SlideShare ist ein Scribd-Unternehmen logo
1 von 25
THE SECURITY FOR LIBRARYTHE SECURITY FOR LIBRARY
Presentation OutlinePresentation Outline
To Educate and Inform You
1. About RFID system
2. How does RFID works
3. Why RFID
4. Agenda & Concern
5. Implementation
6. Benefit
7. Conclusion
1. About RFID system
 Brief HistoryBrief History
 What is RFID systemWhat is RFID system
 RFID Architecture & Key ComponentsRFID Architecture & Key Components
 StandardsStandards
 Key Agenda & Concern for LibraryKey Agenda & Concern for Library
Brief HistoryBrief History
RFID (Radio Frequency Identifier) an Auto-ID dataRFID (Radio Frequency Identifier) an Auto-ID data
collection system surveillance, using RF waves forcollection system surveillance, using RF waves for
Identifying, Tracking and doing Management ofIdentifying, Tracking and doing Management of
material flow.material flow.
Basic concept behind RFID is same as “Mirror-Sunlight-
Reflection theory ”
Invented and used from (Early 1940’s)
Commercial Operation begun from 1960’s …
In 1970s developers, inventors, companies, academic
institution and government sectors were actively worked on
RFID
Most common application were tracked person and objects, identified
goods in supply chain, reusable container, high value tools, security,
controlling access to building, networks, payment systems and other
assets.
What is RFID systemWhat is RFID system
RFID is an acronymRFID is an acronym
forfor radio frequencyradio frequency
identificationidentification..
Briefly theBriefly the RFRF
stand for “stand for “radio-radio-
frequencyfrequency” and” and IDID
means “means “identifieridentifier””
that allows an item,that allows an item,
for instance afor instance a
library book, to belibrary book, to be
identified,identified,
accessed, stored,accessed, stored,
reprogrammed andreprogrammed and
communicated bycommunicated by
using radio wavesusing radio waves
A method for controlling inventory
Automatically identify objects
An AUTO-ID based System
Offering Self Check out/in
Saving Time and Money
Gathering statistics on used Items
Minimize Work Stress of Staff
Easily Prevent Theft
Improve Customer Services And
Non-Line-Sight Communication
RFID ArchitectureRFID Architecture
Tags Reader
Gateway
Database
Database
Application
User
Interface
Backend
Fig.1. A General Overview of RFID
Architecture
Scanned
As depicted in figure.1 the whole operation are worked under
three key phases.
 Firstly items-tag are
scanned by reader;
 Secondly in backend
transmitted data coming
through antenna (RF-
wave) are being recognized
by RFID-based system PC.
It acts as a middleware
communication gateway
among items, reader and
system database;
 And at the end it filters
out and store data in
RFID-databases for
checking the data fault and
relevant operation.
Key ComponentsKey Components TAGS
 READER
 SELF CHECK-OUT/IN
 INVENTORY READER
BOOK DROP READER
MIDDLEWARE (PC)
SECURITY GATE
LABEL PRINTER
 SORTER
TAGSTAGSPaper thin 2X2inch
in size.
Read-only or
Read/writable
Storage capacity
of 2KB data that
contain 96bits
serial number.
Tags come in many
flavors: passive, battery
assisted, active, different
frequencies, various anti-
collision technologies,
printed/wire wounded
antenna etc.
READER
 A device that is used to
interrogate an Tag.
 Basic components are
 A scanning Antenna
 A transceiver with a
decoder to interpret data
 helps in personalize &
read data.
SELF CHECK-OUT/IN
 Dual Function(rfid & barcode)
 Store information about item.
 Performance statistics
 Multiple items can be checked
out at a time
 Easier to Use.
INVENTORY READER
 A compact and light weight
hand held device
 Comfortable to use
 High storage capacity
 Multi Functional (such as
shelving, sorting, searching,
weeding and reading)
 Enhanced Security.
BOOK DROP READER
Self Checks-in
books when
patrons drop
them in book-
drop …..
MIDDLE WAREMIDDLE WARE
 Provide reader connectivity to other systems on the
network.
Translate data and transmit to its other application
SECURITY GATE
 Verify that all books
leaving the library have been
checked out.
 Detect Theft and
 Prevent unauthorized
removal of material
Key Agenda & Concern forKey Agenda & Concern for
LibraryLibraryAGENDAAGENDA
 Material securityMaterial security
 Financial LiabilitiesFinancial Liabilities
 Personal Comfort andPersonal Comfort and
SafetySafety
 Privacy andPrivacy and
 Problem patronsProblem patrons
CONCERN
 To Increase productivity
 Improve customer services
 Maintain current staff level
How does RFID works
RFID-READER RFID-TAG
PERSONALIZER (Application Device)
DATA FLOW
RF COUPLING
Time
Energy
Up-to-date
Fig.1. Items personalized model for RFID system
PC
Why RFID
I. Barcode Vs RFID
II. Inventory Management
III. Economic Facts
IV. Customer Satisfaction
Barcode Vs RFID
Inventory Management
 Read/WriteRead/Write
- Ability to add information directly to tags enables each- Ability to add information directly to tags enables each
unique asset to carry its own unique historyunique asset to carry its own unique history
 Non-contact ReadsNon-contact Reads
- Ability to read tags at a distance, under a variety of- Ability to read tags at a distance, under a variety of
environmental conditions, without physicalenvironmental conditions, without physical
manipulation of the assetmanipulation of the asset
 Fast ReadFast Read
- Ability to simultaneously read large numbers (1000-- Ability to simultaneously read large numbers (1000-
1750 tags/sec) of items1750 tags/sec) of items
 AutomationAutomation
- Requires less human intervention- Requires less human intervention
 AuthenticityAuthenticity
- Each RFID chip is unique and can not be replicated- Each RFID chip is unique and can not be replicated
Economic FactsIncrease SecurityIncrease Security
 Security of material is automatic without staff intervention.Security of material is automatic without staff intervention.
 Automatic items check out/ check in and sorting can beAutomatic items check out/ check in and sorting can be
accomplished with LMS circulation software, thereforeaccomplished with LMS circulation software, therefore
eliminating extra processing time of staff and make iteliminating extra processing time of staff and make it
economically viable.economically viable.
Cost AvoidanceCost Avoidance
 Currently Missing Items statisticsCurrently Missing Items statistics
 Replacement costReplacement cost
 Selection, classification, processing, cost of searching,Selection, classification, processing, cost of searching,
notification etc. is improved onenotification etc. is improved one
 Existing Material Management systemExisting Material Management system
 Staff cost (manual way to do house keeping job)Staff cost (manual way to do house keeping job)
 Eliminates the time consuming process of barcodeEliminates the time consuming process of barcode
scanning and reading.scanning and reading.
 High speed InventoryingHigh speed Inventorying
High ReliabilityHigh Reliability
 The RFID readers are highly reliable, almost 100%The RFID readers are highly reliable, almost 100%
detection rate.detection rate.
 Multiple items can be checked out/ checked in at a time.Multiple items can be checked out/ checked in at a time.
 Make library staff free from the risk of repetitive stressMake library staff free from the risk of repetitive stress
injuries.injuries.
LongevityLongevity
 RFID tags last longer than barcodesRFID tags last longer than barcodes
COST FACTORS
Implementation cost
• Cost of RFID tags
• Reader
• Hand held device
• software interface
• Others
On going system Cost
• System maintenance
• Security system cost
• Work station maintenance
• Technical staff
Customer Satisfaction
 Materials control,Materials control,
 Security,Security,
 High speed Inventorying,High speed Inventorying,
 Faster Check-out/-in,Faster Check-out/-in,
 Longevity of Tags,Longevity of Tags,
 Reduce staff stress,Reduce staff stress,
 Prevent Theft,Prevent Theft,
 Searching, notifying andSearching, notifying and
 Gathering statistics on items become easy.Gathering statistics on items become easy.
---------- It Made Sense!!---------- It Made Sense!!
Implementation
Start
Identify
Plan
Implementation
Why you want
RFID?
Begin with
your goals.
Where RFID will deliver value
to your Library and its
Customers.
Ready your organization for
change.
Benefit Better Collection Management
 Shelves rectification and Verification
 Improved Productivity and Services
 Wireless inventory management
 Faster Checked Out/In
 Prevent Theft
 Quick Searching, Weeding & inventory audit
 Cost Avoidance
 Eliminate Manual Labor Cost.
 Improve automation process
 Reduce Repetitive Stress Injury
Conclusion
RFID technology is taking off in libraries at an increasinglyRFID technology is taking off in libraries at an increasingly
rapid pace. Though there are few libraries employing thisrapid pace. Though there are few libraries employing this
technology today, but due to its customizable feature andtechnology today, but due to its customizable feature and
continuing improvement the library communities arecontinuing improvement the library communities are
beginning to get involved in its development. It is easy tobeginning to get involved in its development. It is easy to
envision that, theenvision that, the RFID tags contents will increase in powerRFID tags contents will increase in power,,
prices are expected to declineprices are expected to decline andand tag will dramaticallytag will dramatically
improve its efficiency, security and accuracyimprove its efficiency, security and accuracy. Also major. Also major
concerns need to be addressed for successfully implementingconcerns need to be addressed for successfully implementing
this technology. So that it will change our personal and workthis technology. So that it will change our personal and work
lives in library and adorns the conventional librarylives in library and adorns the conventional library
management with a new idea and usher for a bright future.management with a new idea and usher for a bright future.
RFID IS A SUPPORTING TECHNOLOGY--- NOT A COMPETING !!
3M-LIBRARY SYSTEM
THANKTHANK
“YOU”“YOU”

Weitere ähnliche Inhalte

Was ist angesagt?

Parking solution presentation
Parking solution presentationParking solution presentation
Parking solution presentation
Saqib Raza
 
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The CloudMicrosoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
rsnarayanan
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantation
Alexander Decker
 
07.dsn.rfid reliability
07.dsn.rfid reliability07.dsn.rfid reliability
07.dsn.rfid reliability
nikhiltiware
 
Sql injection to enterprise Owned - K.K. Mookhey
Sql injection to enterprise Owned  - K.K. Mookhey Sql injection to enterprise Owned  - K.K. Mookhey
Sql injection to enterprise Owned - K.K. Mookhey
OWASP-Qatar Chapter
 
Records Management Essentials
Records Management  EssentialsRecords Management  Essentials
Records Management Essentials
donaldwhite27
 

Was ist angesagt? (15)

AssetWorks RFID Quick Guide
AssetWorks RFID Quick GuideAssetWorks RFID Quick Guide
AssetWorks RFID Quick Guide
 
Parking solution presentation
Parking solution presentationParking solution presentation
Parking solution presentation
 
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The CloudMicrosoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
 
Biometrics Technology1
Biometrics Technology1Biometrics Technology1
Biometrics Technology1
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantation
 
Rfid tags
Rfid tagsRfid tags
Rfid tags
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identification
 
E-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print SensorE-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print Sensor
 
Digital Identification Systems, pune, Security Solutions
Digital Identification Systems, pune, Security SolutionsDigital Identification Systems, pune, Security Solutions
Digital Identification Systems, pune, Security Solutions
 
GenRFID-RfidSolutions
GenRFID-RfidSolutionsGenRFID-RfidSolutions
GenRFID-RfidSolutions
 
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication ProtocolIRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication Protocol
 
07.dsn.rfid reliability
07.dsn.rfid reliability07.dsn.rfid reliability
07.dsn.rfid reliability
 
Sql injection to enterprise Owned - K.K. Mookhey
Sql injection to enterprise Owned  - K.K. Mookhey Sql injection to enterprise Owned  - K.K. Mookhey
Sql injection to enterprise Owned - K.K. Mookhey
 
Records Management Essentials
Records Management  EssentialsRecords Management  Essentials
Records Management Essentials
 
Tran Assoc Brochure
Tran Assoc BrochureTran Assoc Brochure
Tran Assoc Brochure
 

Ähnlich wie RFID-SECURITY_Vatsalya

Library management system using rfid
Library management system using rfidLibrary management system using rfid
Library management system using rfid
Naveen Sihag
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
Akash Maurya
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
Liz Sims
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
musicalmood
 

Ähnlich wie RFID-SECURITY_Vatsalya (20)

Rfid for library management system printronix
Rfid for library management system printronixRfid for library management system printronix
Rfid for library management system printronix
 
Library management system using rfid
Library management system using rfidLibrary management system using rfid
Library management system using rfid
 
NISO Webinar: RFID Systems in Libraries Part 1: An Introduction
NISO Webinar: RFID Systems in Libraries Part 1: An IntroductionNISO Webinar: RFID Systems in Libraries Part 1: An Introduction
NISO Webinar: RFID Systems in Libraries Part 1: An Introduction
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturersRFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturers
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
 
SUPPLY CHAIN MANAGEMENT AND RFID IN RETAIL INDUSTRY
SUPPLY CHAIN MANAGEMENT AND RFID IN RETAIL INDUSTRYSUPPLY CHAIN MANAGEMENT AND RFID IN RETAIL INDUSTRY
SUPPLY CHAIN MANAGEMENT AND RFID IN RETAIL INDUSTRY
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
 
RFID and its Applications
RFID and its ApplicationsRFID and its Applications
RFID and its Applications
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 
Technology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. BarcodesTechnology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. Barcodes
 
Space Cycles Rfid Primer
Space Cycles Rfid PrimerSpace Cycles Rfid Primer
Space Cycles Rfid Primer
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Wnl 160 introducing rfid technology by anupam
Wnl 160 introducing rfid technology by anupamWnl 160 introducing rfid technology by anupam
Wnl 160 introducing rfid technology by anupam
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Prathma main seminar
Prathma main seminarPrathma main seminar
Prathma main seminar
 

RFID-SECURITY_Vatsalya

  • 1. THE SECURITY FOR LIBRARYTHE SECURITY FOR LIBRARY
  • 2. Presentation OutlinePresentation Outline To Educate and Inform You 1. About RFID system 2. How does RFID works 3. Why RFID 4. Agenda & Concern 5. Implementation 6. Benefit 7. Conclusion
  • 3. 1. About RFID system  Brief HistoryBrief History  What is RFID systemWhat is RFID system  RFID Architecture & Key ComponentsRFID Architecture & Key Components  StandardsStandards  Key Agenda & Concern for LibraryKey Agenda & Concern for Library
  • 4. Brief HistoryBrief History RFID (Radio Frequency Identifier) an Auto-ID dataRFID (Radio Frequency Identifier) an Auto-ID data collection system surveillance, using RF waves forcollection system surveillance, using RF waves for Identifying, Tracking and doing Management ofIdentifying, Tracking and doing Management of material flow.material flow. Basic concept behind RFID is same as “Mirror-Sunlight- Reflection theory ” Invented and used from (Early 1940’s) Commercial Operation begun from 1960’s … In 1970s developers, inventors, companies, academic institution and government sectors were actively worked on RFID Most common application were tracked person and objects, identified goods in supply chain, reusable container, high value tools, security, controlling access to building, networks, payment systems and other assets.
  • 5. What is RFID systemWhat is RFID system RFID is an acronymRFID is an acronym forfor radio frequencyradio frequency identificationidentification.. Briefly theBriefly the RFRF stand for “stand for “radio-radio- frequencyfrequency” and” and IDID means “means “identifieridentifier”” that allows an item,that allows an item, for instance afor instance a library book, to belibrary book, to be identified,identified, accessed, stored,accessed, stored, reprogrammed andreprogrammed and communicated bycommunicated by using radio wavesusing radio waves A method for controlling inventory Automatically identify objects An AUTO-ID based System Offering Self Check out/in Saving Time and Money Gathering statistics on used Items Minimize Work Stress of Staff Easily Prevent Theft Improve Customer Services And Non-Line-Sight Communication
  • 6. RFID ArchitectureRFID Architecture Tags Reader Gateway Database Database Application User Interface Backend Fig.1. A General Overview of RFID Architecture Scanned As depicted in figure.1 the whole operation are worked under three key phases.  Firstly items-tag are scanned by reader;  Secondly in backend transmitted data coming through antenna (RF- wave) are being recognized by RFID-based system PC. It acts as a middleware communication gateway among items, reader and system database;  And at the end it filters out and store data in RFID-databases for checking the data fault and relevant operation.
  • 7. Key ComponentsKey Components TAGS  READER  SELF CHECK-OUT/IN  INVENTORY READER BOOK DROP READER MIDDLEWARE (PC) SECURITY GATE LABEL PRINTER  SORTER
  • 8. TAGSTAGSPaper thin 2X2inch in size. Read-only or Read/writable Storage capacity of 2KB data that contain 96bits serial number. Tags come in many flavors: passive, battery assisted, active, different frequencies, various anti- collision technologies, printed/wire wounded antenna etc.
  • 9. READER  A device that is used to interrogate an Tag.  Basic components are  A scanning Antenna  A transceiver with a decoder to interpret data  helps in personalize & read data.
  • 10. SELF CHECK-OUT/IN  Dual Function(rfid & barcode)  Store information about item.  Performance statistics  Multiple items can be checked out at a time  Easier to Use.
  • 11. INVENTORY READER  A compact and light weight hand held device  Comfortable to use  High storage capacity  Multi Functional (such as shelving, sorting, searching, weeding and reading)  Enhanced Security.
  • 12. BOOK DROP READER Self Checks-in books when patrons drop them in book- drop …..
  • 13. MIDDLE WAREMIDDLE WARE  Provide reader connectivity to other systems on the network. Translate data and transmit to its other application
  • 14. SECURITY GATE  Verify that all books leaving the library have been checked out.  Detect Theft and  Prevent unauthorized removal of material
  • 15. Key Agenda & Concern forKey Agenda & Concern for LibraryLibraryAGENDAAGENDA  Material securityMaterial security  Financial LiabilitiesFinancial Liabilities  Personal Comfort andPersonal Comfort and SafetySafety  Privacy andPrivacy and  Problem patronsProblem patrons CONCERN  To Increase productivity  Improve customer services  Maintain current staff level
  • 16. How does RFID works RFID-READER RFID-TAG PERSONALIZER (Application Device) DATA FLOW RF COUPLING Time Energy Up-to-date Fig.1. Items personalized model for RFID system PC
  • 17. Why RFID I. Barcode Vs RFID II. Inventory Management III. Economic Facts IV. Customer Satisfaction
  • 19. Inventory Management  Read/WriteRead/Write - Ability to add information directly to tags enables each- Ability to add information directly to tags enables each unique asset to carry its own unique historyunique asset to carry its own unique history  Non-contact ReadsNon-contact Reads - Ability to read tags at a distance, under a variety of- Ability to read tags at a distance, under a variety of environmental conditions, without physicalenvironmental conditions, without physical manipulation of the assetmanipulation of the asset  Fast ReadFast Read - Ability to simultaneously read large numbers (1000-- Ability to simultaneously read large numbers (1000- 1750 tags/sec) of items1750 tags/sec) of items  AutomationAutomation - Requires less human intervention- Requires less human intervention  AuthenticityAuthenticity - Each RFID chip is unique and can not be replicated- Each RFID chip is unique and can not be replicated
  • 20. Economic FactsIncrease SecurityIncrease Security  Security of material is automatic without staff intervention.Security of material is automatic without staff intervention.  Automatic items check out/ check in and sorting can beAutomatic items check out/ check in and sorting can be accomplished with LMS circulation software, thereforeaccomplished with LMS circulation software, therefore eliminating extra processing time of staff and make iteliminating extra processing time of staff and make it economically viable.economically viable. Cost AvoidanceCost Avoidance  Currently Missing Items statisticsCurrently Missing Items statistics  Replacement costReplacement cost  Selection, classification, processing, cost of searching,Selection, classification, processing, cost of searching, notification etc. is improved onenotification etc. is improved one  Existing Material Management systemExisting Material Management system  Staff cost (manual way to do house keeping job)Staff cost (manual way to do house keeping job)  Eliminates the time consuming process of barcodeEliminates the time consuming process of barcode scanning and reading.scanning and reading.  High speed InventoryingHigh speed Inventorying High ReliabilityHigh Reliability  The RFID readers are highly reliable, almost 100%The RFID readers are highly reliable, almost 100% detection rate.detection rate.  Multiple items can be checked out/ checked in at a time.Multiple items can be checked out/ checked in at a time.  Make library staff free from the risk of repetitive stressMake library staff free from the risk of repetitive stress injuries.injuries. LongevityLongevity  RFID tags last longer than barcodesRFID tags last longer than barcodes COST FACTORS Implementation cost • Cost of RFID tags • Reader • Hand held device • software interface • Others On going system Cost • System maintenance • Security system cost • Work station maintenance • Technical staff
  • 21. Customer Satisfaction  Materials control,Materials control,  Security,Security,  High speed Inventorying,High speed Inventorying,  Faster Check-out/-in,Faster Check-out/-in,  Longevity of Tags,Longevity of Tags,  Reduce staff stress,Reduce staff stress,  Prevent Theft,Prevent Theft,  Searching, notifying andSearching, notifying and  Gathering statistics on items become easy.Gathering statistics on items become easy. ---------- It Made Sense!!---------- It Made Sense!!
  • 22. Implementation Start Identify Plan Implementation Why you want RFID? Begin with your goals. Where RFID will deliver value to your Library and its Customers. Ready your organization for change.
  • 23. Benefit Better Collection Management  Shelves rectification and Verification  Improved Productivity and Services  Wireless inventory management  Faster Checked Out/In  Prevent Theft  Quick Searching, Weeding & inventory audit  Cost Avoidance  Eliminate Manual Labor Cost.  Improve automation process  Reduce Repetitive Stress Injury
  • 24. Conclusion RFID technology is taking off in libraries at an increasinglyRFID technology is taking off in libraries at an increasingly rapid pace. Though there are few libraries employing thisrapid pace. Though there are few libraries employing this technology today, but due to its customizable feature andtechnology today, but due to its customizable feature and continuing improvement the library communities arecontinuing improvement the library communities are beginning to get involved in its development. It is easy tobeginning to get involved in its development. It is easy to envision that, theenvision that, the RFID tags contents will increase in powerRFID tags contents will increase in power,, prices are expected to declineprices are expected to decline andand tag will dramaticallytag will dramatically improve its efficiency, security and accuracyimprove its efficiency, security and accuracy. Also major. Also major concerns need to be addressed for successfully implementingconcerns need to be addressed for successfully implementing this technology. So that it will change our personal and workthis technology. So that it will change our personal and work lives in library and adorns the conventional librarylives in library and adorns the conventional library management with a new idea and usher for a bright future.management with a new idea and usher for a bright future. RFID IS A SUPPORTING TECHNOLOGY--- NOT A COMPETING !! 3M-LIBRARY SYSTEM