Standard Historical Last Updated: Jan 28, 2013 Track Document
ASTM F1448-93a(2006)

Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents

Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents F1448-93AR06 ASTM|F1448-93AR06|en-US Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents Standard new BOS Vol. 15.08 Committee F12
$ 66.00 In stock

Significance and Use

This guide is the first known attempt to focus on security requirements and compare them to available and known technologies capable of meeting these requirements. This guide provides for the following three steps:

5.1.1 The user develops a detailed matrix analysis (see Table 1) to identify specific security requirements.

5.1.2 The user obtains a similar matrix that identifies the capabilities of available technologies to satisfy specific security requirements. This matrix can be prepared by the user, by a security consultant, or by a technology vendor. If the user desires, the available technologies matrix can be tested and evaluated by a forensic laboratory.

5.1.3 The user compares these two matrices in order to select one or more technologies that most closely accommodates the user’specific security requirements.

Scope

1.1 This guide is intended to assist the user in the selection of anticounterfeiting technology as follows:

1.1.1 By determining what the user's requirements are as related to product or document by completing the user's specific CADDSS versus parameters matrix, and

1.1.2 By comparing the user's requirements matrix to a security technology feature matrix prepared by a knowledgeable person using the CADDSS versus parameters matrix.

1.2 This guide does not address or evaluate specific technologies, but rather provides a path when utilizing the matrix in that allows proper evaluation of features of technologies available for use in the application.

1.3 This guide provides a procedure to accomplish the proper selection of a security system. Specific technologies are not addressed, nor is any technology recommended. There are many security systems available in the public marketplace today. Each has limitations and must be carefully measured against the parameters presented in this guide. Once this careful analysis is done, the user will be in a knowledgeable position to select a security system to meet his needs.

Price:
Contact Sales
Related
Reprints and Permissions
Reprints and copyright permissions can be requested through the
Copyright Clearance Center
Details
Book of Standards Volume: 15.08
Developed by Subcommittee: F12.60
Pages: 3
DOI: 10.1520/F1448-93AR06
ICS Code: 03.140