Shopping Cart

No products in the cart.

BS ISO 22383:2020

$167.15

Security and resilience. Authenticity, integrity and trust for products and documents. Guidelines for the selection and performance evaluation of authentication solutions for material goods

Published By Publication Date Number of Pages
BSI 2020 36
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weā€™re here to assist you 24/7.
Email:[email protected]

This document gives guidelines for performance criteria and an evaluation methodology for authentication solutions that aim to unambiguously establish material good authenticity and integrity throughout an entire material goodā€™s life cycle. It focuses on the authentication of a material good and, if appropriate, its components, parts and related data:

  • covered by intellectual property rights;

  • covered by relevant international, regional or national regulations;

  • with counterfeiting-related implications;

  • otherwise with a distinctive identity.

This document is applicable to all types and sizes of organizations that require the ability to validate the authenticity and integrity of material goods. It will help organizations to determine the categories of authentication elements they need in order to combat counterfeiting-related risks, and the criteria for selecting authentication elements, after having undertaken a counterfeiting risk assessment.

Authentication solutions can be used in areas such as anti-counterfeiting, prevention of product fraud and prevention of diversion.

This document does not specify economic criteria aiming to correlate performance and costs of the authentication solutions.

PDF Catalog

PDF Pages PDF Title
2 National foreword
6 Foreword
7 Introduction
11 1 Scope
2 Normative references
3 Terms and definitions
13 4 Principles
4.1 General
14 4.2 Security-by-design process for authentication solutions
15 4.3 Categorization of authentication solutions
4.3.1 General
16 4.3.2 Provision of knowledge
4.3.3 Sourcing and production of authentication elements and tools
4.3.4 Inspection
17 4.3.5 Categories of authentication elements
18 5 Performance criteria specification based on risk analysis
5.1 General
19 5.2 Risk analysis elements
5.3 Performance criteria categories
5.4 Criteria for selection of authentication elements
5.4.1 Physical characteristics
20 5.4.2 Attack resistance
21 5.4.3 Integration process
22 5.5 Attack-resistance criteria for selection of authentication tools
5.5.1 General
5.5.2 Obsolescence
5.5.3 Assessment of vulnerability and resistance of authentication tools
5.6 Criteria for selection of authentication elements and tools
23 5.7 Criteria for selection of authentication solutions
5.7.1 Location/environment for authentication process
5.7.2 Authentication parameters
5.7.3 Life cycle criteria
5.7.4 Security policy
24 5.7.5 Compliance with regulations, security practices and quality procedures
5.7.6 Operation
5.7.7 Ability to evaluate the performance of the authentication solution
25 6 Effectiveness assessment of authentication solutions
6.1 General
6.2 Definition of effectiveness assessment protocols
27 6.3 Effectiveness assessment in manufacturing of authentication elements
6.4 Effectiveness of delivery of authentication elements
6.5 Effectiveness of application of authentication elements
6.6 Data management
28 6.7 Effectiveness measurement in normal verification/authentication situations
6.8 Effectiveness assessment in emergency verification/authentication situations
6.9 Impact of verification results and corrective actions
29 Annex A (informative) Assessment grid
34 Annex B (informative) Control means access table
35 Bibliography
BS ISO 22383:2020
$167.15