欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ASTM F1448-2012 Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDSS) of P.pdf

    • 资源ID:534908       资源大小:79.99KB        全文页数:8页
    • 资源格式: PDF        下载积分:5000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要5000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ASTM F1448-2012 Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDSS) of P.pdf

    1、Designation: F1448 93a (Reapproved 2006)F1448 12Standard Guide forSelection of Security Technology for Protection AgainstCounterfeiting, Alteration, Diversion, Duplication,Simulation, and Substitution (CADDSS) of Products orDocuments1This standard is issued under the fixed designation F1448; the num

    2、ber immediately following the designation indicates the year oforiginal adoption or, in the case of revision, the year of last revision. A number in parentheses indicates the year of last reapproval. Asuperscript epsilon () indicates an editorial change since the last revision or reapproval.This sta

    3、ndard has been approved for use by agencies of the Department of Defense.INTRODUCTIONAny product or document of value has a high risk level of being counterfeited, altered, diverted,duplicated, simulated, or substituted (CADDSS). The greater the value of the object or item, thegreater is the likelih

    4、ood of CADDSS. Counterfeiting of brand names, designer clothes, accessories,jewelry, and intellectual property is presently assessed was assessed in 2006 as a 60-billion-dollar peryear problem worldwide. This dollar figure does not include the losses in the financial community,including banknotes, s

    5、tocks and bonds, etc., the losses of which are unknown and unreported. Just ascounterfeiting and alteration of documents are severe problems in the financial sector, thecounterfeiting, alteration, diversion, duplication, simulation, and substitution (CADDSS) of productsare life threatening when they

    6、 relate to aeronautical parts, auto parts, pharmaceuticals, life supportequipment, and Department of Defense material. The problem cannot be eliminated, but it can becontrolled by using anticounterfeiting technology selected to fit the users requirements. A check listis needed to specify the users r

    7、equirements for anticounterfeiting technology to control one or all ofthe above-mentioned potential fraudulent problems. Whichever technology, or combination oftechnologies, is used, the frequency of authentication and the education of personnel or the publicusing the technology are vitally importan

    8、t in controlling counterfeiting, alteration, diversion,duplication simulation, and substitution (CADDSS) of products and documents.The purpose of this document is to provide an overarching guide to protect against CADDSS.Therefore, it is expected that additional standards will be generated that are

    9、more specific to a givenproduct, such as clothing, music and videos (and other data-centric products), medicine, currency,official documentation, vehicles, etc. To protect against CADDSS, several steps have to be taken,which include but are not limited to: (1) identification of the CADDSS sensitive

    10、product, (2)documenting the nature, magnitude of likelihood, and magnitude of impact of different CADDSS onthe product, (3) list the possible anti-CADDSS solutions available to address the documentedCADDSS strategies, and (4) develop a strength and weakness analysis for each of the applicableanti-CA

    11、DDSS solutions. Whichever technology, or combination of technologies, is used, thefrequency of authentication and the education of personnel or the public using the technology arevitally important in controlling counterfeiting, alteration, diversion, duplication simulation, andsubstitution (CADDSS)

    12、of products and documents.1. Scope1.1 This general guide is intended to assist the user in the selection of anticounterfeiting technology as follows: of the guidein selecting anti-CADDSS technologies to protect their product from CADDSS.1 This guide is under the jurisdiction ofASTM Committee F12 on

    13、Security Systems and Equipment and is the direct responsibility of Subcommittee F12.60 on ControlledAccess Security, Search, and Screening Equipment.Current edition approved Feb. 1, 2006Dec. 1, 2012. Published February 2006January 2013. Originally approved in 1993. Last previous edition approved in

    14、19992006 asF1448 93a (1999).(2006). DOI: 10.1520/F1448-93AR06. 10.1520/F1448-12.This document is not an ASTM standard and is intended only to provide the user of an ASTM standard an indication of what changes have been made to the previous version. Becauseit may not be technically possible to adequa

    15、tely depict all changes accurately, ASTM recommends that users consult prior editions as appropriate. In all cases only the current versionof the standard as published by ASTM is to be considered the official document.Copyright ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocke

    16、n, PA 19428-2959. United States11.1.1 By determining what the users requirements are as related to product or document by completing the users specificCADDSS versus parameters matrix, and1.1.2 By comparing the users requirements matrix to a security technology feature matrix prepared by a knowledgea

    17、ble personusing the CADDSS versus parameters matrix.1.2 This guide does not address or evaluate specific anti-CADDSS technologies, but rather providessuggests a path whenutilizing the matrix that assists in Table 1 that allows proper the objective evaluation of features of anti-CADDSS technologiesav

    18、ailable for use in the application.protection of their product from CADDSS.1.3 This guide provides a procedure to accomplish the proper selection of a security system. Specific technologies are notaddressed, nor isare any technologytechnologies recommended. There are many security systems available

    19、in the publicmarketplace today. Each has limitations and must be carefully measured against the parameters presented in this guide. Once thiscareful analysis is done, the user will be in a knowledgeable position to select a security system to meet his needs.2. Referenced Documents2.1 ASTM Standards:

    20、2F1156 Terminology Relating to Product Counterfeit Protection Systems (Withdrawn 2001)32. Terminology2.1 DefinitionsDefinitions:For definitions of terms used in this guide, refer to Terminology F1156.2.1.1 alterationthe modification of a document or article an object or item that is not the genuine

    21、object or time with the intentthat it will pass as genuine with minimum risk of detection in circumstances of ordinary use.the genuine object or item.2.1.2 counterfeita reproduction of a document, article, or genuine object or item or security feature that is intended to deceivethe close scrutiny of

    22、 thereof so that the reproduction can pass as genuine after detailed inspection by a qualified examiner.2.1.3 diversionthe distribution and sale of legitimate products through unauthorized dealers.a genuine objects or itemsthrough unauthorized dealers, often resulting in tax evasion.2.1.4 duplicatio

    23、nthe reproduction of a document or part thereof by means of a photoreproductive device.genuine object oritem so that reproduction generally looks like the genuine object or item.2.1.5 simulationthe imitation of a document or article, article genuine object or item, or features thereof, including sim

    24、ilarsecurity features, in a form that is intended to pass as genuine in circumstances of ordinary use.features.2.1.6 substitutionthe act of putting or using one documentobject or item in place of another; within this context, the substituteddocument or item often is of lesser quality or value.the ge

    25、nuine object or item.2.2 In all cases, it is assumed the object or item generated by CADDSS is (1) of lesser quality and cost than the genuine objector item or (2) intended to deceive the party in possession of the CADDSS generated object or item and to do this with a lowlikelihood of detection or d

    26、iscovery, or both.4. Summary of Guide4.1 The six steps in selecting anticounterfeiting technology are as follows:4.1.1 Define the CADDSS problem,4.1.2 Determine requirements by using the CADDSS matrix (see Table 1),4.1.3 Select one or more appropriate matrix technologies by comparison of users matri

    27、x with a technology matrix,4.1.4 Test by a qualified individual or forensic laboratory for effectiveness,4.1.5 Implement technology, and4.1.6 Institute educational program to use technology effectively.3. Significance and Use3.1 This guide is the first known attempt to focus on security requirements

    28、 and compare them to available and knowntechnologies capable of meeting these requirements. This guide provides for the following three steps:describes several steps toselect the appropriate anti-CADDSS technology. These steps are described in Section 4.5.1.1 The user develops a detailed matrix anal

    29、ysis (see Table 1) to identify specific security requirements.5.1.2 The user obtains a similar matrix that identifies the capabilities of available technologies to satisfy specific securityrequirements. This matrix can be prepared by the user, by a security consultant, or by a technology vendor. If

    30、the user desires, theavailable technologies matrix can be tested and evaluated by a forensic laboratory.5.1.3 The user compares these two matrices in order to select one or more technologies that most closely accommodates theusers specific security requirements.6. Measuring Parameters6.1 A typical l

    31、ist of measuring parameters employed by the users to detect CADDSS is found in Table 1.F1448 1227. Available Technologies7.1 Traditional Security Technology:7.1.1 Watermarks.7.1.2 Intaglio printing.7.1.3 Ultraviolet ink (visible and invisible).7.1.4 Diphenyl ink.7.1.5 Fugitive ink.7.1.6 Infrared ink

    32、.7.1.7 Biorefringent ink.7.1.8 Metameristic ink.7.1.9 Hot foil stamping.7.1.10 Rainbow printing.7.1.11 Fine line printing (guilloches and lathework).7.1.12 Photochromic ink.7.1.13 Planchettes.7.1.14 Specialty papers.7.1.15 Thermochromic ink.7.1.16 Micro lettering.7.2 Patented and Proprietary Anticou

    33、nterfeiting TechnologyOne source for determining where available patented andproprietary information may be obtained is the (non-profit) International Anticounterfeiting Coalition, Inc. (IACC).4 Anothersource is the Register of AntiCounterfeiting and Forgery Technologies.5NOTE 1When other sources ha

    34、ve been identified, inclusion in future revisions will be considered.8. Forensic Laboratory Evaluation of Security Technologies8.1 The following are suggested details for evaluation of security technologies by a forensic laboratory:8.1.1 Photo-mechanical evaluation.8.1.2 Laboratory simulation.8.1.3

    35、Mass reproduction analysis.8.1.4 Testing on a variety of color copiers (including laser types).8.1.5 Testing on a variety of black and white copiers.8.1.6 Chemical analysis.8.1.7 Laser scanner simulation.8.1.8 Electronic simulation.8.1.9 Tamper testing.9. Procedure9.1 This guide is utilized to defin

    36、e the CADDSS problem as it relates to the users products or documents.9.2 By using the matrix (Table 1), the user can specify the requirements needed for CADDSS technology.9.3 The user requirement matrix is compared to matrices set up for available technologies (5.1.2).9.4 The user selects and imple

    37、ments a system after evaluation and forensic laboratory testing (see Section 8).9.5 The final step is to initiate an educational program for proper implementation and authentication procedures to controlcounterfeiting, alteration, diversion, duplication, simulation, and substitution (CADDSS) of docu

    38、ments or products.4. Matrix (Fig. 1) Selection Guide for Anti-CADDSS Technology4.1 The vertical axisIdentify and develop Ya of the matrix identifies the potential problem. The horizontal axis tabulated list ofthe object(s) or item(s) susceptible X identifies the possible technical requirement to aid

    39、 in the evaluation of availabletechnologies.to CADDSS.4.2 Determine the type, likelihood, and magnitude of effect of CADDSS for each of the object(s) or items(s) identified in 4.1.Table A1.1 provides an example documentation of such a determination. The entries in Table A1.1 may contain links to map

    40、s,tabulated data, and graphs, or may contain this information directly.4.3 For each type of CADDSS determined in 4.2, list all possible and appropriate anti-CADDSS strategies and technologies.4.4 Each parameter is considered by the person responsible for selection of an effective security system, wh

    41、ile keeping in mindthe requirements in the application.Identify the most desirable candidate anti-CADDSS program by doing the following:4.4.1 To facilitate selection of an anti-CADDSS program, develop a table similar to that in Table A1.1 except with informationcontained in the three rightmost colum

    42、ns replaced by a single value (see Table A1.2).F1448 1234.4.2 The user then determines an appropriate weighting factor for each of the elements of Table A1.2 listed under the columnlabeled “%” and places this weight in the column labeled “weight.”4.4.3 Multiply the weighting factor by the table entr

    43、y, as shown in Table A1.2, and enter in the column labeled “product.”4.4.4 Sum the products found in 5.4.3 and enter in the leftmost column labeled “decision values.” These values will be the basisupon which a user will determine if an anti-CADDSS program will be considered.4.4.5 The user determines

    44、 the lower limit for a decision value below which an anti-CADDSS program will not be initiated. Thislower limit may be based on resources, public acceptance, safety, etc.NOTE 1The information generated thus far indicates the importance, to the user, of different CADDSS threats on products. Moreover,

    45、 the user hasdefined a threshold of CADDSS threats below which the user will not address, which helps to focus resources on the threats most likely to cause harm,damage, or loss to the user. This assessment is dynamic and can and should be revisited periodically.4.4.6 Once the above CADDSS threat as

    46、sessment has been completed, the user must identify the possible anti- CADDSSsolutions.To identify these solutions requires an analysis of the application-specific or productspecific anti-CADDSS strategies andtechnologies. Identification of these solutions is beyond the scope of this standard. It is

    47、 recommended that separate anti-CADDSSstandards development working groups be started for the purpose of generating these application-specific or product-specificanti-CADDSS standards. To assist those standards development working groups, suggestions on how to proceed are now given (itis assumed tha

    48、t the working group is addressing unique applications or products):4.4.6.1 Identify and tabulate the possible anti-CADDSS solutions for each CADDSS threat determined previously. As anexample, Table A1.3 lists arbitrary anti-CADDSS solutions in the leftmost column and, in the adjacent column, the ope

    49、rational,performance, and use parameters of those solutions for the CADDSS threats. As mentioned in the caption of Table A1.3, theseanti-CADDSS operational, performance, and use parameters may include, but are not limited to, cost of use, cost of authentication,ease of application/use, ease of authentication, training requirements, experience required to use, experience required toauthenticate, evidentiary requirements, evidentiary use, ease of altering, permanence, and safety. The two leftmost columns ofTable A1.3 should be generated by individuals knowledgeable


    注意事项

    本文(ASTM F1448-2012 Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDSS) of P.pdf)为本站会员(syndromehi216)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开