ASTM F1448-2016 Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDSS) of P.pdf
《ASTM F1448-2016 Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDSS) of P.pdf》由会员分享,可在线阅读,更多相关《ASTM F1448-2016 Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDSS) of P.pdf(4页珍藏版)》请在麦多课文档分享上搜索。
1、Designation: F1448 12F1448 16Standard Guide forSelection of Security Technology for Protection AgainstCounterfeiting, Alteration, Diversion, Duplication,Simulation, and Substitution (CADDSS) of Products orDocuments1This standard is issued under the fixed designation F1448; the number immediately fol
2、lowing the designation indicates the year oforiginal adoption or, in the case of revision, the year of last revision. A number in parentheses indicates the year of last reapproval. Asuperscript epsilon () indicates an editorial change since the last revision or reapproval.INTRODUCTIONAny product or
3、document of value has a risk of being counterfeited, altered, diverted, duplicated,simulated, or substituted (CADDSS). The greater the value of the object or item, the greater is thelikelihood of CADDSS. Counterfeiting of brand names, designer clothes, accessories, jewelry, andintellectual property
4、was assessed in 2006 as a 60-billion-dollar per year problem worldwide. to havea total global value of $650 billion in 2008, with 2015 projections exceeding $1 trillion, andemployment losses of approximately 2.5 million. This dollar figure does not include the losses in thefinancial community, inclu
5、ding banknotes, stocks and bonds, etc., the losses of which are unknownand unreported. Just as counterfeiting and alteration of documents are severe problems in the financialsector, the counterfeiting, alteration, diversion, duplication, simulation, and substitution (CADDSS) ofproducts are life thre
6、atening when they relate to aeronautical parts, auto parts, pharmaceuticals, lifesupport equipment, and Department of Defense material. The problem cannot be eliminated, but it canbe controlled by using anticounterfeiting technology selected to fit the users requirements.The purpose of this document
7、 is to provide an overarching guide to protect against CADDSS.Therefore, it is expected that additional standards will be generated that are more specific to a givenproduct, such as clothing, music and videos (and other data-centric products), medicine, currency,official documentation, vehicles, etc
8、. To protect against CADDSS, several steps have to be taken,which include but are not limited to: (1) identification of the CADDSS sensitive product, (2)documenting the nature, magnitude of likelihood, and magnitude of impact of different CADDSS onthe product, (3) list the possible anti-CADDSS solut
9、ions available to address the documentedCADDSS strategies, and (4) develop a strength and weakness analysis for each of the applicableanti-CADDSS solutions. Whichever technology, or combination of technologies, is used, thefrequency of authentication and the education of personnel or the public usin
10、g the technology arevitally important in controlling counterfeiting, alteration, diversion, duplication simulation, andsubstitution (CADDSS) of products and documents.1. Scope1.1 This general guide is intended to assist the user of the guide in selecting anti-CADDSS technologies to protect their pro
11、ductfrom CADDSS.1.2 This guide does not address or evaluate specific anti-CADDSS technologies, but rather suggests a path that assists in theobjective evaluation of features of anti-CADDSS technologies available protection of their product from CADDSS.1.3 This guide provides a procedure to accomplis
12、h the proper selection of a security system. Specific technologies are notaddressed, nor are any technologies recommended. There are many security systems available in the public marketplace today.1 This guide is under the jurisdiction of ASTM Committee F12 on Security Systems and Equipment and is t
13、he direct responsibility of Subcommittee F12.60 on ControlledAccess Security, Search, and Screening Equipment.Current edition approved Dec. 1, 2012Oct. 1, 2016. Published January 2013October 2016. Originally approved in 1993. Last previous edition approved in 20062012 asF1448 93a (2006).F1448 12. DO
14、I: 10.1520/F1448-12.10.1520/F1448-16.This document is not an ASTM standard and is intended only to provide the user of an ASTM standard an indication of what changes have been made to the previous version. Becauseit may not be technically possible to adequately depict all changes accurately, ASTM re
15、commends that users consult prior editions as appropriate. In all cases only the current versionof the standard as published by ASTM is to be considered the official document.Copyright ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959. United States1Each has li
16、mitations and must be carefully measured against the parameters presented in this guide. Once this careful analysis isdone, the user will be in a knowledgeable position to select a security system to meet his needs.2. Terminology2.1 Definitions:2.1.1 alterationthe modification of an object or item t
17、hat is not the genuine object or time with the intent that it will pass asthe genuine object or item.2.1.2 counterfeita reproduction of a genuine object or item or security feature thereof so that the reproduction can pass asgenuine after detailed inspection by a qualified examiner.2.1.3 diversionth
18、e distribution and sale of a genuine objects or items through unauthorized dealers, often resulting in taxevasion.2.1.4 duplicationthe reproduction of a genuine object or item so that reproduction generally looks like the genuine object oritem.2.1.5 simulationthe imitation of article genuine object
19、or item, or features thereof, including similar security features.2.1.6 substitutionthe act of putting or using one object or item in place of the genuine object or item.2.2 In all cases, it is assumed the object or item generated by CADDSS is (1) of lesser quality and cost than the genuine objector
20、 item or (2) intended to deceive the party in possession of the CADDSS generated object or item and to do this with a lowlikelihood of detection or discovery, or both.3. Significance and Use3.1 This guide is the first known attempt to focus on security requirements and compare them to available and
21、knowntechnologies capable of meeting these requirements. This guide describes several steps to select the appropriate anti-CADDSStechnology. These steps are described in Section 4.4. Selection Guide for Anti-CADDSS Technology4.1 Identify and develop a tabulated list of the object(s) or item(s) susce
22、ptible to CADDSS.4.2 Determine the type, likelihood, and magnitude of effect of CADDSS for each of the object(s) or items(s) identified in 4.1.Table A1.1 provides an example documentation of such a determination. The entries in Table A1.1 may contain links to maps,tabulated data, and graphs, or may
23、contain this information directly.4.3 For each type of CADDSS determined in 4.2, list all possible and appropriate anti-CADDSS strategies and technologies.4.4 Identify the most desirable candidate anti-CADDSS program by doing the following:4.4.1 To facilitate selection of an anti-CADDSS program, dev
24、elop a table similar to that in Table A1.1 except with informationcontained in the three rightmost columns replaced by a single value (see Table A1.2).4.4.2 The user then determines an appropriate weighting factor for each of the elements of Table A1.2 listed under the columnlabeled “%” and places t
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ASTMF14482016STANDARDGUIDEFORSELECTIONOFSECURITYTECHNOLOGYFORPROTECTIONAGAINSTCOUNTERFEITINGALTERATIONDIVERSIONDUPLICATIONSIMULATIONANDSUBSTITUTIONCADDSSOFPPDF

链接地址:http://www.mydoc123.com/p-534909.html