Institution

11Variable length field

Max: 16 bytesOptional (9)

Support ILL – Use ISIL code (ISO 15511)

No

ILL Borrowing Transaction ID

12Variable length

Alphanumeric. Character set = ISO/IEC 646 IRV

Optional (10) ILL Transaction tracking

No

GS1-13 (including ISBN)

13Fixed length numeric field

– 13 digitsOptional

(11)Identification

Optional

Alternative unique item identifier – Reserved

14  

Optional – Should not

be used until defined by ISO 28560

IdentificationNot

recommended

Data ObjectRelative

OIDFormatting

Category

Main Purpose orCodes Used

LockedIf Used?

Page 13: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

US Profile for ISO 28560 -- 3 of 3

`Data ObjectRelative

OIDFormatting Category

Main Purpose orCodes Used

LockedIf Used?

Local Data – A 15Variable length Alphanumeric. Character set = ISO/IEC 646

IRV, or UTF-8Optional (13)

For Local or Regional Use Optional

Local Data – B 16Variable length Alphanumeric. Character set = ISO/IEC 646

IRV, or UTF-8Optional (14)

For Local or Regional Use Optional

Title 17Variable length Alphanumeric. Character set = ISO/IEC 646

IRV, or UTF-8Optional (15) Identification Optional

Product Identifier (local) 18

Variable length Alphanumeric. Character set = ISO/IEC 646

IRVOptional (16) Identification Optional

Media Format (other)

19 Single Octet (coded list) Optional (17)Item Properties

(no code list defined)

Optional

Supply Chain Stage 20

Fixed1 Byte

Optional (18)For multi use (coded list) No

Supplier Invoice Number 21

Variable length Alphanumeric. Character set = ISO/IEC 646

IRVExcluded (19) Acquisitions N/A

Alternative Item Identifier 22

Variable length Alphanumeric. Character set = ISO/IEC 646

IRVOptional (20)

Item Identification Optional

Alterative Owner Library Identifier 23

Variable length Alphanumeric. Character set = ISO/IEC 646

IRVOptional (21)

Item Identification –

for codes not ISIL compliant

Optional

Subsidiary of an Owner Library 24

Variable length Alphanumeric. Character set = ISO/IEC 646

IRVOptional (22)

Item Identification Optional

Alternative ILL Borrowing Institution

25Variable length Alphanumeric. Character set = ISO/IEC 646

IRVOptional (23) Support ILL – For

non-ISIL codeNo

Local Data – C 26Variable length Alphanumeric. Character set = ISO/IEC 646

IRV, or UTF-8Optional (24)

For Local or Regional Use Optional

Page 14: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

Interoperability

Interoperability (from Whatis.com)

Interoperability (pronounced IHN-tuhr-AHP-uhr-uh-BIHL-ih-tee) is the ability of a system or a product to work with other systems or products without special effort on the part of the customer. Interoperability becomes a quality of increasing importance for information technology products as the concept that "The network is the computer" becomes a reality. For this reason, the term is widely used in product marketing descriptions.

Page 15: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

Four Levels of Interoperability

Level 1: Within the Library

Level 2: Within the community

Level 3: For ILL purposes

Level 4: Within the Supply Chain

Page 16: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

Other Considerations :Data encoding

Using ISO 28560-2 requires that data be encoded using ISO 15962.

Appendix D of the report shows exactly how the data should be encoded providing numerous examples.

This is not a simple process – however, there is good news. The encoding scheme optimizes the storage of data on the tag – so you get greater efficiency. It has to be done once (correctly) by your software or hardware supplier and then you can essentially forget about it.

See next slide as an example of some of the complexity.

Page 17: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

Data Encoding: Compaction Schemes

ISO/IEC 15962 compaction schemes

Code Name Description000 Application-defined As presented by the application001 Integer Integer010 Numeric Numeric string (from "0" to "9")011 5 bit code Uppercase alphabetic100 6 bit code Uppercase, numeric, etc101 7 bit code US ASCII110 Octet string Unaltered 8-bit (default = ISO/IEC 8859-1)111 UTF-8 string External compaction to ISO/IEC 10646

Note 1: There are 8 different compaction schemes and all may be used on the same tag.

Note 2: RFID users will not have to worry about this. It will be a part of the software provided by your RFID Software Supplier

Note3: See Appendix D of the NISO document for details on usage and implementation.

Page 18: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

Other Considerations

1.How soon will the standard be implemented?

2.What is minimum implementation requirement for me to be complaint?

3.What does the library have to do migrate to the new environment?

4.How do I know that the tag I am getting is an ISO 18000-3 Mode 1 tag?

5.How can I confirm/verify that my supplier is following the standard and has implemented it correctly?

6.Do we need a US certification process for compliant RFID systems/ suppliers?

Page 19: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

Report Outline & Todays Presentations

ForwardSection 1 – Use of RFID Section 2 – Data Model & US Profile Vinod ChachraSection 3 – Security Matthew BellamySection 4 – Migration to ISO Tags Section 5 – Supply Chain Section 6 – Privacy Daniel WaltersSection 7 – Vandalism Daniel Walters

Appendix A: RFID Technology Basics Appendix B: Interoperability CharacteristicsAppendix C: UHF RFID in LibrariesAppendix D: Encoding Data on the RFID Tag

Thanks to all the individuals who have generously shared their time and expertise for this project.

Page 20: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Visionary Technology in Library Solutions

Closing Comments

Exciting times ahead!

Thanks to all the individuals named below who have generously shared their time and expertise for this project.

Livia Bitner Corrie MarshVinod Chachra, co-chair Paul Sevcik, co-chairAlan Gray Paul SimonMargaret hazel Robert WalshGretchen Herman Dan WaltersNancy Kress Karen Wetzel 

Page 21: NISO Webinar: RFID Systems in Libraries Part 2: Standards

21

NISO RFID in Libraries

© 3M 2010. All Rights Reserved.

Solutions TechnologiesNISO RFID Systems in Libraries – RFID Security

Library Systems

+

Page 22: NISO Webinar: RFID Systems in Libraries Part 2: Standards

22

NISO RFID in Libraries

Hello

© 3M 2010. All Rights Reserved.

Matthew Bellamy3M Library Systems

3M employee since 2001 Current responsibilities

Lead new product development teams Support 3M’s global library business

3M Library Systems for nearly 10 years and has worked with hundreds libraries to help them improve SelfCheck™ System usage and leverage technology to provide enhanced customer service.

Page 23: NISO Webinar: RFID Systems in Libraries Part 2: Standards

23

NISO RFID in Libraries

Today’s Objectives

© 3M 2010. All Rights Reserved.

Aspects of RFID security Methods of security Variables that Impact RFID Security Threats to RFID Security What the standards say about security Interlibrary loan and how it relates to

security

Page 24: NISO Webinar: RFID Systems in Libraries Part 2: Standards

24

NISO RFID in Libraries

Aspects of Security

ROI What is the loss or potential loss Does it justify the expense Does it come as an extra with other uses (RFID for materials handling)

Psychological Fake detection systems Guilt

Enhanced Security Behind the counter Items checked at the door EM with RFID

Page 25: NISO Webinar: RFID Systems in Libraries Part 2: Standards

25

NISO RFID in Libraries

Aspects of Security – Disc Media

Demand and popularity drive theft CDs/DVDs are popular and attract thieves

They also tend to be more difficult to protect except by using physical behind the counter or dispensing solutions

Metal in the media interferes with RFID

Cost of materials may justify different security solution levels Dispensing systems Locked cases Behind the counter

Page 26: NISO Webinar: RFID Systems in Libraries Part 2: Standards

26

NISO RFID in Libraries

The Methods for RFID Security

AFI – Application Family Identifier Part of the ISO 18000-3 Mode 1 Standard Original use was not intended for security Each industry and application allocated unique

value ISO Recommended Values

• 07hex = secure, C2hex. = unsecure

EAS – Electronic Article Surveillance Proprietary solution from NXP Single bit – 1 = secure, 0 = unsecure

Virtual Security – Database of security values Security status is maintained in an online

database Typically keyed using the Unique ID on the tag Typically cannot be tampered with because the

Unique ID cannot be changed

Page 27: NISO Webinar: RFID Systems in Libraries Part 2: Standards

27

NISO RFID in Libraries

Detection system Antenna and reader design Proximity and number of pedestals

RFID Tag Antenna / chip design not necessarily total tag size Composition of tagged material

Environmental variables Presence of other RFID equipment Proximity of Detection System to metal

Patron characteristics Carrying position- location and orientation (low/high, backpacks) Other things in their possession (laptops, etc.) Number of items with tags- single versus multiple

What variables impact RFID Detection System Performance?

Page 28: NISO Webinar: RFID Systems in Libraries Part 2: Standards

28

NISO RFID in Libraries

Identification During Detection

Provide the item ID of the object as it moves through the corridor May be limited by:

Multiple item interference Throughput if many items are present Detection system reader and antenna design

Tag impact: Tag performance and design Tag placement

User Impact Carrying position Speed of travel

Page 29: NISO Webinar: RFID Systems in Libraries Part 2: Standards

29

NISO RFID in Libraries

Threats to RFID security

Vandalism Tags ripped out of or off of materials

Shielding Tags Booster Bags Covering in foil

Electronic alteration Rewriting of data on the tag

Other Kids fascination with taking things apart or picking at labels

Page 30: NISO Webinar: RFID Systems in Libraries Part 2: Standards

30

NISO RFID in Libraries

What do the standards say about security?

The standards do not mandate a particular method of security If AFI is used for security,

Checked - out value is C2hex.

Checked - in value is 07hex.

AFI must always be programmed to C2hex when the item is not physically inside the library regardless of security method

Recommendation is to avoid locking the AFI, so it can be used later for security. This future need could arise in your library or at an ILL borrowing library.

Informatively, the standards documentation notes that EAS implementations are typically proprietary and may inhibit a library’s ability to change chip providers in the future, should there be a desire to change.

Page 31: NISO Webinar: RFID Systems in Libraries Part 2: Standards

31

NISO RFID in Libraries

Inter-library loan and how it affects security

Host library is responsible for supporting security method When checked in, the host library would set the appropriate security method AFI or EAS

Lending library is responsible for re-securing the item when it returns.

© 3M 2010. All Rights Reserved.

Page 32: NISO Webinar: RFID Systems in Libraries Part 2: Standards

32

NISO RFID in Libraries

Thank you

If you have any questions please don’t hesitate to contact me

Matthew BellamyGlobal RFID Product Marketing Manager3M Track & Trace Solutions - Library Systems3M Center, Building 225-04-N-14 | St. Paul, MN 55144Office: 651-733-5373 | Mobile: 612-414-1809 | Fax: [email protected] | www.3m.com/us/library

© 3M 2010. All Rights Reserved.

Page 33: NISO Webinar: RFID Systems in Libraries Part 2: Standards

NISO Recommended Practice Sections 6 & 7: Privacy and 

Vandalism

Dan Walters, Retired

Page 34: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Patron Privacy & RFID

• Privacy & RFID discussion context– Institutional and patron orientations regarding

privacy issues– Professional and trade association orientations

regarding privacy• ALA & BISG began work in 2003 on RFID privacy

– Vendor and technology issues and constraints• RFID privacy strategies share approaches of ILS and

other legacy systems to protect PII

Page 35: NISO Webinar: RFID Systems in Libraries Part 2: Standards

ALA, BISG & RFID• Privacy and Confidentiality – ALA document

– http://www.ala.org/ala/aboutala/offices/oif/ifissues/privacyconfidentiality.cfm

• Questions and Answers on Privacy and Confidentiality– http://www.ala.org/ala/issuesadvocacy/intfreedom/librarybill/interpretations/qa-privacy.cfm

• Book Industry Study Group RFID Policy Statement, September 2004– http://www.bisg.org/docs/BISG_Policy_002.pdf

• Resolution on Radio Frequency Identification (RFID) Technology and Privacy Principles – ALA Council, January 2005

– http://www.ala.org/template.cfm?section=ifresolutions&template=/contentmanagement/contentdisplay.cfm&contentid=85331

• RFID in Libraries: Privacy and Confidentiality Guidelines –ALA Intellectual Freedom Committee, June 2006

– http://www.ala.org/template.cfm?section=otherpolicies&template=/contentmanagement/contentdisplay.cfm&contentid=130851

Page 36: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Resolution on Radio Frequency Identification (RFID) Technology and Privacy Principles

• Acknowledges longstanding privacy and confidentiality• Five main policy tenets

– Implement & enforce privacy policy that discloses all uses and changes of new RFID system

– No Personally Identifiable Information (PII) but transactional data is permitted

– Protect data by reasonable security safeguards against interpretation by any unauthorized third party

– Comply with applicable law and follow best practices– Ensure that above four principles are verifiable by audit

Page 37: NISO Webinar: RFID Systems in Libraries Part 2: Standards

RFID in Libraries: Privacy and Confidentiality Guidelines

• Policy Guidelines– Use RFID selection and procurement process to

educate users and staff– Consider using two systems for circulation – RFID

or no RFID– Update privacy policies /procedures in accordance

with critical ALA policies– Assure appropriate configurations of RFID system– Notify public about Library’s use of RFID

Page 38: NISO Webinar: RFID Systems in Libraries Part 2: Standards

RFID in Libraries: Privacy and Confidentiality Guidelines

• Best Practices– Continue practices securing bibliographic and patron

databases from unauthorized use– Limit the bibliographic information stored on a tag

to a unique identifier; store no PII – Block public from searching by unique RFID

identifier• Talking To Vendors about RFID

– Provides guidelines to determine vendors approach to privacy

Page 39: NISO Webinar: RFID Systems in Libraries Part 2: Standards

Vandalism

• Acknowledge limits to preventing vandalism and theft in public lending institution

• Technical modification of data using RFID readers– Security data– Tag contents– RFID Viruses– Detuning a tag

• Physical defacing or removal of tag– Children play with stickers!