UHF RFID Articles

Anti-theft principle of RFID library access control

RFID technology has applications in all walks of life, and the most mature application field is the field of Library and archives management. With the help of RFID tags, each book can be given a unique identifier, and the information of each book can be read by using an RFID Reader to manage all the books in the library. Anti-theft can realize smart book management.


The anti-theft modes in the practical application of RFID libraries mainly include the following five types: (1) Magnetic strip anti-theft; (2) RFID-EAS-TTF security bit detection; (3) RFID tag security bit anti-theft; (4) database status Check and detect anti-theft; (5) Access Control UID detects anti-theft.


1. Magnetic stripe anti-theft


Its system design idea is to maintain the original magnetic strip security access control system unchanged, and add RFID tags to realize self-service circulation and rack area management. The advantage of magnetic strip anti-theft lies in concealment and long life. The magnetic stripe security access control has nothing to do with the network and the system, and does not provide any problem collection information when the alarm is issued, and the access control system cannot be used for other detection statistics of RFID.


2. RFID-EAS-TTF security bit detection


The label contains a rewritable EAS security bit. After the collection is borrowed/returned, the EAS security bit is written into the corresponding status information. When the reader passes the anti-theft access control with the book, the collection (label) that has not gone through the borrowing procedure will actively send information Give anti-theft access control, lead to alarm. Its characteristic is that the tag adopts the TTF tag talk first mode. After the tag is powered on, the access control antenna performs tag group detection without dormancy-wakeup of the tag, and completely reads the information Stored in the tag chip by the user. This method is similar to The magnetic stripe detection mechanism is similar, and the manufacturer claims that the detection efficiency can reach 95%. A typical example is the I-CODE-II chip of PHILIPS. Its anti-theft access control has nothing to do with the network and system, and does not provide any collection information when alarming, and the access control system cannot be used for other detection statistics of RFID.


3. RFID tag security bit anti-theft


The label contains a rewritable security bit. After the collection is borrowed/returned, the security bit will be written into the corresponding status information. When the reader passes the access control with the book, the collection (label) will do sleep-wake up to read one by one when it passes the anti-theft door frame Screening, collections (labels) that have not been borrowed will lead to access control alarms. According to theoretical speculation, the detection efficiency of this type of system is a little lower than that of RFID-EAS-TTF mode. Its anti-theft access control has nothing to do with the network and the system, and provides (or does not provide) any problematic collection information when alarming, and the access control system can be used for other detection statistics of RFID readers.


4. Database status check detection anti-theft


That is to say, when the collections borrowed by readers pass through the anti-theft access control, they need to use the database to check the borrowed/unborrowed status one by one. If the borrowing procedures are not handled, the police will be called. This anti-theft method requires the most steps and relies on the network and the database. , so it is a low-efficiency anti-theft method. Its anti-theft access control is related to the network and system, and provides collection information when an alarm is issued, and the access control system can be used for other detection statistics of RFID.


5. Access control UID detection anti-theft


When all collections are borrowed/returned, the front-end RFID system broadcasts the tag UID information to all access control terminal databases (or withdraws them) through the network. The UID is compared with the access control inventory information, and if a certain collection information is found to be missing, the alarm will be called. Its anti-theft access control is related to the network and system, and has strong dependence. It provides collection information when alarming, and the access control system can be used for other detection statistics of RFID.


The above is the relevant content of the anti-theft principle of rfid library anti-theft access control. Magnetic stripe anti-theft is the most traditional anti-theft security technology, and now libraries that apply RFID technology generally use EAS security bit detection to realize book anti-theft.


Scan the qr codeclose
the qr code