ASTM F1448-2016 Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDSS) of P.pdf

上传人:syndromehi216 文档编号:534909 上传时间:2018-12-06 格式:PDF 页数:4 大小:61.26KB
下载 相关 举报
ASTM F1448-2016 Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDSS) of P.pdf_第1页
第1页 / 共4页
ASTM F1448-2016 Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDSS) of P.pdf_第2页
第2页 / 共4页
ASTM F1448-2016 Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDSS) of P.pdf_第3页
第3页 / 共4页
ASTM F1448-2016 Standard Guide for Selection of Security Technology for Protection Against Counterfeiting Alteration Diversion Duplication Simulation and Substitution (CADDSS) of P.pdf_第4页
第4页 / 共4页
亲,该文档总共4页,全部预览完了,如果喜欢就下载吧!
资源描述

1、Designation: F1448 12F1448 16Standard Guide forSelection of Security Technology for Protection AgainstCounterfeiting, Alteration, Diversion, Duplication,Simulation, and Substitution (CADDSS) of Products orDocuments1This standard is issued under the fixed designation F1448; the number immediately fol

2、lowing the designation indicates the year oforiginal adoption or, in the case of revision, the year of last revision. A number in parentheses indicates the year of last reapproval. Asuperscript epsilon () indicates an editorial change since the last revision or reapproval.INTRODUCTIONAny product or

3、document of value has a risk of being counterfeited, altered, diverted, duplicated,simulated, or substituted (CADDSS). The greater the value of the object or item, the greater is thelikelihood of CADDSS. Counterfeiting of brand names, designer clothes, accessories, jewelry, andintellectual property

4、was assessed in 2006 as a 60-billion-dollar per year problem worldwide. to havea total global value of $650 billion in 2008, with 2015 projections exceeding $1 trillion, andemployment losses of approximately 2.5 million. This dollar figure does not include the losses in thefinancial community, inclu

5、ding banknotes, stocks and bonds, etc., the losses of which are unknownand unreported. Just as counterfeiting and alteration of documents are severe problems in the financialsector, the counterfeiting, alteration, diversion, duplication, simulation, and substitution (CADDSS) ofproducts are life thre

6、atening when they relate to aeronautical parts, auto parts, pharmaceuticals, lifesupport equipment, and Department of Defense material. The problem cannot be eliminated, but it canbe controlled by using anticounterfeiting technology selected to fit the users requirements.The purpose of this document

7、 is to provide an overarching guide to protect against CADDSS.Therefore, it is expected that additional standards will be generated that are more specific to a givenproduct, such as clothing, music and videos (and other data-centric products), medicine, currency,official documentation, vehicles, etc

8、. To protect against CADDSS, several steps have to be taken,which include but are not limited to: (1) identification of the CADDSS sensitive product, (2)documenting the nature, magnitude of likelihood, and magnitude of impact of different CADDSS onthe product, (3) list the possible anti-CADDSS solut

9、ions available to address the documentedCADDSS strategies, and (4) develop a strength and weakness analysis for each of the applicableanti-CADDSS solutions. Whichever technology, or combination of technologies, is used, thefrequency of authentication and the education of personnel or the public usin

10、g the technology arevitally important in controlling counterfeiting, alteration, diversion, duplication simulation, andsubstitution (CADDSS) of products and documents.1. Scope1.1 This general guide is intended to assist the user of the guide in selecting anti-CADDSS technologies to protect their pro

11、ductfrom CADDSS.1.2 This guide does not address or evaluate specific anti-CADDSS technologies, but rather suggests a path that assists in theobjective evaluation of features of anti-CADDSS technologies available protection of their product from CADDSS.1.3 This guide provides a procedure to accomplis

12、h the proper selection of a security system. Specific technologies are notaddressed, nor are any technologies recommended. There are many security systems available in the public marketplace today.1 This guide is under the jurisdiction of ASTM Committee F12 on Security Systems and Equipment and is t

13、he direct responsibility of Subcommittee F12.60 on ControlledAccess Security, Search, and Screening Equipment.Current edition approved Dec. 1, 2012Oct. 1, 2016. Published January 2013October 2016. Originally approved in 1993. Last previous edition approved in 20062012 asF1448 93a (2006).F1448 12. DO

14、I: 10.1520/F1448-12.10.1520/F1448-16.This document is not an ASTM standard and is intended only to provide the user of an ASTM standard an indication of what changes have been made to the previous version. Becauseit may not be technically possible to adequately depict all changes accurately, ASTM re

15、commends that users consult prior editions as appropriate. In all cases only the current versionof the standard as published by ASTM is to be considered the official document.Copyright ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959. United States1Each has li

16、mitations and must be carefully measured against the parameters presented in this guide. Once this careful analysis isdone, the user will be in a knowledgeable position to select a security system to meet his needs.2. Terminology2.1 Definitions:2.1.1 alterationthe modification of an object or item t

17、hat is not the genuine object or time with the intent that it will pass asthe genuine object or item.2.1.2 counterfeita reproduction of a genuine object or item or security feature thereof so that the reproduction can pass asgenuine after detailed inspection by a qualified examiner.2.1.3 diversionth

18、e distribution and sale of a genuine objects or items through unauthorized dealers, often resulting in taxevasion.2.1.4 duplicationthe reproduction of a genuine object or item so that reproduction generally looks like the genuine object oritem.2.1.5 simulationthe imitation of article genuine object

19、or item, or features thereof, including similar security features.2.1.6 substitutionthe act of putting or using one object or item in place of the genuine object or item.2.2 In all cases, it is assumed the object or item generated by CADDSS is (1) of lesser quality and cost than the genuine objector

20、 item or (2) intended to deceive the party in possession of the CADDSS generated object or item and to do this with a lowlikelihood of detection or discovery, or both.3. Significance and Use3.1 This guide is the first known attempt to focus on security requirements and compare them to available and

21、knowntechnologies capable of meeting these requirements. This guide describes several steps to select the appropriate anti-CADDSStechnology. These steps are described in Section 4.4. Selection Guide for Anti-CADDSS Technology4.1 Identify and develop a tabulated list of the object(s) or item(s) susce

22、ptible to CADDSS.4.2 Determine the type, likelihood, and magnitude of effect of CADDSS for each of the object(s) or items(s) identified in 4.1.Table A1.1 provides an example documentation of such a determination. The entries in Table A1.1 may contain links to maps,tabulated data, and graphs, or may

23、contain this information directly.4.3 For each type of CADDSS determined in 4.2, list all possible and appropriate anti-CADDSS strategies and technologies.4.4 Identify the most desirable candidate anti-CADDSS program by doing the following:4.4.1 To facilitate selection of an anti-CADDSS program, dev

24、elop a table similar to that in Table A1.1 except with informationcontained in the three rightmost columns replaced by a single value (see Table A1.2).4.4.2 The user then determines an appropriate weighting factor for each of the elements of Table A1.2 listed under the columnlabeled “%” and places t

25、his weight in the column labeled “weight.”4.4.3 Multiply the weighting factor by the table entry, as shown in Table A1.2, and enter in the column labeled “product.”4.4.4 Sum the products found in 5.4.3 and enter in the leftmost column labeled “decision values.” These values will be the basisupon whi

26、ch a user will determine if an anti-CADDSS program will be considered.4.4.5 The user determines the lower limit for a decision value below which an anti-CADDSS program will not be initiated. Thislower limit may be based on resources, public acceptance, safety, etc.NOTE 1The information generated thu

27、s far indicates the importance, to the user, of different CADDSS threats on products. Moreover, the user hasdefined a threshold of CADDSS threats below which the user will not address, which helps to focus resources on the threats most likely to cause harm,damage, or loss to the user. This assessmen

28、t is dynamic and can and should be revisited periodically.4.4.6 Once the above CADDSS threat assessment has been completed, the user must identify the possible anti- CADDSSanti-CADDSS solutions. To identify these solutions requires an analysis of the application-specific or productspecificproduct-sp

29、ecific anti-CADDSS strategies and technologies. Identification of these solutions is beyond the scope of this standard. It isrecommended that separate anti-CADDSS standards development working groups be started for the purpose of generating theseapplication-specific or product-specific anti-CADDSS s

30、tandards. To assist those standards development working groups,suggestions on how to proceed are now given (it is assumed that the working group is addressing unique applications or products):4.4.6.1 Identify and tabulate the possible anti-CADDSS solutions for each CADDSS threat determined previousl

31、y. As anexample, Table A1.3 lists arbitrary anti-CADDSS solutions in the leftmost column and, in the adjacent column, the operational,performance, and use parameters of those solutions for the CADDSS threats. As mentioned in the caption of Table A1.3, theseanti-CADDSS operational, performance, and u

32、se parameters may include, but are not limited to, cost of use, cost of authentication,ease of application/use, ease of authentication, training requirements, experience required to use, experience required toF1448 162authenticate, evidentiary requirements, evidentiary use, ease of altering, permane

33、nce, and safety. The two leftmost columns ofTable A1.3 should be generated by individuals knowledgeable of the anti-CADDSS solutions appropriate for a given CADDSSthreat.4.4.6.2 Fill the cells in the table, under “CADDSS Threats,” with user-specified ratings that show the importance of the givenpara

34、meter to the threat. Unless otherwise specified by the user, the value of the rating should be an integer in the range between0 and 10.NOTE 2The information generated by TableA1.3 indicates the importance of different anti-CADDSS solutions to given CADDSS threats for the user.The ratings provide inf

35、ormation to the user for selection of an anti- CADDSS solution or solutions. For example, it can provide (1) the anti-CADDSSsolution that has the highest rating for all CADDSS threats, (2) the anti-CADDSS solution rated highest for a given threat, (3) the anti-CADDSS parameterof most importance to t

36、he user, etc.4.4.6.3 Compare the CADDSS threats from Table A1.2 to Table A1.3 entries. Those anti-CADDSS solutions that have thehighest rating, from Table A1.3, and that simultaneously address the CADDSS threats exceeding the limiting value, from TableA1.2, are likely anti-CADDSS solutions.4.4.7 Onc

37、e an anti-CADDSS solution is identified, it should be tested to ensure its effectiveness. Testing should be done by aqualified laboratory to test per the performance, operational, or use parameter deemed important (see Table A1.3).4.4.8 Upon a successful outcome of the testing of the anti-CADDSS sol

38、ution, the solution can be implemented.5. Application Suggestions for Anti-CADDSS Technology5.1 Institute educational program to use anti-CADDSS technology effectively.5.2 Develop surveillance program to continuously monitor effectiveness of the implemented anti-CADDSS solution.5.3 Document results

39、and disseminate to appropriate groups and organizations.5.4 Protect and maintain confidentiality of information to prevent advancement of CADDSS.6. Keywords6.1 CADDSS; counterfeit protection; product protection; security; security analysisANNEX(Mandatory Information)A1. EXAMPLE TABLESA1.1 This annex

40、 contains example tables referenced in Section 4.TABLE A1.1 CADDSS Susceptibility Assessment for Insert Object or Item NameNOTE 1Each of these metrics should be based on previous experience, observations, or official reports, or a combination thereof. Furthermore, thesemetrics should include informa

41、tion on the geographic inhomogeneities and periodicity of CADDSS use. Consequently, each table entry could comprisemaps and timelines.CADDSS Type Likelihood of Use (%)A Extent of Use (%)B Magnitude of Effect (%)CSubstitutionSimulationDuplicationDiversionAlterationCounterfeitAThis metric represents t

42、he likelihood that this particular CADDSS method will be used. The values in this column should sum to 100 %.BThis metric represents the percentage of the CADDSS objects or items relative to the total number of the original objects or items. This column does not need to sumto 100 % because all CADDS

43、S threats are likely to be only a fraction of the total number of original objects or items.CThe metric should reflect the cost magnitude of the effect of the CADDSS objects or items on the market for the original objects or items. This column will not sum to100 % and should reflect the financial or

44、 other measurable impact.F1448 163ASTM International takes no position respecting the validity of any patent rights asserted in connection with any item mentionedin this standard. Users of this standard are expressly advised that determination of the validity of any such patent rights, and the risko

45、f infringement of such rights, are entirely their own responsibility.This standard is subject to revision at any time by the responsible technical committee and must be reviewed every five years andif not revised, either reapproved or withdrawn.Your comments are invited either for revision of this s

46、tandard or for additional standardsand should be addressed to ASTM International Headquarters. Your comments will receive careful consideration at a meeting of theresponsible technical committee, which you may attend. If you feel that your comments have not received a fair hearing you shouldmake you

47、r views known to the ASTM Committee on Standards, at the address shown below.This standard is copyrighted by ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959,United States. Individual reprints (single or multiple copies) of this standard may be obtained by con

48、tacting ASTM at the aboveaddress or at 610-832-9585 (phone), 610-832-9555 (fax), or serviceastm.org (e-mail); or through the ASTM website(www.astm.org). Permission rights to photocopy the standard may also be secured from the Copyright Clearance Center, 222Rosewood Drive, Danvers, MA 01923, Tel: (97

49、8) 646-2600; http:/ A1.2 CADDSS Selection Work Table for Insert Object or Item NameNOTE 1The column labeled “%” contains a single value, defined by the user, to represent the possible graphic and tabular data presented in each cellof TableA1.1. The weights are user-specified and indicate the amount of importance the user places on each entry of the table. For each column, the valuesof the weights should range between 0 and 1.0 and sum to 1.0, unless otherwise specified by the user. The column labeled “product” contains the productof the en

展开阅读全文
相关资源
猜你喜欢
  • AECMA PREN 3856-1995 Aerospace Seriers Pipe Couplings 60 Degrees Spherical in Titanium Alloy TI-P64001 Swivel Nuts for Thrust Wire Edition P1《航空航天系列导管接头 60度球形钛合金TI-P64001旋转轴》.pdf AECMA PREN 3856-1995 Aerospace Seriers Pipe Couplings 60 Degrees Spherical in Titanium Alloy TI-P64001 Swivel Nuts for Thrust Wire Edition P1《航空航天系列导管接头 60度球形钛合金TI-P64001旋转轴》.pdf
  • AECMA PREN 3857-1995 Aerospace Series Pipe Couplings 60 Degrees Spherical in Titanium Alloy TI-P64001 Elbows 90 Degrees Welded Edition P1《航空航天系列导管接头 60度球形钛合金TI-P6400190度轴焊接》.pdf AECMA PREN 3857-1995 Aerospace Series Pipe Couplings 60 Degrees Spherical in Titanium Alloy TI-P64001 Elbows 90 Degrees Welded Edition P1《航空航天系列导管接头 60度球形钛合金TI-P6400190度轴焊接》.pdf
  • AECMA PREN 3858-1995 Aerospace Series Pipe Couplings 60 Degrees Spherical in Titanium Alloy TI-P64001 Thrust Wires in Steel FE-PA13 Edition P1《航空航天系列导管接头 60度球形钛合金TI-P64001插入线》.pdf AECMA PREN 3858-1995 Aerospace Series Pipe Couplings 60 Degrees Spherical in Titanium Alloy TI-P64001 Thrust Wires in Steel FE-PA13 Edition P1《航空航天系列导管接头 60度球形钛合金TI-P64001插入线》.pdf
  • AECMA PREN 3859-1993 Aerospace Series Titanium Alloy TI-P19001 Annealed Sheet and Strip Hot Rolled a Less Than or Equal to 6 mm Edition P 1《航空航天系列钛合金TI-P19001退火片和带热轧a小于或等于6mm》.pdf AECMA PREN 3859-1993 Aerospace Series Titanium Alloy TI-P19001 Annealed Sheet and Strip Hot Rolled a Less Than or Equal to 6 mm Edition P 1《航空航天系列钛合金TI-P19001退火片和带热轧a小于或等于6mm》.pdf
  • AECMA PREN 3860-1993 Aerospace Series Titanium Alloy TI-P19001 Annealed Sheet and Strip Cold Rolled a Less Than or Equal to 6 mm Edition P 1《航空航天系列钛合金TI-P19001退火片和带热轧a小于或等于6mm》.pdf AECMA PREN 3860-1993 Aerospace Series Titanium Alloy TI-P19001 Annealed Sheet and Strip Cold Rolled a Less Than or Equal to 6 mm Edition P 1《航空航天系列钛合金TI-P19001退火片和带热轧a小于或等于6mm》.pdf
  • AECMA PREN 3861-2001 Aerospace Series Non-Metallic Materials Glass Transparencies Material Standard Thermally Tempered Soda Lime Float Glass Edition P 1《航空航天系列.非金属材料、玻璃透明度 材料标准、热钢化.pdf AECMA PREN 3861-2001 Aerospace Series Non-Metallic Materials Glass Transparencies Material Standard Thermally Tempered Soda Lime Float Glass Edition P 1《航空航天系列.非金属材料、玻璃透明度 材料标准、热钢化.pdf
  • AECMA PREN 3862-2001 Aerospace Series Non-Metallic Materials Glass Transparencies Material Standard Chemically Tempered Soda Lime Float Glass Edition P 1《航空航天系列.非金属材料、玻璃透明度 材料标准、化学.pdf AECMA PREN 3862-2001 Aerospace Series Non-Metallic Materials Glass Transparencies Material Standard Chemically Tempered Soda Lime Float Glass Edition P 1《航空航天系列.非金属材料、玻璃透明度 材料标准、化学.pdf
  • AECMA PREN 3863-2001 Aerospace Series Non-Metallic Materials Glass Transparencies Test Methods Determination of Flatness Edition P 1《航空航天系列.非金属材料、玻璃透明度 试验方法、平面度的测定》.pdf AECMA PREN 3863-2001 Aerospace Series Non-Metallic Materials Glass Transparencies Test Methods Determination of Flatness Edition P 1《航空航天系列.非金属材料、玻璃透明度 试验方法、平面度的测定》.pdf
  • AECMA PREN 3864-2001 Aerospace Series Non-Metallic Materials Glass Transparencies Test Methods Determination of Modulus of Rupture Edition P 1《航空航天系列.非金属材料、玻璃透明度 试验方法、破裂系数的测定》.pdf AECMA PREN 3864-2001 Aerospace Series Non-Metallic Materials Glass Transparencies Test Methods Determination of Modulus of Rupture Edition P 1《航空航天系列.非金属材料、玻璃透明度 试验方法、破裂系数的测定》.pdf
  • 相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > ASTM

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1