Proposal for EM Security Solution

8
Electromagnetic Security Solution for Library Security System Common Features Sensors, which are also referred to as antennas or gates, depending on the technology, are placed at entrances/exits to create a patron security corridor or aisle. The number of sensors that you will need depends upon the width of the entrance/exit and the number of entrances/exits that exist. Sensors must be installed a certain distance away from computer terminals and equipment. This distance will vary depending upon the technology that you choose. You will find placement requirements for each technology within the “Technology Specific” text below. Targets, which are also known as beepers, tags, smart tags, strips or Tattle-Tape , are placed on/in library material enabling detection of "unchecked" library material when passing through the patron security aisle. Targets are available in various formats and are typically hidden or disguised so that patrons are not aware of them. All systems offer accessories such as self check-out stations; accessories vary depending on the technology chosen. You will find this information in the "Technology Specific" text below. Preparation for your security system is vital. If you are constructing a new library, the system layout should be discussed with your architect/ contractor who can then plan for the installation of conduit (tubing that encases the system’s wiring) in the floor. This will allow the security system to be installed directly on top of the finished floor with no need for ramps or strips to encase or hide the wiring. If you are installing a security system in an existing library it is important to understand each of the security system technologies and how they will function within your library.

Transcript of Proposal for EM Security Solution

Page 1: Proposal for EM Security Solution

Electromagnetic Security Solution for Library

Security System Common Features

Sensors, which are also referred to as antennas or gates, depending on the technology, are placed at entrances/exits to create a patron security corridor or aisle. The number of sensors that you will need depends upon the width of the entrance/exit and the number of entrances/exits that exist. Sensors must be installed a certain distance away from computer terminals and equipment. This distance will vary depending upon the technology that you choose. You will find placement requirements for each technology within the “Technology Specific” text below.

Targets, which are also known as beepers, tags, smart tags, strips or Tattle-Tape™, are placed on/in library material enabling detection of "unchecked" library material when passing through the patron security aisle. Targets are available in various formats and are typically hidden or disguised so that patrons are not aware of them. All systems offer accessories such as self check-out stations; accessories vary depending on the technology chosen. You will find this information in the "Technology Specific" text below.

Preparation for your security system is vital. If you are constructing a new library, the system layout should be discussed with your architect/ contractor who can then plan for the installation of conduit (tubing that encases the system’s wiring) in the floor. This will allow the security system to be installed directly on top of the finished floor with no need for ramps or strips to encase or hide the wiring. If you are installing a security system in an existing library it is important to understand each of the security system technologies and how they will function within your library. Each system must be installed a certain distance away from metal doorways, computer terminals and circulation desks. This distance will vary depending on the technology you choose.

Page 2: Proposal for EM Security Solution

Electromagnetic Gate

EM (Electromagnetic) Technology: Electromagnetic security systems operate on a magnetic basis. Sensors partner with the targets. If the targets are not "turned off" by a magnetic device, an alarm is sounded via the sensors as a patron passes through the security aisle. Targets consist of strips of metal with magnetic particles for degaussing (desensitizing and resensitizing). This is accomplished by using high-powered magnets to negate the magnetic property of the strip. A library staff member rubs the area of the strip location with a magnetic device to "turn off" the strip allowing the patron to pass through the patron security aisle created by the sensors without sounding the alarm. When library materials are returned, they are then resensitized or "turned on" by a library staff member. A variety of desktop and handheld devices are available for demagnetizing (desensitizing) and remagnetizing (resensitizing) materials. Security strips are available for books, CDs, DVDs, videocassettes and audiocassettes. The circulation of audiovisual materials requires the purchase of demagnetizers and remagnetizers for these specific forms of media. EM systems use standard 110/120 VAC power. EM sensors must be installed a certain distance away from metal doorways, computer terminals and circulation desks. This distance will vary depending on the number of existing computers.

EM technology is mainly developed for the retail industry, keeping in mind the security aspect of the product only. As the technology used is cheaper in price and can be modified and used in the library, some upgradation where done like Soft tags, deactivator, activator of soft tags.

Page 3: Proposal for EM Security Solution

Components in EM

There are three main components in EM Technology

1. EAS Gate2. Deactivator / Activator of Tags3. Soft tags

Soft Tags

These soft tags are used

EAS Gate

These gates are fitted with visual and audio alarm; when ever anybody is taking out any resources without getting it demagnetizing (desensitizing) and remagnetizing (resensitizing) from the circulation will raise the alarm. In many cases libraries simply opt for the EAS Gate and EM Soft tags without using the demagnetizing (desensitizing) and remagnetizing (resensitizing) devices.

Demagnetizing (desensitizing) and Remagnetizing (resensitizing) Devices

Page 4: Proposal for EM Security Solution

Layout of the Electromagnetic Gate

There will be separate passage for the entry and exit for the library users. The Electromagnetic (EM) gate requires to be installed at a distance from the circulation counter (where a PC is being installed). Another benefit Security Guard and staff at the Circulation staff will have ample time to react if somebody is trying to steal any books, etc from the library.

Wooden Wall Partition

Figure: Wooden Wall / Circulation Counter

Page 5: Proposal for EM Security Solution

There will be a mirror / plastic sheet wall on the wooden divider for the clear visibility of the in/out of the library member.

The Circulation Process

The Library member will deposit the books which he/she like to be issued on her/his name to the circulation counter along with the member card. Once the books, etc are issued in his/her name the same will be collected from the Check-in/Check-out Window at the other side of the wooden partition. This will provide ample time to the staff at the circulation counter to desensitizing and resensitizing the EM Tags pasted on the tags. If library has not opted for the (desensitizing and resensitizing) of the EM Tags then also the Alarm will not raise any alarm unless and until the user / member is taking some thing without proper authorization.

The Anti-Theft Process

If any member/user is taking any books, etc hiding inside his cloth, etc; the EM Gate installed at the gate will give

alarm. The audio-visual display installed at the EM Gate will give proper signals to staff at the Circulation Counter / Security Guard at the main entrance of the Library.

As these gates are installed at a distance from the entrance gate, security guard/circulation staff has ample time to react to these kind of situations.

Benefits of EM Circulation & Security.

EM provides many benefits for the libraries, they are:-

it’s a cheaper security solution for the library compare to RFID

Desensitizing and resensitizing equipment can automate the circulation processes also

Maintenance cost of EM is less compared to RFID

The cost of the EM Tags are very less than RFID Tags

Page 6: Proposal for EM Security Solution

Non-benefits of EM

There is no international standards Dual process in circulation Cannot be upgraded to RFID technology in future

Customization of EM Tags

Soft tags will be customized according to the requirement of the client. The following are the general customization done by different client.

The tags with both institute logo, barcode and communication address

The tags are customized with Institute Logo, barcode number and human readable accession number

Tags are simply inserted within the binding of the books, etc.