分享
ASTM_F_1448_-_12.pdf
下载文档

ID:188174

大小:76.16KB

页数:4页

格式:PDF

时间:2023-03-04

收藏 分享赚钱
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,汇文网负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
网站客服:3074922707
TM_F_1448_ _12
Designation:F144812Standard Guide forSelection of Security Technology for Protection AgainstCounterfeiting,Alteration,Diversion,Duplication,Simulation,and Substitution(CADDSS)of Products orDocuments1This standard is issued under the fixed designation F1448;the number immediately following the designation indicates the year oforiginal adoption or,in the case of revision,the year of last revision.A number in parentheses indicates the year of last reapproval.Asuperscript epsilon()indicates an editorial change since the last revision or reapproval.INTRODUCTIONAny product or document of value has a risk of being counterfeited,altered,diverted,duplicated,simulated,or substituted(CADDSS).The greater the value of the object or item,the greater is thelikelihood of CADDSS.Counterfeiting of brand names,designer clothes,accessories,jewelry,andintellectual property was assessed in 2006 as a 60-billion-dollar per year problem worldwide.Thisdollar figure does not include the losses in the financial community,including banknotes,stocks andbonds,etc.,the losses of which are unknown and unreported.Just as counterfeiting and alteration ofdocuments are severe problems in the financial sector,the counterfeiting,alteration,diversion,duplication,simulation,and substitution(CADDSS)of products are life threatening when they relateto aeronautical parts,auto parts,pharmaceuticals,life support equipment,and Department of Defensematerial.The problem cannot be eliminated,but it can be controlled by using anticounterfeitingtechnology selected to fit the users requirements.The purpose of this document is to provide an overarching guide to protect against CADDSS.Therefore,it is expected that additional standards will be generated that are more specific to a givenproduct,such as clothing,music and videos(and other data-centric products),medicine,currency,official documentation,vehicles,etc.To protect against CADDSS,several steps have to be taken,which include but are not limited to:(1)identification of the CADDSS sensitive product,(2)documenting the nature,magnitude of likelihood,and magnitude of impact of different CADDSS onthe product,(3)list the possible anti-CADDSS solutions available to address the documentedCADDSS strategies,and(4)develop a strength and weakness analysis for each of the applicableanti-CADDSS solutions.Whichever technology,or combination of technologies,is used,thefrequency of authentication and the education of personnel or the public using the technology arevitally important in controlling counterfeiting,alteration,diversion,duplication simulation,andsubstitution(CADDSS)of products and documents.1.Scope1.1 This general guide is intended to assist the user of theguide in selecting anti-CADDSS technologies to protect theirproduct from CADDSS.1.2 This guide does not address or evaluate specific anti-CADDSS technologies,but rather suggests a path that assistsin the objective evaluation of features of anti-CADDSS tech-nologies available protection of their product from CADDSS.1.3 This guide provides a procedure to accomplish theproper selection of a security system.Specific technologies arenot addressed,nor are any technologies recommended.Thereare many security systems available in the public marketplacetoday.Each has limitations and must be carefully measuredagainst the parameters presented in this guide.Once thiscareful analysis is done,the user will be in a knowledgeableposition to select a security system to meet his needs.2.Terminology2.1 Definitions:1This guide is under the jurisdiction of ASTM Committee F12 on SecuritySystems and Equipment and is the direct responsibility of Subcommittee F12.60 onControlled Access Security,Search,and Screening Equipment.Current edition approved Dec.1,2012.Published January 2013.Originallyapproved in 1993.Last previous edition approved in 2006 as F1448 93a(2006).DOI:10.1520/F1448-12.Copyright ASTM International,100 Barr Harbor Drive,PO Box C700,West Conshohocken,PA 19428-2959.United States1 2.1.1 alterationthe modification of an object or item thatis not the genuine object or time with the intent that it will passas the genuine object or item.2.1.2 counterfeita reproduction of a genuine object oritem or security feature thereof so that the reproduction canpass as genuine after detailed inspection by a qualified exam-iner.2.1.3 diversionthe distribution and sale of a genuineobjects or items through unauthorized dealers,often resultingin tax evasion.2.1.4 duplicationthe reproduction of a genuine object oritem so that reproduction generally looks like the genuineobject or item.2.1.5 simulationthe imitation of article genuine object oritem,or features thereof,including similar security features.2.1.6 substitutionthe act of putting or using one object oritem in place of the genuine object or item.2.2 In all cases,it is assumed the object or item generated byCADDSS is(1)of lesser quality and cost than the genuineobject or item or(2)intended to deceive the party in possessionof the CADDSS

此文档下载收益归作者所有

下载文档
你可能关注的文档
收起
展开