|
8 G' [8 q% G+ T% F1 n
+ B3 [1 K. e3 e6 J5 s3 ?2 j | DSH 295
/ w1 l5 r7 j. h1 z | Object# C6 f* [) I: h' V9 g( r$ [
| 1.2 F: G" l' Z& z- J. ^- `; s
| 61010-1(ed.1);am1;am2
$ W5 R/ x% t! }) t# |8 N |
! c9 m3 M' S F
* k1 d% a- e9 W# lStandard:) U" B; E3 N& G% j
IEC 61010-1:1990: G P5 j3 }1 S3 C' L+ X" c8 v
+A1:1992+A2:1995
; D4 D% w! X5 o. V; y8 A+ e9 cSub clause:0 J% A) h5 C/ b! A- ~
1.2
( H6 _- f: v' QSheet n. 295
* S2 `7 `. k7 L5 \6 W0 PPage 1(1)
7 A8 t0 L5 {8 p7 y8 FSubject:
5 ]! e% r0 u$ }, X$ C2 pObject
+ r* l. Y. a" e- o% F! ?Key words:& q5 @9 t& i. H& h9 e. ]
- Scope
! ^+ Z" }4 i7 T6 P2 J) t o- Software Safety
" f0 K# o8 i5 p0 V+ _1 dDecision taken by
9 e2 p, J2 f8 {3 b7 p1 z: TETF3 and confirmed- w# Q& i4 r# S6 v' J+ x8 g% ?
by CTL at its 38th
& \' |* i7 z/ B; S- w. y: ^meeting, in Toronto
8 ^6 z5 ]! a. r$ K" D6 @Question:
{) w3 U2 F7 R! Z. a) z0 oIf safety is dependent on Software, what criteria do laboratories employ to ensure1 P% T8 ?2 I" n
compliance?
0 T' f' Y* B. K1 ?# ~: [& N6 ?0 bDecision:
* ~4 V& f8 D/ X8 L+ d$ {Software safety is not specifically addressed in IEC 61010-1 at present and therefore, there7 D7 _& y4 s' K3 F7 K! D; I; E
are no specific guidelines for this work. A draft collateral standard is in preparation and also
! L+ y& g6 s- N' q% xIEC 61508 deals with this topic.
% K( N/ b/ R" _ S8 N3 ~Generally, it is advised that devices should not be dependent on software alone for their3 M) k6 b) }( E: u- k' j2 L
safety. There should be a separate independent means provided which acts to prevent a, b% V! b5 o6 f2 I& A
dangerous condition arising.
- ]4 C, m# G" [8 {/ ~Explanation:
0 W, Z1 ^$ O# q0 T7 u# uExperience shows that the analysis of software systems to ensure their safe operation is very
) _. a$ z' z& I" ]difficult and in practice, can only provide a measure of confidence. Additionally, the# U. p& B( w) A4 e
methods of performing the examination are not widely agreed upon and therefore, subject to
% ]8 a; U {% U$ L( Jdoubt. In these circumstances, it is preferred to adopt safety limit methods known from
3 i; b4 R, V" ^7 ?0 b }% k( [experience to be effective.
( ~( a( v* V0 r
7 F% Y# \7 d }$ a+ b
& T9 F0 B6 D9 c+ W3 |
) q7 N9 Y! z4 k# T2 H |
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有帐号?注册安规
x
|