Logo

ASTM F1448-93a(2006)

Current Reaffirmation

Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents

$73.00

$73.00

$131.40


Sub Total (1 Item(s))

$ 0.00

Estimated Shipping

$ 0.00

Total (Pre-Tax)

$ 0.00


...

1.1 This guide is intended to assist the user in the selection of anticounterfeiting technology as follows:

1.1.1 By determining what the user's requirements are as related to product or document by completing the user's specific CADDSS versus parameters matrix, and

1.1.2 By comparing the user's requirements matrix to a security technology feature matrix prepared by a knowledgeable person using the CADDSS versus parameters matrix.

1.2 This guide does not address or evaluate specific technologies, but rather provides a path when utilizing the matrix in that allows proper evaluation of features of technologies available for use in the application.

1.3 This guide provides a procedure to accomplish the proper selection of a security system. Specific technologies are not addressed, nor is any technology recommended. There are many security systems available in the public marketplace today. Each has limitations and must be carefully measured against the parameters presented in this guide. Once this careful analysis is done, the user will be in a knowledgeable position to select a security system to meet his needs.


This guide is the first known attempt to focus on security requirements and compare them to available and known technologies capable of meeting these requirements. This guide provides for the following three steps:

5.1.1 The user develops a detailed matrix analysis (see Table 1) to identify specific security requirements.

5.1.2 The user obtains a similar matrix that identifies the capabilities of available technologies to satisfy specific security requirements. This matrix can be prepared by the user, by a security consultant, or by a technology vendor. If the user desires, the available technologies matrix can be tested and evaluated by a forensic laboratory.

5.1.3 The user compares these two matrices in order to select one or more technologies that most closely accommodates the user’specific security requirements.

SDO ASTM: ASTM International
Document Number F1448
Publication Date Feb. 1, 2006
Language en - English
Page Count 3
Revision Level 93a(2006)
Supercedes
Committee F12.60
Publish Date Document Id Type View
Oct. 1, 2024 F1448-24 Revision
Oct. 1, 2016 F1448-16 Revision
Dec. 1, 2012 F1448-12 Revision
Feb. 1, 2006 F1448-93AR06 Reaffirmation
March 10, 1999 F1448-93AR99 Reaffirmation