vinod chachra, phd chairman, niso working group on rfid in libraries ceo, vtls inc. a progress...

52
Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. CEO, VTLS Inc. A Progress Report on NISO’s A Progress Report on NISO’s Working Group on RFID Working Group on RFID ALA Washington DC, June 23, 2007 ALA Washington DC, June 23, 2007

Upload: shanon-davidson

Post on 29-Dec-2015

219 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Vinod Chachra, PhDChairman, NISO Working Group on RFID in Libraries

CEO, VTLS Inc.CEO, VTLS Inc.

A Progress Report on NISO’sA Progress Report on NISO’s

Working Group on RFIDWorking Group on RFIDALA Washington DC, June 23, 2007ALA Washington DC, June 23, 2007

Page 2: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

NISO RFID Working Group

Following types of organizations are participating in the working group:

1. RFID hardware manufacturers

2. RFID solution providers (software and integration)

3. RFID Library users

4. Book jobbers/ book processors

5. Other related organizations

Page 3: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Working Group MembersLivia Bitner, Baker & Taylor

Vinod Chachra, VTLS – Committee Chairman

Brian Green, EDItEUR

Jim Litchenberg, BISG

Alastair McArthur, Tagsys

Allan McWilliams, Baltimore County Public Library

Louise Schaper, Fayetteville Public Library

Paul Sevcik, 3M

Paul Simon, Checkpoint

Rick Weingarten, ALA

Marty Withrow, OCLC

Page 4: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Scope of NISO RFID Working Group

• RFID solutions run at several frequencies –

Low – from 125KHz to 134KHz

High – 13.56MHz

Ultra High – 860-960 MHz

Micro Wave – 2.45 GHz

• NISO’s work is limited to Tags used in libraries

Note: At present, these tags operate at 13.56 MHz, though this may change in the future

Page 5: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Goals of NISO RFID Working Group

To review existing RFID standards… and promote its use where appropriate;

To examine and assess privacy concerns;

To investigate the way RFID is used in the United States and identify best practices in standards development and implementation;

To focus on security and data models for RFID tags, along with issues of interoperability and privacy;

To create a “best practices” document for libraries … and help safeguard library investments in RFID and minimize the cost of obsolescence.

Page 6: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Functions ExaminedSupply Chain Tracking

Item Level Tagging

Carton Level Tagging

Application of tags by book jobbers

Application of tags by libraries

Self Checkout Stations

Book drops

Sortation systems

Inventory systems

Media tagging

ILL functions

Page 7: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Functions ExaminedSupply Chain Tracking

Item Level Tagging

Carton Level Tagging

Application of tags by book jobbers

Application of tags by libraries

Self Checkout Stations

Book drops

Sortation systems

Inventory systems

Media tagging

ILL functions

Page 8: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

The Book

The Publisher

The Jobber

The Library

Library Applied RFID Tags

Library applies proprietary tag and programs RFID tag with proprietary conversion station for use in library applications

Barcode contains with item identifier for use at different levels of supply change

Barcode used to track books in warehouse

Barcode used to track books in warehouse

Publisher uses carton level barcode and ASN transaction to provide shipment information to wholesaler

Jobber uses carton level barcode and ASN transaction to receive books from the publishers. Provide ASN transactions to libraries

With the use of an ILS developed module, the Library uses carton level barcode and ASN transaction to receive books from the wholesalers

Jobber Situation – No Interoperability

Page 9: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

The Jobber

RFID tag

Hardware

Software Software

Hardware

RFID tag

Software

Hardware

RFID tag

Vendor A Vendor B Vendor C

Jobber maintains conversion stations for each RFID vendor to program RFID tag

Library uses RFID Vendor A

Library usesRFID Vendor B

Library uses RFID Vendor C

Jobber applied RFID Tags

Page 10: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

The Book

ThePublisher

TheJobber

Library usesRFID Vendor A

Library usesRFID Vendor B

Library usesRFID Vendor C

Library usesRFID Vendor D

Jobber programs RFID tags in a batch process and applies to each library’s books independent of Library’s RFID Vendor

Jobber Supplied RFID tags

Programs the embedded RFID tag with item identifier

Uses the item identifier in the embedded RFID tag for tracking book in warehouse

Publisher uses carton level RFID tag and ASN transaction to provide shipment information to jobber

Jobber uses carton level RFID tag and ASN transaction to receive books from the publishers. Provide ASN transactions to libraries

Embedded RFID tag enables use at different levels of the supply chain

Page 11: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Functions ExaminedSupply Chain Tracking

Item Level Tagging

Carton Level Tagging

Application of tags by book jobbers

Application of tags by libraries

Self Checkout Stations

Book drops

Sortation systems

Inventory systems

Media tagging

ILL functions

Page 12: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Privacy ConcernsProper caution and concern raised by some Proper caution and concern raised by some privacy advocates … including EFF (Electronic privacy advocates … including EFF (Electronic Frontier Foundation)Frontier Foundation)

Exaggerated concerns raised by others.Exaggerated concerns raised by others.

Issue is very sensitive for it can Issue is very sensitive for it can potentially cause privacy problems and/orpotentially cause privacy problems and/or

possibly derail or slow down RFID implementations and/or possibly derail or slow down RFID implementations and/or

add to the implementation costsadd to the implementation costs

Organizations like BISG, EFF and American Organizations like BISG, EFF and American Library Association are providing leadership in Library Association are providing leadership in this area.this area.

Page 13: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Privacy ConcernsEFF (Electronic Frontier Foundation) says:EFF (Electronic Frontier Foundation) says:

While RFIDs are a convenient way to track items, While RFIDs are a convenient way to track items, they are also a convenient way to do something far they are also a convenient way to do something far less benign: track people and their activities through less benign: track people and their activities through their belongings. EFF is working to prevent the their belongings. EFF is working to prevent the embrace of this technology from eroding privacy and embrace of this technology from eroding privacy and freedom. freedom.

EFF also highlights reports of the ‘hackability’ of EFF also highlights reports of the ‘hackability’ of RFID chips which appears to have inspired their RFID chips which appears to have inspired their epithet: epithet: ‘privacy-leaking’‘privacy-leaking’. . Among EFF’s priorities is Among EFF’s priorities is to keep these ‘privacy-leaking’ chips out …to keep these ‘privacy-leaking’ chips out …

Page 14: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Privacy ConcernsSimilar concerns were also reflected in a piece in Similar concerns were also reflected in a piece in Wired magazine (May 2006) entitled “The RFID Wired magazine (May 2006) entitled “The RFID Hacking Underground” which included a variety of Hacking Underground” which included a variety of comments and opinions. comments and opinions.

David Molnar ... a computer science graduate David Molnar ... a computer science graduate student who studies commercial uses for RFIDs at student who studies commercial uses for RFIDs at UC Berkeley.... discovered he could destroy the data UC Berkeley.... discovered he could destroy the data on the books' passive-emitting RFID tags by on the books' passive-emitting RFID tags by wandering the aisles with an off-the-shelf RFID wandering the aisles with an off-the-shelf RFID reader-writer and his laptop. reader-writer and his laptop.

Page 15: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Privacy ConcernsCenter for Democracy and Technology (CDT Group). Center for Democracy and Technology (CDT Group). Among the recommendations –Among the recommendations –

• • notify customers in all cases when RFID technology is notify customers in all cases when RFID technology is being used;being used;

• • inform customers whether they can deactivate the tags, inform customers whether they can deactivate the tags, andand

• • build security into the technology as an essential build security into the technology as an essential design element.design element.

http://www.cdt.org/privacy/20060501rfid-best-practices.php

Page 16: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Privacy – Technology Perspective

• • RFID tags are powerless; without power they are inert RFID tags are powerless; without power they are inert and inactiveand inactive

When a tag reader comes close it charges the tagWhen a tag reader comes close it charges the tag

The tag then transmits the data to the readerThe tag then transmits the data to the reader

• • RFID tags used in libraries have a short read rangeRFID tags used in libraries have a short read range

Range is 8 to 18 inchesRange is 8 to 18 inches

This small read range is important to the This small read range is important to the application as we do not wish to “influence” the application as we do not wish to “influence” the tags tags on the book shelves while dealing with the on the book shelves while dealing with the tags on tags on checkout or checkin stationscheckout or checkin stations

Page 17: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Book Industry Study Group (BISG)

RFID Privacy Principles RFID Privacy Principles

(This is a direct quote from the BISG web site)(This is a direct quote from the BISG web site)

All businesses, organizations, libraries, educational All businesses, organizations, libraries, educational institutions and non-profits that buy, sell, loan, or otherwise institutions and non-profits that buy, sell, loan, or otherwise make available books and other content to the public make available books and other content to the public utilizing RFID technologies shall:utilizing RFID technologies shall:

1) Implement and enforce an up-to-date organizational 1) Implement and enforce an up-to-date organizational privacy policy that gives notice and privacy policy that gives notice and full disclosure as to full disclosure as to the use, terms of use, and any change in the terms the use, terms of use, and any change in the terms of useof use for data collected via new technologies and for data collected via new technologies and processes, including RFID.processes, including RFID.

2) Ensure that 2) Ensure that no personal information is recorded on no personal information is recorded on RFID tagsRFID tags which, however, may contain a variety of which, however, may contain a variety of transactional data.transactional data.

  

Page 18: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Book Industry Study Group (BISG)

3) 3) Protect data by reasonable security safeguardsProtect data by reasonable security safeguards against interpretation by any unauthorized third party.against interpretation by any unauthorized third party.

4) 4) Comply with relevant federal, state , and local Comply with relevant federal, state , and local lawslaws as well as industry best practices and policies. as well as industry best practices and policies.

5) Ensure that the four principles outlined above must be 5) Ensure that the four principles outlined above must be verifiable by an independent audit.verifiable by an independent audit.

This policy has been developed and released by the Book This policy has been developed and released by the Book Industry Study Group in cooperation with the American Industry Study Group in cooperation with the American Library Association, Office of Information Technology and Library Association, Office of Information Technology and the Office for Intellectual Freedom, as well as the National the Office for Intellectual Freedom, as well as the National Information Standards OrganizationInformation Standards Organization

Page 19: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Vandalism

RFID Systems in libraries are vulnerable to electronic RFID Systems in libraries are vulnerable to electronic vandalism. vandalism.

• Modification of security information to steal an itemModification of security information to steal an item

• Permanent locking of security bits or AFIsPermanent locking of security bits or AFIs

• Modification of tag contents as vandalismModification of tag contents as vandalism

• Modification of tag contents to steal an itemModification of tag contents to steal an item

• Permanent locking of other fields after modificationPermanent locking of other fields after modification

• RFID VirusesRFID Viruses

• Physical defacing or removal of the tagPhysical defacing or removal of the tag

Page 20: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Responses to Vandalism

There are several sources of potential help with the There are several sources of potential help with the various attacks available to vandals. various attacks available to vandals.

• Criminal penalties against the perpetrators of Criminal penalties against the perpetrators of vandalism, if they can be identified and prosecuted. vandalism, if they can be identified and prosecuted.

•    Password protection schemes on data which must Password protection schemes on data which must remain changeable during the life of the itemremain changeable during the life of the item

• Simple locking on static dataSimple locking on static data

Page 21: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Perspective on Vandalism

Responses to vandalism are likely to Responses to vandalism are likely to hinder interoperabilityhinder interoperability, and , and place the library only a few steps ahead of increasingly place the library only a few steps ahead of increasingly sophisticated vandals. sophisticated vandals. 

Libraries must ultimately choose whether the impediments Libraries must ultimately choose whether the impediments presented to vandals presented to vandals outweigh the detrimental impactsoutweigh the detrimental impacts of the of the protectionsprotections

Different libraries are likely to find the Different libraries are likely to find the balance pointbalance point in different in different positions on this issue, and there is really no right or wrong choice positions on this issue, and there is really no right or wrong choice that every library will adopt. that every library will adopt.

For many libraries, For many libraries, the least expensive solution may be to the least expensive solution may be to accept the basic risks associated with RFIDaccept the basic risks associated with RFID as an incremental as an incremental difference over the exposure they encounter just by maintaining difference over the exposure they encounter just by maintaining their collections with open doors.their collections with open doors.

Page 22: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Interoperability

Interoperability (from Whatis.com)

Interoperability (pronounced IHN-tuhr-AHP-uhr-uh-BIHL-ih-tee) is the ability of a system or a product to work with other systems or products without special effort on the part of the customer. Interoperability becomes a quality of increasing importance for information technology products as the concept that "The network is the computer" becomes a reality. For this reason, the term is widely used in product marketing descriptions.

Page 23: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Interoperability Level 1

Level 1: Within the Library

Tags: The fear that the tags purchased may not be useful or available in the future requiring expensive and time consuming retagging operations.

Suggested solutions

• Standardization of tags.

• Standardization of the data on the tag

• Tags purchased from other manufacturers should interoperate with the existing standardized tags

• Existing hardware and software be used with the new tags without any (or major) re-engineering?

Page 24: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Interoperability Level 1

Level 1: Within the Library

Hardware interoperability: If the library purchases additional hardware like new gates or new self check units from a manufacturer different from the original supplier, then can this new hardware interoperate with existing tags and existing hardware?

Software interoperability : Can the library swap out software with different or better functionality without changing the tags or hardware?

 This level of interoperability will allow libraries to purchase the best systems to match their needs, choosing components from different suppliers when this makes the best sense.

Expanded options for replacement equipment will become available if compatibility with an existing installed base of tags can be accomplished through standardization.

Page 25: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Interoperability Level 2

Level 2: Within the community

It is very desirable that library tags do not set off alarms in book stores and grocery stores.

The reverse is true too. Librarians would not like grocery store items to set off alarms in the libraries.

Solution:

The AFI (Application Family Identifier -- discussed in the security section) is a perfect mechanism to control this aspect of operations.

The committee strongly recommends that only tags based on AFI technology be used in libraries.

Page 26: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Interoperability Level 3

Level 3: ILL purposes

A tag from library A should be able to service the circulation needs of library B.

Solution:

Use of standards based tags

Use of standard data model (discussed later) for the tags

Page 27: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Interoperability Level 4

Level 2: Supply Chain

Place tags on books as high in the supply chain as possible and use these tags for internal operations

Manufacturer

Distributor

Book jobber

Library

Book jobbers would like to standardize on the methodologies for programming customer tags and hopefully use one set of hardware and one set of procedures to do this task for all libraries they service.  

The AFI codes for the tags will have to be programmable in the supply chain and the data on the tag would have to have different content at different stages of the supply chain.

Page 28: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

RFID Security and Interoperability

Three security methods used todayThree security methods used today

AFI (Application Family Identifier) based AFI (Application Family Identifier) based securitysecurity

EAS (Electronic Article Surveillance) bitEAS (Electronic Article Surveillance) bit

Database lookupDatabase lookup

NISO RFID Committee recommendation?NISO RFID Committee recommendation?

Allow all three methods to be usedAllow all three methods to be used

Insist on Interoperability Requirements (AFI Insist on Interoperability Requirements (AFI etc.)etc.)

Leave security as a place of differentiation Leave security as a place of differentiation among vendorsamong vendors

Page 29: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

AFI (Application Family Identifier)?

AFI AFI is a hardware feature designed into the silicon chip on is a hardware feature designed into the silicon chip on ISO 18000 RFID tags. The purpose of AFI is to prevent ISO 18000 RFID tags. The purpose of AFI is to prevent tags from different industry applications from interfering tags from different industry applications from interfering with each other in the open environment. AFI is a special with each other in the open environment. AFI is a special purpose register in a dedicated portion of the memory of purpose register in a dedicated portion of the memory of an RFID tag. an RFID tag.

Programming of an ISO 15693 compliant tag with a particular Programming of an ISO 15693 compliant tag with a particular AFI code dictates that the tag will respond only when an AFI code dictates that the tag will respond only when an interrogating reader system requests a response from tags interrogating reader system requests a response from tags with that AFI code. with that AFI code.

This facilitates both separation of applications and security This facilitates both separation of applications and security implementations.implementations.

Page 30: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Security – AFI and Interoperability

Requirements for interoperabilityRequirements for interoperability

Standard AFI Code for library applications Standard AFI Code for library applications for books checked out for books checked out

Keep the AFI code unlockedKeep the AFI code unlocked

Standard AFI Code for library applications Standard AFI Code for library applications for books checked in (checked in books can for books checked in (checked in books can use a local – but standard – AFI code)use a local – but standard – AFI code)

Required whether AFI is used for security or Required whether AFI is used for security or not. not.

Systems which use AFI for security should use both of the assigned codes Systems which use AFI for security should use both of the assigned codes

Systems which use EAS or database lookup for security should use the Library Systems which use EAS or database lookup for security should use the Library

Industry code to avoid interference with other applications of RFIDIndustry code to avoid interference with other applications of RFID..

Page 31: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Joint Application for AFI Code

EDItEUR, NISO and Danish National Library EDItEUR, NISO and Danish National Library filed a joint application to JTC1/SC31 WG4 filed a joint application to JTC1/SC31 WG4 for the assignment and registration for a for the assignment and registration for a library specific AFI code to be used for library specific AFI code to be used for books that are checked out. books that are checked out.

The code has been assigned!!The code has been assigned!!

Page 32: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

ISO 18000 Standards

18000-1 Part 1 – Generic Parameters for the Air Interface for Globally Accepted Frequencies

18000-2 Part 2 – Parameters for Air Interface Communications below 135 kHz

18000-3 Part 3 – Parameters for Air Interface Communications at 13.56 MHz

18000-4 Part 4 – Parameters for Air Interface Communications at 2.45 GHz

18000-5 Part 5 – Parameters for Air Interface Communications at 5.8 GHz (Withdrawn)

18000-6 Part 6 – Parameters for Air Interface Communications at 860 to 930 MHz

18000-7 Part 7 – Parameters for Air Interface Communications at 433 MHz

Page 33: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Scope of ISO 18000-3

““The scope of the ISO 18000-3 standard is to provide The scope of the ISO 18000-3 standard is to provide Physical Layer, Collision management System and Physical Layer, Collision management System and Protocol Values for RFID Systems for Item Protocol Values for RFID Systems for Item Identification operating at 13.56 MHz in accordance Identification operating at 13.56 MHz in accordance with the requirements of ISO 18000-1”with the requirements of ISO 18000-1”

Some library vendors say they are ISO 18000 or ISO Some library vendors say they are ISO 18000 or ISO 18000-1 compliant instead of the more specific ISO 18000-1 compliant instead of the more specific ISO 18000-3 compliant, but they mean the same thing.18000-3 compliant, but they mean the same thing.

NISO Committee: Endorses this standardNISO Committee: Endorses this standard

Page 34: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

ISO 15693

The ISO 15693 specification has three main The ISO 15693 specification has three main parts:parts:

Physical characteristicsPhysical characteristics

Signal Interface and Signal Interface and

Transmission ProtocolTransmission Protocol

It holds the promise of interoperability It holds the promise of interoperability

ISO 15693 is not to be confused with ISO 15963 ISO 15693 is not to be confused with ISO 15963 which is used for which is used for RFID for Item Management - RFID for Item Management - Unique Identification of RF TagUnique Identification of RF Tag (also read 15961 & (also read 15961 & 15962)15962)

NISO Committee: Endorses this standardNISO Committee: Endorses this standard

Page 35: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

NISO Data Model for RFID Tags

There was considerable debate on how much data There was considerable debate on how much data should be placed or even permitted on the tag. should be placed or even permitted on the tag. Two opposing views:Two opposing views:

The minimalist approach … only a primary ID The minimalist approach … only a primary ID

The other extreme … as much on the tag as space The other extreme … as much on the tag as space and cost considerations would allow so that the and cost considerations would allow so that the system could function with minimum interaction system could function with minimum interaction with the ILS. with the ILS.

The NISO committee ... flexibility while maintaining a The NISO committee ... flexibility while maintaining a fair degree of interoperability.fair degree of interoperability.

Page 36: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

NISO Three Part Strategy

NISO preliminary recommendation – has 3 partsNISO preliminary recommendation – has 3 parts

Part 1: Content of the tag itself – Part 1: Content of the tag itself – Data ModelData Model

Part 2: Part 2: Encoding schemeEncoding scheme using relative OIDs using relative OIDs

Part 3: Part 3: Logging requirementsLogging requirements for multiuse tags for multiuse tags

Page 37: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Part 1: Data Model

Originally three attributes were defined as mandatoryOriginally three attributes were defined as mandatory

(as reported in January 21, 2007 ALA Seattle)(as reported in January 21, 2007 ALA Seattle)

1. Primary ID1. Primary ID

2. Use (of the tag) – stage in life cycle of tag2. Use (of the tag) – stage in life cycle of tagcodes – 16 Manufacturer; 32 Distributor; 48 Jobber; 64 Librarycodes – 16 Manufacturer; 32 Distributor; 48 Jobber; 64 Library

3. Content Map3. Content MapThe content map is a 8 bit field indicating if a specific The content map is a 8 bit field indicating if a specific optional optional groupgroup of attributes of attributes exists on the tag or not exists on the tag or not

Page 38: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Part 1: Latest Data Model

The data model has only two mandatory attributes The data model has only two mandatory attributes

1. Primary ID1. Primary ID

The primary item ID (or Unique Item Identifier) is the identifier The primary item ID (or Unique Item Identifier) is the identifier that is used to uniquely identify an item within a particular library. Most that is used to uniquely identify an item within a particular library. Most typically this is the barcode on the item. typically this is the barcode on the item.

2. Tag Content Key 2. Tag Content Key

A 24 bit binary key indicating which of the (UP TO A 24 bit binary key indicating which of the (UP TO 24) optional attributes are actually present on the tag. If the 24) optional attributes are actually present on the tag. If the key is all zeroes then the Primary ID is the only data on the key is all zeroes then the Primary ID is the only data on the tag. If the key is missing then again the primary ID is the tag. If the key is missing then again the primary ID is the only data on the tag. only data on the tag.

Page 39: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Part 1: Latest Data Model (1 of 3)

Attributes (21 in all)Attributes (21 in all)

1. Primary Item ID (unique item identifier)1. Primary Item ID (unique item identifier)

2. Tag Content Key2. Tag Content Key  

3. Owner Library/Institution3. Owner Library/Institution

4. Owner Postal Code4. Owner Postal Code

5. Set Info (number of parts; ordinal part number)5. Set Info (number of parts; ordinal part number)

6. Media Format6. Media Format

7. Type of Usage -- Circulating? reference?7. Type of Usage -- Circulating? reference?

8. Shelf Location8. Shelf Location

9. Sort Bin Number9. Sort Bin Number

Page 40: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Part 1: Latest Data Model (2 of 3)

Attributes (21 in all)Attributes (21 in all)

10, ILL Borrowing Institution10, ILL Borrowing Institution

11. ILL Return Date11. ILL Return Date

12. Title12. Title

13. Supply Chain Stage13. Supply Chain Stage

14. Local Data14. Local Data

15. ISBN15. ISBN

16. LC Call Number16. LC Call Number

17. Dewey Decimal17. Dewey Decimal

Page 41: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Part 1: Latest Data Model (2 of 3)

Attributes (21 in all)Attributes (21 in all)

18. Supplier Identification Data18. Supplier Identification Data

19. Order Number19. Order Number

20. Invoice Number20. Invoice Number

21. Supplier Item ID (Alternate Item ID) 21. Supplier Item ID (Alternate Item ID)

Page 42: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Part 1: Expected Data Model (1 of 2)

Attributes (19 in all)Attributes (19 in all)

1. Primary Item ID (unique item identifier)1. Primary Item ID (unique item identifier)

2. Tag Content Key2. Tag Content Key  

3. Owner Library/Institution3. Owner Library/Institution

4. Set Info (number of parts; ordinal part number)4. Set Info (number of parts; ordinal part number)

5. Media Format5. Media Format

6. Type of Usage -- Circulating? reference?6. Type of Usage -- Circulating? reference?

7. Shelf Location (Local shelving OR Dewey OR LC Call Number)7. Shelf Location (Local shelving OR Dewey OR LC Call Number)

8. ILL Borrowing Institution8. ILL Borrowing Institution

9. ISBN9. ISBN

10. Title10. Title

Page 43: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Part 1: Expected Data Model (2 of 2)

Attributes (19 in all)Attributes (19 in all)

11. Supply Chain Stage11. Supply Chain Stage

12. Supplier Item ID (Alternate Item ID) 12. Supplier Item ID (Alternate Item ID)

13. Local Data-113. Local Data-1

14. Local Data-214. Local Data-2

15. Owner Postal Code15. Owner Postal Code

16. ILL Return Date16. ILL Return Date

17. Supplier Identification Data17. Supplier Identification Data

18. Order Number18. Order Number

19. Invoice Number19. Invoice Number

It is possible that only the top 14 will surviveIt is possible that only the top 14 will survive

Page 44: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Part 2: Encoding Scheme

The Committee is still working on this section. The Committee is still working on this section.

The encoding scheme will conform with the ISO The encoding scheme will conform with the ISO standards 15961 and 15962standards 15961 and 15962

This level of technical detail will be in the Appendix of This level of technical detail will be in the Appendix of the report.the report.

Page 45: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Part 3: Logging

Logging is Logging is recommended (but not required)recommended (but not required) as a as a system requirement. It promotes interoperability system requirement. It promotes interoperability and some protection against vandalism. and some protection against vandalism.

The library changing the The library changing the supply chain attributesupply chain attribute of the tag of the tag should should maintain a log record of the full before and after image of the maintain a log record of the full before and after image of the content of the tag along with the unique item identifier (UID) of content of the tag along with the unique item identifier (UID) of the tagthe tag. .

UID is the ID placed on the tag by the manufacturer and uniquely UID is the ID placed on the tag by the manufacturer and uniquely

identifies the tag itself. It remains permanently on the tag.identifies the tag itself. It remains permanently on the tag.

The Log record should be maintained throughout the life cycle of The Log record should be maintained throughout the life cycle of the tag. Such a log record will permit the recreation of the data the tag. Such a log record will permit the recreation of the data on the tag if the data were compromised by malfunction or by on the tag if the data were compromised by malfunction or by vandalism. vandalism.

Page 46: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Migrating to Standards Based Systems

Process will be daunting; careful planning can Process will be daunting; careful planning can helphelp

Most important issue is dealing with tagsMost important issue is dealing with tags

Are your tags reprogrammable?Are your tags reprogrammable?

Were they locked after being Were they locked after being programmed?programmed?

Can your systems run in “dual” mode?Can your systems run in “dual” mode?

Handle old and new tags at the same Handle old and new tags at the same time?time?

Can your equipment be upgraded to do Can your equipment be upgraded to do so?so?

Page 47: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Migration Recommendations

Good Citizenship Good Citizenship Be compliant with ISO standardsBe compliant with ISO standardsUSE officially assigned AFI codeUSE officially assigned AFI code

AwarenessAwareness

Standards are public documents Standards are public documents

Interoperability also means greater exposure to Interoperability also means greater exposure to vandalismvandalism

Labor and other costsLabor and other costs

Where? In what priority order? On the fly?Where? In what priority order? On the fly?At CheckinAt CheckinAt Sortation systemAt Sortation systemAt ILL deliveryAt ILL deliveryAt checkoutAt checkout

Page 48: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Migration Recommendations

Role of your vendorRole of your vendor

Monitor standards activityMonitor standards activity

Plan, develop and offer standards based solutionsPlan, develop and offer standards based solutions

Offer migration path with “dual” tag handling Offer migration path with “dual” tag handling capabilitycapability

For circulation stationsFor circulation stations

For self checkoutsFor self checkouts

For sortation systemsFor sortation systems

For security gatesFor security gates

For inventory systemsFor inventory systems

Comply with data content on the tagComply with data content on the tag

Program the AFI tag and leave it unlockedProgram the AFI tag and leave it unlocked

Page 49: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

The International Scene

The Danish Data Model

The Dutch Data Model

The Australian Data Model

Copy of the data models available on the internet

International Standardization Activity

Two Meetings in Copenhagen; Next in UK

National Reps from several European countries (Denmark, Germany, Netherlands, UK, Finland) Australia and USA.

Ongoing discussion of standards and data model

Surprised at our concern over privacy

Page 50: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

The Timetable

Draft #6B is the current draft.

Draft #7 will be sent soon to selected people for comments

Final Report for general distribution expected in August 2007.

Page 51: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

VTLS RFID library management software is now RFID hardware and tag supplier independent.

Visit Booth 3533 in Washington

www.vtls.com

Page 52: Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,

Visionary Technology in Library Solutions

Thanks

• To ALA/NISO for inviting us here

• To libraries and companies that have devoted their time to this NISO activity.

• To all of you for your interest in this important topic.

• Questions?