We need your consent to use the individual data so that you can see information about your interests, among other things. Click "OK" to give your consent.
Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents (Includes all amendments And changes 1/28/2013).
Automatically translated name:
Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents
STANDARD published on 1.2.2006
Designation standards: ASTM F1448-93a(2006)
Note: WITHDRAWN
Publication date standards: 1.2.2006
SKU: NS-50338
The number of pages: 3
Approximate weight : 9 g (0.02 lbs)
Country: American technical standard
Category: Technical standards ASTM
Keywords:
CADDSS, counterfeit protection, product protection, security, security analysis, ICS Number Code 03.140 (Patents. Intellectual property)
Significance and Use | ||
This guide is the first known attempt to focus on security requirements and compare them to available and known technologies capable of meeting these requirements. This guide provides for the following three steps: 5.1.1 The user develops a detailed matrix analysis (see Table 1) to identify specific security requirements. 5.1.2 The user obtains a similar matrix that identifies the capabilities of available technologies to satisfy specific security requirements. This matrix can be prepared by the user, by a security consultant, or by a technology vendor. If the user desires, the available technologies matrix can be tested and evaluated by a forensic laboratory. 5.1.3 The user compares these two matrices in order to select one or more technologies that most closely accommodates the user’specific security requirements. |
||
1. Scope | ||
1.1 This guide is intended to assist the user in the selection of anticounterfeiting technology as follows: 1.1.1 By determining what the user's requirements are as related to product or document by completing the user's specific CADDSS versus parameters matrix, and 1.1.2 By comparing the user's requirements matrix to a security technology feature matrix prepared by a knowledgeable person using the CADDSS versus parameters matrix. 1.2 This guide does not address or evaluate specific technologies, but rather provides a path when utilizing the matrix in that allows proper evaluation of features of technologies available for use in the application. 1.3 This guide provides a procedure to accomplish the proper selection of a security system. Specific technologies are not addressed, nor is any technology recommended. There are many security systems available in the public marketplace today. Each has limitations and must be carefully measured against the parameters presented in this guide. Once this careful analysis is done, the user will be in a knowledgeable position to select a security system to meet his needs. |
||
2. Referenced Documents | ||
|
Do you want to make sure you use only the valid technical standards?
We can offer you a solution which will provide you a monthly overview concerning the updating of standards which you use.
Would you like to know more? Look at this page.
Latest update: 2024-05-21 (Number of items: 2 903 041)
© Copyright 2024 NORMSERVIS s.r.o.