ImageVerifierCode 换一换
格式:PDF , 页数:3 ,大小:60.61KB ,
资源ID:534907      下载积分:5000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-534907.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ASTM F1448-1993a(2006) Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDS.pdf)为本站会员(syndromehi216)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ASTM F1448-1993a(2006) Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDS.pdf

1、Designation: F 1448 93a (Reapproved 2006)Standard Guide forSelection of Security Technology for Protection AgainstCounterfeiting, Alteration, Diversion, Duplication,Simulation, and Substitution (CADDSS) of Products orDocuments1This standard is issued under the fixed designation F 1448; the number im

2、mediately following the designation indicates the year oforiginal adoption or, in the case of revision, the year of last revision. A number in parentheses indicates the year of last reapproval. Asuperscript epsilon (e) indicates an editorial change since the last revision or reapproval.This standard

3、 has been approved for use by agencies of the Department of Defense.INTRODUCTIONAny product or document of value has a high risk level of being counterfeited, altered, diverted,duplicated, simulated, or substituted (CADDSS). Counterfeiting of brand names, designer clothes,accessories, jewelry, and i

4、ntellectual property is presently assessed as a 60-billion-dollar per yearproblem worldwide. This dollar figure does not include the losses in the financial community,including banknotes, stocks and bonds, etc., which are unknown and unreported. Just as counterfeitingand alteration of documents are

5、severe problems in the financial sector, the counterfeiting, alteration,diversion, duplication, simulation, and substitution (CADDSS) of products are life threatening whenthey relate to aeronautical parts, auto parts, pharmaceuticals, life support equipment, and Departmentof Defense material. The pr

6、oblem cannot be eliminated, but it can be controlled by usinganticounterfeiting technology selected to fit the users requirements. A check list is needed to specifythe users requirements for anticounterfeiting technology to control one or all of the above-mentionedpotential fraudulent problems. Whic

7、hever technology, or combination of technologies, is used, thefrequency of authentication and the education of personnel or the public using the technology arevitally important in controlling counterfeiting, alteration, diversion, duplication simulation, andsubstitution (CADDSS) of products and docu

8、ments.1. Scope1.1 This guide is intended to assist the user in the selectionof anticounterfeiting technology as follows:1.1.1 By determining what the users requirements are asrelated to product or document by completing the usersspecific CADDSS versus parameters matrix, and1.1.2 By comparing the use

9、rs requirements matrix to asecurity technology feature matrix prepared by a knowledge-able person using the CADDSS versus parameters matrix.1.2 This guide does not address or evaluate specific tech-nologies, but rather provides a path when utilizing the matrix inTable 1 that allows proper evaluation

10、 of features of technolo-gies available for use in the application.1.3 This guide provides a procedure to accomplish theproper selection of a security system. Specific technologies arenot addressed, nor is any technology recommended. There aremany security systems available in the public marketplace

11、today. Each has limitations and must be carefully measuredagainst the parameters presented in this guide. Once thiscareful analysis is done, the user will be in a knowledgeableposition to select a security system to meet his needs.2. Referenced Documents2.1 ASTM Standards:2F 1156 Terminology Relatin

12、g to Product Counterfeit Pro-tection Systems33. Terminology3.1 DefinitionsFor definitions of terms used in this guide,refer to Terminology F 1156.1This guide is under the jurisdiction of ASTM Committee F12 on SecuritySystems and Equipment and is the direct responsibility of Subcommittee F12.60 onCon

13、trolled Access Security, Search, and Screening Equipment.Current edition approved Feb. 1, 2006. Published February 2006. Originallyapproved in 1993. Last previous edition approved in 1999 as F 1448 93a (1999).2For referenced ASTM standards, visit the ASTM website, www.astm.org, orcontact ASTM Custom

14、er Service at serviceastm.org. For Annual Book of ASTMStandards volume information, refer to the standards Document Summary page onthe ASTM website.3Withdrawn.1Copyright ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959, United States.3.1.1 alterationthe modifi

15、cation of a document or articlewith the intent that it will pass as genuine with minimum riskof detection in circumstances of ordinary use.3.1.2 counterfeita reproduction of a document, article, orsecurity feature that is intended to deceive the close scrutiny ofa qualified examiner.3.1.3 diversiont

16、he distribution and sale of legitimateproducts through unauthorized dealers.3.1.4 duplicationthe reproduction of a document or partthereof by means of a photoreproductive device.3.1.5 simulationthe imitation of a document or article,including similar security features, in a form that is intended top

17、ass as genuine in circumstances of ordinary use.3.1.6 substitutionthe act of putting or using one documentor item in place of another; within this context, the substituteddocument or item often is of lesser quality or value.4. Summary of Guide4.1 The six steps in selecting anticounterfeiting technol

18、ogyare as follows:4.1.1 Define the CADDSS problem,4.1.2 Determine requirements by using the CADDSS matrix(see Table 1),4.1.3 Select one or more appropriate matrix technologies bycomparison of users matrix with a technology matrix,4.1.4 Test by a qualified individual or forensic laboratory foreffecti

19、veness,4.1.5 Implement technology, and4.1.6 Institute educational program to use technology effec-tively.5. Significance and Use5.1 This guide is the first known attempt to focus on securityrequirements and compare them to available and knowntechnologies capable of meeting these requirements. Thisgu

20、ide provides for the following three steps:5.1.1 The user develops a detailed matrix analysis (seeTable 1) to identify specific security requirements.5.1.2 The user obtains a similar matrix that identifies thecapabilities of available technologies to satisfy specific securityrequirements. This matri

21、x can be prepared by the user, by asecurity consultant, or by a technology vendor. If the userdesires, the available technologies matrix can be tested andevaluated by a forensic laboratory.5.1.3 The user compares these two matrices in order toselect one or more technologies that most closely accommo

22、-dates the users specific security requirements.6. Measuring Parameters6.1 A typical list of measuring parameters employed by theusers to detect CADDSS is found in Table 1.7. Available Technologies7.1 Traditional Security Technology:7.1.1 Watermarks.7.1.2 Intaglio printing.7.1.3 Ultraviolet ink (vis

23、ible and invisible).7.1.4 Diphenyl ink.7.1.5 Fugitive ink.7.1.6 Infrared ink.7.1.7 Biorefringent ink.7.1.8 Metameristic ink.TABLE 1 Matrix Checklist for Technology RequirementsSubstitution Simulation Duplication Diversion Alteration Counterfeit ParametersDurableImpossible to remove and transpose wit

24、hout detectionOnly screening requiredValidation without toolValidation with simple field toolValidation with central (non-field) equipmentEasy to incorporate or applyCost effective in view of risk potentialTamper resistant or evidentOvert security featuresCovert security featuresTime allowed for aut

25、henticationPoint of use authentication requiredEase of application in current systemTraining to validate requiredSimple deterrents requiredTraceability required (tracking)Variable information within security featuresHeat-activated laminate requiredPressure-sensitive adhesive requiredSpecial substrat

26、es requiredSpecial inks requiredOne security feature requiredMultiple security features requiredOne-by-one validationClosure or seal requiredExpert verification requiredCourt evidence requiredUnique technology requiredEase of detection of alterationF 1448 93a (2006)27.1.9 Hot foil stamping.7.1.10 Ra

27、inbow printing.7.1.11 Fine line printing (guilloches and lathework).7.1.12 Photochromic ink.7.1.13 Planchettes.7.1.14 Specialty papers.7.1.15 Thermochromic ink.7.1.16 Micro lettering.7.2 Patented and Proprietary AnticounterfeitingTechnologyOne source for determining where availablepatented and propr

28、ietary information may be obtained is the(non-profit) International Anticounterfeiting Coalition, Inc.(IACC).4Another source is the Register of AntiCounterfeitingand Forgery Technologies.5NOTE 1When other sources have been identified, inclusion in futurerevisions will be considered.8. Forensic Labor

29、atory Evaluation of SecurityTechnologies8.1 The following are suggested details for evaluation ofsecurity technologies by a forensic laboratory:8.1.1 Photo-mechanical evaluation.8.1.2 Laboratory simulation.8.1.3 Mass reproduction analysis.8.1.4 Testing on a variety of color copiers (including lasert

30、ypes).8.1.5 Testing on a variety of black and white copiers.8.1.6 Chemical analysis.8.1.7 Laser scanner simulation.8.1.8 Electronic simulation.8.1.9 Tamper testing.9. Procedure9.1 This guide is utilized to define the CADDSS problem asit relates to the users products or documents.9.2 By using the mat

31、rix (Table 1), the user can specify therequirements needed for CADDSS technology.9.3 The user requirement matrix is compared to matrices setup for available technologies (5.1.2).9.4 The user selects and implements a system after evalua-tion and forensic laboratory testing (see Section 8).9.5 The fin

32、al step is to initiate an educational program forproper implementation and authentication procedures to con-trol counterfeiting, alteration, diversion, duplication, simula-tion, and substitution (CADDSS) of documents or products.10. Matrix (Fig. 1)10.1 The vertical axis Y of the matrix identifies th

33、e potentialproblem. The horizontal axis X identifies the possible technicalrequirement to aid in the evaluation of available technologies.10.2 Each parameter is considered by the person responsiblefor selection of an effective security system, while keeping inmind the requirements in the application

34、.10.3 The analyst places an “X” in the appropriate locationunder the parameter and across from one of CADDSS.11. Keywords11.1 CADDSS; counterfeit protection; product protection;security; security analysisASTM International takes no position respecting the validity of any patent rights asserted in co

35、nnection with any item mentionedin this standard. Users of this standard are expressly advised that determination of the validity of any such patent rights, and the riskof infringement of such rights, are entirely their own responsibility.This standard is subject to revision at any time by the respo

36、nsible technical committee and must be reviewed every five years andif not revised, either reapproved or withdrawn. Your comments are invited either for revision of this standard or for additional standardsand should be addressed to ASTM International Headquarters. Your comments will receive careful

37、 consideration at a meeting of theresponsible technical committee, which you may attend. If you feel that your comments have not received a fair hearing you shouldmake your views known to the ASTM Committee on Standards, at the address shown below.This standard is copyrighted by ASTM International,

38、100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959,United States. Individual reprints (single or multiple copies) of this standard may be obtained by contacting ASTM at the aboveaddress or at 610-832-9585 (phone), 610-832-9555 (fax), or serviceastm.org (e-mail); or through the ASTM website(www.astm.org).4For information, contact the IACC, 818 Connecticut Ave., N.W., Suite 1200,Washington, DC 20006.5Issued by the Counterfeiting Intelligence Bureau, Essex, United Kingdom(updated twice a year).F 1448 93a (2006)3

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1