This guide is the first known attempt to focus on security requirements and compare them to available and known technologies capable of meeting these requirements. This guide provides for the following three steps:
5.1.1 The user develops a detailed matrix analysis (see Table 1) to identify specific security requirements.
5.1.2 The user obtains a similar matrix that identifies the capabilities of available technologies to satisfy specific security requirements. This matrix can be prepared by the user, by a security consultant, or by a technology vendor. If the user desires, the available technologies matrix can be tested and evaluated by a forensic laboratory.
5.1.3 The user compares these two matrices in order to select one or more technologies that most closely accommodates the user’specific security requirements.
Область применения1.1 This guide is intended to assist the user in the selection of anticounterfeiting technology as follows:
1.1.1 By determining what the user's requirements are as related to product or document by completing the user's specific CADDSS versus parameters matrix, and
1.1.2 By comparing the user's requirements matrix to a security technology feature matrix prepared by a knowledgeable person using the CADDSS versus parameters matrix.
1.2 This guide does not address or evaluate specific technologies, but rather provides a path when utilizing the matrix in that allows proper evaluation of features of technologies available for use in the application.
1.3 This guide provides a procedure to accomplish the proper selection of a security system. Specific technologies are not addressed, nor is any technology recommended. There are many security systems available in the public marketplace today. Each has limitations and must be carefully measured against the parameters presented in this guide. Once this careful analysis is done, the user will be in a knowledgeable position to select a security system to meet his needs.