ASTM F1448-1993a(2006) Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDS.pdf
《ASTM F1448-1993a(2006) Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDS.pdf》由会员分享,可在线阅读,更多相关《ASTM F1448-1993a(2006) Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDS.pdf(3页珍藏版)》请在麦多课文档分享上搜索。
1、Designation: F 1448 93a (Reapproved 2006)Standard Guide forSelection of Security Technology for Protection AgainstCounterfeiting, Alteration, Diversion, Duplication,Simulation, and Substitution (CADDSS) of Products orDocuments1This standard is issued under the fixed designation F 1448; the number im
2、mediately following the designation indicates the year oforiginal adoption or, in the case of revision, the year of last revision. A number in parentheses indicates the year of last reapproval. Asuperscript epsilon (e) indicates an editorial change since the last revision or reapproval.This standard
3、 has been approved for use by agencies of the Department of Defense.INTRODUCTIONAny product or document of value has a high risk level of being counterfeited, altered, diverted,duplicated, simulated, or substituted (CADDSS). Counterfeiting of brand names, designer clothes,accessories, jewelry, and i
4、ntellectual property is presently assessed as a 60-billion-dollar per yearproblem worldwide. This dollar figure does not include the losses in the financial community,including banknotes, stocks and bonds, etc., which are unknown and unreported. Just as counterfeitingand alteration of documents are
5、severe problems in the financial sector, the counterfeiting, alteration,diversion, duplication, simulation, and substitution (CADDSS) of products are life threatening whenthey relate to aeronautical parts, auto parts, pharmaceuticals, life support equipment, and Departmentof Defense material. The pr
6、oblem cannot be eliminated, but it can be controlled by usinganticounterfeiting technology selected to fit the users requirements. A check list is needed to specifythe users requirements for anticounterfeiting technology to control one or all of the above-mentionedpotential fraudulent problems. Whic
7、hever technology, or combination of technologies, is used, thefrequency of authentication and the education of personnel or the public using the technology arevitally important in controlling counterfeiting, alteration, diversion, duplication simulation, andsubstitution (CADDSS) of products and docu
8、ments.1. Scope1.1 This guide is intended to assist the user in the selectionof anticounterfeiting technology as follows:1.1.1 By determining what the users requirements are asrelated to product or document by completing the usersspecific CADDSS versus parameters matrix, and1.1.2 By comparing the use
9、rs requirements matrix to asecurity technology feature matrix prepared by a knowledge-able person using the CADDSS versus parameters matrix.1.2 This guide does not address or evaluate specific tech-nologies, but rather provides a path when utilizing the matrix inTable 1 that allows proper evaluation
10、 of features of technolo-gies available for use in the application.1.3 This guide provides a procedure to accomplish theproper selection of a security system. Specific technologies arenot addressed, nor is any technology recommended. There aremany security systems available in the public marketplace
11、today. Each has limitations and must be carefully measuredagainst the parameters presented in this guide. Once thiscareful analysis is done, the user will be in a knowledgeableposition to select a security system to meet his needs.2. Referenced Documents2.1 ASTM Standards:2F 1156 Terminology Relatin
12、g to Product Counterfeit Pro-tection Systems33. Terminology3.1 DefinitionsFor definitions of terms used in this guide,refer to Terminology F 1156.1This guide is under the jurisdiction of ASTM Committee F12 on SecuritySystems and Equipment and is the direct responsibility of Subcommittee F12.60 onCon
13、trolled Access Security, Search, and Screening Equipment.Current edition approved Feb. 1, 2006. Published February 2006. Originallyapproved in 1993. Last previous edition approved in 1999 as F 1448 93a (1999).2For referenced ASTM standards, visit the ASTM website, www.astm.org, orcontact ASTM Custom
14、er Service at serviceastm.org. For Annual Book of ASTMStandards volume information, refer to the standards Document Summary page onthe ASTM website.3Withdrawn.1Copyright ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959, United States.3.1.1 alterationthe modifi
15、cation of a document or articlewith the intent that it will pass as genuine with minimum riskof detection in circumstances of ordinary use.3.1.2 counterfeita reproduction of a document, article, orsecurity feature that is intended to deceive the close scrutiny ofa qualified examiner.3.1.3 diversiont
16、he distribution and sale of legitimateproducts through unauthorized dealers.3.1.4 duplicationthe reproduction of a document or partthereof by means of a photoreproductive device.3.1.5 simulationthe imitation of a document or article,including similar security features, in a form that is intended top
17、ass as genuine in circumstances of ordinary use.3.1.6 substitutionthe act of putting or using one documentor item in place of another; within this context, the substituteddocument or item often is of lesser quality or value.4. Summary of Guide4.1 The six steps in selecting anticounterfeiting technol
18、ogyare as follows:4.1.1 Define the CADDSS problem,4.1.2 Determine requirements by using the CADDSS matrix(see Table 1),4.1.3 Select one or more appropriate matrix technologies bycomparison of users matrix with a technology matrix,4.1.4 Test by a qualified individual or forensic laboratory foreffecti
19、veness,4.1.5 Implement technology, and4.1.6 Institute educational program to use technology effec-tively.5. Significance and Use5.1 This guide is the first known attempt to focus on securityrequirements and compare them to available and knowntechnologies capable of meeting these requirements. Thisgu
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ASTMF14481993A2006STANDARDGUIDEFORSELECTIONOFSECURITYTECHNOLOGYFORPROTECTIONAGAINSTCOUNTERFEITINGALTERATIONDIVERSIONDUPLICATIONSIMULATIONANDSUBSTITUTIONCADDSPDF

链接地址:http://www.mydoc123.com/p-534907.html