|
% t3 {, e9 I9 {/ `+ k& g) D
3 r+ e5 j4 D' s7 l+ l* j/ @7 @
| DSH 295! `" W' R" H" O; e, F( C
| Object
, D# A" A+ a4 o( p) h' Q4 f | 1.23 \+ ^5 G) v( c: t& Y) R
| 61010-1(ed.1);am1;am2
: }5 O2 ]4 S9 ?3 ], S6 G1 Q7 H$ Q |
/ ]1 E- c% j, s! E/ ~; P$ e) y3 }
Standard: _8 ]- K# \, `1 c# M2 s
IEC 61010-1:1990' J! y. v1 q5 D0 [4 e* I; C
+A1:1992+A2:1995
; J8 C2 ?* N! K& \' q: F$ qSub clause:- U8 v, x+ x/ L5 k) }7 @
1.2
Y4 Z) n1 g V/ T: x4 [1 VSheet n. 2952 x3 r+ A# k. Q6 f+ e
Page 1(1)
1 P! B7 N6 U) w% ~6 v4 Y& P4 q% NSubject:
% z& {. Y: o5 O# d1 G$ FObject
! D; w/ N5 o! b$ Q. Z; wKey words:
! T0 g* J' d' n& ]. n' p- Scope
: U0 y4 D' ~) ~: t% c% s' Y2 Y1 |# H- Software Safety
0 {( ^# V, q8 h3 K" f$ b# TDecision taken by
! \4 X) e4 R. |! w( TETF3 and confirmed/ O& M/ k p, k0 B- Q3 _) Y+ ]
by CTL at its 38th( |, e- x5 t% `4 k8 H8 q
meeting, in Toronto5 `% y! `% [- q5 b+ Z
Question:
l& p$ }! `" VIf safety is dependent on Software, what criteria do laboratories employ to ensure
6 O4 d, `9 s0 h" ~$ s5 l/ M2 w! m3 Qcompliance?& H! b$ h1 j% Z) H
Decision:
3 A$ F- E+ n/ d( ISoftware safety is not specifically addressed in IEC 61010-1 at present and therefore, there
( i, W, \" G% ]1 Xare no specific guidelines for this work. A draft collateral standard is in preparation and also
; }' a1 D- h7 [7 kIEC 61508 deals with this topic.
7 \! |- i4 y" lGenerally, it is advised that devices should not be dependent on software alone for their
) A+ ^, f4 A8 A/ _/ r M4 H( i7 Lsafety. There should be a separate independent means provided which acts to prevent a
) j0 |2 ?0 B6 Vdangerous condition arising.& `( U- G( {, _8 b. m2 t
Explanation:
* j, P4 \3 W$ r2 K! m X MExperience shows that the analysis of software systems to ensure their safe operation is very
- x" I9 j( R' |3 F& idifficult and in practice, can only provide a measure of confidence. Additionally, the
3 j% \# x% n$ Lmethods of performing the examination are not widely agreed upon and therefore, subject to+ X, _( k% W( t8 U3 b
doubt. In these circumstances, it is preferred to adopt safety limit methods known from
$ k* N. }* i3 E+ G: }" u% bexperience to be effective.0 A9 p# |. [5 v
( @) o7 S0 ~ ^- h1 d1 `! x- j. E" C0 {" {
) [. k3 ]5 s0 u# E# f |
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有帐号?注册安规
x
|