Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents

SIGNIFICANCE AND USE
This guide is the first known attempt to focus on security requirements and compare them to available and known technologies capable of meeting these requirements. This guide provides for the following three steps:
5.1.1 The user develops a detailed matrix analysis (see Table 1) to identify specific security requirements.
5.1.2 The user obtains a similar matrix that identifies the capabilities of available technologies to satisfy specific security requirements. This matrix can be prepared by the user, by a security consultant, or by a technology vendor. If the user desires, the available technologies matrix can be tested and evaluated by a forensic laboratory.
5.1.3 The user compares these two matrices in order to select one or more technologies that most closely accommodates the user’specific security requirements.
SCOPE
1.1 This guide is intended to assist the user in the selection of anticounterfeiting technology as follows:
1.1.1 By determining what the user's requirements are as related to product or document by completing the user's specific CADDSS versus parameters matrix, and
1.1.2 By comparing the user's requirements matrix to a security technology feature matrix prepared by a knowledgeable person using the CADDSS versus parameters matrix.
1.2 This guide does not address or evaluate specific technologies, but rather provides a path when utilizing the matrix in that allows proper evaluation of features of technologies available for use in the application.
1.3 This guide provides a procedure to accomplish the proper selection of a security system. Specific technologies are not addressed, nor is any technology recommended. There are many security systems available in the public marketplace today. Each has limitations and must be carefully measured against the parameters presented in this guide. Once this careful analysis is done, the user will be in a knowledgeable position to select a security system to meet his needs.

General Information

Status
Historical
Publication Date
31-Jan-2006
Current Stage
Ref Project

Relations

Buy Standard

Guide
ASTM F1448-93a(2006) - Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents
English language
3 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)


NOTICE: This standard has either been superseded and replaced by a new version or withdrawn.
Contact ASTM International (www.astm.org) for the latest information
Designation: F1448 − 93a(Reapproved 2006)
Standard Guide for
Selection of Security Technology for Protection Against
Counterfeiting, Alteration, Diversion, Duplication,
Simulation, and Substitution (CADDSS) of Products or
Documents
This standard is issued under the fixed designation F1448; the number immediately following the designation indicates the year of
original adoption or, in the case of revision, the year of last revision. A number in parentheses indicates the year of last reapproval. A
superscript epsilon (´) indicates an editorial change since the last revision or reapproval.
This standard has been approved for use by agencies of the Department of Defense.
INTRODUCTION
Any product or document of value has a high risk level of being counterfeited, altered, diverted,
duplicated, simulated, or substituted (CADDSS). Counterfeiting of brand names, designer clothes,
accessories, jewelry, and intellectual property is presently assessed as a 60-billion-dollar per year
problem worldwide. This dollar figure does not include the losses in the financial community,
including banknotes, stocks and bonds, etc., which are unknown and unreported. Just as counterfeiting
and alteration of documents are severe problems in the financial sector, the counterfeiting, alteration,
diversion, duplication, simulation, and substitution (CADDSS) of products are life threatening when
they relate to aeronautical parts, auto parts, pharmaceuticals, life support equipment, and Department
of Defense material. The problem cannot be eliminated, but it can be controlled by using
anticounterfeiting technology selected to fit the user’s requirements.Acheck list is needed to specify
the user’s requirements for anticounterfeiting technology to control one or all of the above-mentioned
potential fraudulent problems. Whichever technology, or combination of technologies, is used, the
frequency of authentication and the education of personnel or the public using the technology are
vitally important in controlling counterfeiting, alteration, diversion, duplication simulation, and
substitution (CADDSS) of products and documents.
1. Scope 1.3 This guide provides a procedure to accomplish the
proper selection of a security system. Specific technologies are
1.1 This guide is intended to assist the user in the selection
not addressed, nor is any technology recommended. There are
of anticounterfeiting technology as follows:
many security systems available in the public marketplace
1.1.1 By determining what the user’s requirements are as
today. Each has limitations and must be carefully measured
related to product or document by completing the user’s
against the parameters presented in this guide. Once this
specific CADDSS versus parameters matrix, and
careful analysis is done, the user will be in a knowledgeable
1.1.2 By comparing the user’s requirements matrix to a
position to select a security system to meet his needs.
security technology feature matrix prepared by a knowledge-
able person using the CADDSS versus parameters matrix.
2. Referenced Documents
1.2 This guide does not address or evaluate specific
2.1 ASTM Standards:
technologies, but rather provides a path when utilizing the
F1156 Terminology Relating to Product Counterfeit Protec-
matrix in Table 1 that allows proper evaluation of features of
tion Systems (Withdrawn 2001)
technologies available for use in the application.
1 2
This guide is under the jurisdiction of ASTM Committee F12 on Security For referenced ASTM standards, visit the ASTM website, www.astm.org, or
Systems and Equipment and is the direct responsibility of Subcommittee F12.60 on contact ASTM Customer Service at service@astm.org. For Annual Book of ASTM
Controlled Access Security, Search, and Screening Equipment. Standards volume information, refer to the standard’s Document Summary page on
Current edition approved Feb. 1, 2006. Published February 2006. Originally the ASTM website.
approved in 1993. Last previous edition approved in 1999 as F1448 – 93a (1999). The last approved version of this historical standard is referenced on
DOI: 10.1520/F1448-93AR06. www.astm.org.
Copyright © ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959. United States
F1448 − 93a (2006)
TABLE 1 Matrix Checklist for Technology Requirements
Substitution Simulation Duplication Diversion Alteration Counterfeit Parameters
Durable
Impossible to remove and transpose without detection
Only screening required
Validation without tool
Validation with simple field tool
Validation with central (non-field) equipment
Easy to incorporate or apply
Cost effective in view of risk potential
Tamper resistant or evident
Overt security features
Covert security features
Time allowed for authentication
Point of use authentication required
Ease of application in current system
Training to validate required
Simple deterrents required
Traceability required (tracking)
Variable information within security features
Heat-activated laminate required
Pressure-sensitive adhesive required
Special substrates required
Special inks required
One security feature required
Multiple security features required
One-by-one validation
Closure or seal required
Expert verification required
Court evidence required
Unique technology required
Ease of detection of alteration
3. Terminology 4.1.5 Implement technology, and
4.1.6 Institute educational program to use technology effec-
3.1 Definitions—For definitions of terms used in this guide,
tively.
refer to Terminology F1156.
3.1.1 alteration—the modification of a document or article
5. Significance and Use
with the intent that it will pass as genuine with minimum risk
5.1 Thisguideisthefirstknownattempttofocusonsecurity
of detection in circumstances of ordinary use.
requirements and compare them to available and known
3.1.2 counterfeit—a reproduction of a document, article, or
technologies capable of meeting these requirements. This
security feature that
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.