Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents

SCOPE
1.1 This guide is intended to assist the user in the selection of anticounterfeiting technology as follows:
1.1.1 By determining what the user's requirements are as related to product or document by completing the user's specific CADDSS versus parameters matrix, and
1.1.2 By comparing the user's requirements matrix to a security technology feature matrix prepared by a knowledgeable person using the CADDSS versus parameters matrix.
1.2 This guide does not address or evaluate specific technologies, but rather provides a path when utilizing the matrix in Table 1 that allows proper evaluation of features of technologies available for use in the application.
1.3 This guide provides a procedure to accomplish the proper selection of a security system. Specific technologies are not addressed, nor is any technology recommended. There are many security systems available in the public marketplace today. Each has limitations and must be carefully measured against the parameters presented in this guide. Once this careful analysis is done, the user will be in a knowledgeable position to select a security system to meet his needs.

General Information

Status
Historical
Publication Date
09-Mar-1999
Current Stage
Ref Project

Relations

Buy Standard

Guide
ASTM F1448-93a(1999) - Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents
English language
3 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)


NOTICE: This standard has either been superseded and replaced by a new version or withdrawn.
Contact ASTM International (www.astm.org) for the latest information
Designation:F1448–93a (Reapproved 1999)
Standard Guide for
Selection of Security Technology for Protection Against
Counterfeiting, Alteration, Diversion, Duplication,
Simulation, and Substitution (CADDSS) of Products or
Documents
This standard is issued under the fixed designation F 1448; the number immediately following the designation indicates the year of
original adoption or, in the case of revision, the year of last revision. A number in parentheses indicates the year of last reapproval. A
superscript epsilon (e) indicates an editorial change since the last revision or reapproval.
This standard has been approved for use by agencies of the Department of Defense.
INTRODUCTION
Any product or document of value has a high risk level of being counterfeited, altered, diverted,
duplicated, simulated, or substituted (CADDSS). Counterfeiting of brand names, designer clothes,
accessories, jewelry, and intellectual property is presently assessed as a 60-billion-dollar per year
problem worldwide. This dollar figure does not include the losses in the financial community,
including banknotes, stocks and bonds, etc., which are unknown and unreported. Just as counterfeiting
and alteration of documents are severe problems in the financial sector, the counterfeiting, alteration,
diversion, duplication, simulation, and substitution (CADDSS) of products are life threatening when
they relate to aeronautical parts, auto parts, pharmaceuticals, life support equipment, and Department
of Defense material. The problem cannot be eliminated, but it can be controlled by using
anticounterfeiting technology selected to fit the user’s requirements.Acheck list is needed to specify
the user’s requirements for anticounterfeiting technology to control one or all of the above-mentioned
potential fraudulent problems. Whichever technology, or combination of technologies, is used, the
frequency of authentication and the education of personnel or the public using the technology are
vitally important in controlling counterfeiting, alteration, diversion, duplication simulation, and
substitution (CADDSS) of products and documents.
1. Scope not addressed, nor is any technology recommended. There are
many security systems available in the public marketplace
1.1 This guide is intended to assist the user in the selection
today. Each has limitations and must be carefully measured
of anticounterfeiting technology as follows:
against the parameters presented in this guide. Once this
1.1.1 By determining what the user’s requirements are as
careful analysis is done, the user will be in a knowledgeable
related to product or document by completing the user’s
position to select a security system to meet his needs.
specific CADDSS versus parameters matrix, and
1.1.2 By comparing the user’s requirements matrix to a
2. Referenced Documents
security technology feature matrix prepared by a knowledge-
2.1 ASTM Standards:
able person using the CADDSS versus parameters matrix.
F 1156 Terminology Relating to Product Counterfeit Pro-
1.2 This guide does not address or evaluate specific tech-
tection Systems
nologies,butratherprovidesapathwhenutilizingthematrixin
Table 1 that allows proper evaluation of features of technolo-
3. Terminology
gies available for use in the application.
3.1 Definitions—For definitions of terms used in this guide,
1.3 This guide provides a procedure to accomplish the
refer to Terminology F 1156.
proper selection of a security system. Specific technologies are
3.1.1 alteration—the modification of a document or article
with the intent that it will pass as genuine with minimum risk
This guide is under the jurisdiction of ASTM Committee F12 on Security
of detection in circumstances of ordinary use.
Systems and Equipment and is the direct responsibility of Subcommittee F12.60 on
Anti-Counterfeiting Systems.
Current edition approved Dec. 15, 1993. Published February 1994. Originally
published as F 1448 – 93. Last previous edition F 1448 – 93. Annual Book of ASTM Standards, Vol 15.07.
Copyright © ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959, United States.
F1448
TABLE 1 Matrix Checklist for Technology Requirements
Substitution Simulation Duplication Diversion Alteration Counterfeit Parameters
Durable
Impossible to remove and transpose without detection
Only screening required
Validation without tool
Validation with simple field tool
Validation with central (non-field) equipment
Easy to incorporate or apply
Cost effective in view of risk potential
Tamper resistant or evident
Overt security features
Covert security features
Time allowed for authentication
Point of use authentication required
Ease of application in current system
Training to validate required
Simple deterrents required
Traceability required (tracking)
Variable information within security features
Heat-activated laminate required
Pressure-sensitive adhesive required
Special substrates required
Special inks required
One security feature required
Multiple security features required
One-by-one validation
Closure or seal required
Expert verification required
Court evidence required
Unique technology required
Ease of detection of alteration
3.1.2 counterfeit—a reproduction of a document, article, or technologies capable of meeting these requirements. This
security feature that is intended to deceive the close scrutiny of guide provides for the following three steps:
a qualified examiner. 5.1.1 The user develops a detailed matrix analysis (see
3.1.3 diversion—the distribution and sale of legitimate Table 1) to identify specific security requirements.
products through unauthorized dealers. 5.1.2 The user obtains a similar matrix that identifies the
3.1.4 dupli
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.