ASTM F1448-2012 Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDSS) of P.pdf
《ASTM F1448-2012 Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDSS) of P.pdf》由会员分享,可在线阅读,更多相关《ASTM F1448-2012 Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDSS) of P.pdf(8页珍藏版)》请在麦多课文档分享上搜索。
1、Designation: F1448 93a (Reapproved 2006)F1448 12Standard Guide forSelection of Security Technology for Protection AgainstCounterfeiting, Alteration, Diversion, Duplication,Simulation, and Substitution (CADDSS) of Products orDocuments1This standard is issued under the fixed designation F1448; the num
2、ber immediately following the designation indicates the year oforiginal adoption or, in the case of revision, the year of last revision. A number in parentheses indicates the year of last reapproval. Asuperscript epsilon () indicates an editorial change since the last revision or reapproval.This sta
3、ndard has been approved for use by agencies of the Department of Defense.INTRODUCTIONAny product or document of value has a high risk level of being counterfeited, altered, diverted,duplicated, simulated, or substituted (CADDSS). The greater the value of the object or item, thegreater is the likelih
4、ood of CADDSS. Counterfeiting of brand names, designer clothes, accessories,jewelry, and intellectual property is presently assessed was assessed in 2006 as a 60-billion-dollar peryear problem worldwide. This dollar figure does not include the losses in the financial community,including banknotes, s
5、tocks and bonds, etc., the losses of which are unknown and unreported. Just ascounterfeiting and alteration of documents are severe problems in the financial sector, thecounterfeiting, alteration, diversion, duplication, simulation, and substitution (CADDSS) of productsare life threatening when they
6、 relate to aeronautical parts, auto parts, pharmaceuticals, life supportequipment, and Department of Defense material. The problem cannot be eliminated, but it can becontrolled by using anticounterfeiting technology selected to fit the users requirements. A check listis needed to specify the users r
7、equirements for anticounterfeiting technology to control one or all ofthe above-mentioned potential fraudulent problems. Whichever technology, or combination oftechnologies, is used, the frequency of authentication and the education of personnel or the publicusing the technology are vitally importan
8、t in controlling counterfeiting, alteration, diversion,duplication simulation, and substitution (CADDSS) of products and documents.The purpose of this document is to provide an overarching guide to protect against CADDSS.Therefore, it is expected that additional standards will be generated that are
9、more specific to a givenproduct, such as clothing, music and videos (and other data-centric products), medicine, currency,official documentation, vehicles, etc. To protect against CADDSS, several steps have to be taken,which include but are not limited to: (1) identification of the CADDSS sensitive
10、product, (2)documenting the nature, magnitude of likelihood, and magnitude of impact of different CADDSS onthe product, (3) list the possible anti-CADDSS solutions available to address the documentedCADDSS strategies, and (4) develop a strength and weakness analysis for each of the applicableanti-CA
11、DDSS solutions. Whichever technology, or combination of technologies, is used, thefrequency of authentication and the education of personnel or the public using the technology arevitally important in controlling counterfeiting, alteration, diversion, duplication simulation, andsubstitution (CADDSS)
12、of products and documents.1. Scope1.1 This general guide is intended to assist the user in the selection of anticounterfeiting technology as follows: of the guidein selecting anti-CADDSS technologies to protect their product from CADDSS.1 This guide is under the jurisdiction ofASTM Committee F12 on
13、Security Systems and Equipment and is the direct responsibility of Subcommittee F12.60 on ControlledAccess Security, Search, and Screening Equipment.Current edition approved Feb. 1, 2006Dec. 1, 2012. Published February 2006January 2013. Originally approved in 1993. Last previous edition approved in
14、19992006 asF1448 93a (1999).(2006). DOI: 10.1520/F1448-93AR06. 10.1520/F1448-12.This document is not an ASTM standard and is intended only to provide the user of an ASTM standard an indication of what changes have been made to the previous version. Becauseit may not be technically possible to adequa
15、tely depict all changes accurately, ASTM recommends that users consult prior editions as appropriate. In all cases only the current versionof the standard as published by ASTM is to be considered the official document.Copyright ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocke
16、n, PA 19428-2959. United States11.1.1 By determining what the users requirements are as related to product or document by completing the users specificCADDSS versus parameters matrix, and1.1.2 By comparing the users requirements matrix to a security technology feature matrix prepared by a knowledgea
17、ble personusing the CADDSS versus parameters matrix.1.2 This guide does not address or evaluate specific anti-CADDSS technologies, but rather providessuggests a path whenutilizing the matrix that assists in Table 1 that allows proper the objective evaluation of features of anti-CADDSS technologiesav
18、ailable for use in the application.protection of their product from CADDSS.1.3 This guide provides a procedure to accomplish the proper selection of a security system. Specific technologies are notaddressed, nor isare any technologytechnologies recommended. There are many security systems available
19、in the publicmarketplace today. Each has limitations and must be carefully measured against the parameters presented in this guide. Once thiscareful analysis is done, the user will be in a knowledgeable position to select a security system to meet his needs.2. Referenced Documents2.1 ASTM Standards:
20、2F1156 Terminology Relating to Product Counterfeit Protection Systems (Withdrawn 2001)32. Terminology2.1 DefinitionsDefinitions:For definitions of terms used in this guide, refer to Terminology F1156.2.1.1 alterationthe modification of a document or article an object or item that is not the genuine
21、object or time with the intentthat it will pass as genuine with minimum risk of detection in circumstances of ordinary use.the genuine object or item.2.1.2 counterfeita reproduction of a document, article, or genuine object or item or security feature that is intended to deceivethe close scrutiny of
22、 thereof so that the reproduction can pass as genuine after detailed inspection by a qualified examiner.2.1.3 diversionthe distribution and sale of legitimate products through unauthorized dealers.a genuine objects or itemsthrough unauthorized dealers, often resulting in tax evasion.2.1.4 duplicatio
23、nthe reproduction of a document or part thereof by means of a photoreproductive device.genuine object oritem so that reproduction generally looks like the genuine object or item.2.1.5 simulationthe imitation of a document or article, article genuine object or item, or features thereof, including sim
24、ilarsecurity features, in a form that is intended to pass as genuine in circumstances of ordinary use.features.2.1.6 substitutionthe act of putting or using one documentobject or item in place of another; within this context, the substituteddocument or item often is of lesser quality or value.the ge
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ASTMF14482012STANDARDGUIDEFORSELECTIONOFSECURITYTECHNOLOGYFORPROTECTIONAGAINSTCOUNTERFEITINGALTERATIONDIVERSIONDUPLICATIONSIMULATIONANDSUBSTITUTIONCADDSSOFPPDF

链接地址:http://www.mydoc123.com/p-534908.html