|
/ \& I) v! x& U8 T1 |
) R' p5 N9 x- b& Y7 B# _1 S | DSH 2958 j( m3 w2 `6 E
| Object; S) Z7 x0 C/ D: I
| 1.2' r0 g3 q! ~" H! _9 j; \
| 61010-1(ed.1);am1;am2
5 K% e1 Q% X4 U: ]* ^' A | $ ]( g& V/ m( j# \- [9 N+ Q
, i* @- y1 ]0 } @6 M
Standard:
% |$ P; r/ E2 v) C; pIEC 61010-1:1990- y2 h, p# c# J" a. q0 T
+A1:1992+A2:19956 i8 z0 d# a9 K4 x& t
Sub clause:! i1 W$ P. _3 @' c( ?
1.2" ~. W; {7 g7 P; k1 F9 _0 s% m
Sheet n. 2953 [9 f* C: c6 r3 ]/ o0 C& ]
Page 1(1)+ F* c. e8 V; _5 u G& o! `
Subject:
1 d8 L8 q, X& [, N6 _4 k, U3 ~Object
! c/ w2 J" m- _* s) l% CKey words:! A5 T" B& g! G- u
- Scope
% f9 r- H% F% u& g# U1 S- Software Safety
+ s* a2 I" z2 K/ z4 vDecision taken by4 ` P% T. T4 s3 @( o+ W8 v
ETF3 and confirmed
9 E" E7 h4 L1 A1 B7 j0 o" yby CTL at its 38th, X% {1 Z( A& r3 |9 V
meeting, in Toronto. W( w' e* K( m5 q$ T& b0 T0 g0 m9 Z7 Z
Question:
' X: Q2 Q ?! j) lIf safety is dependent on Software, what criteria do laboratories employ to ensure3 O2 w4 l3 i3 u
compliance?5 i3 i& c- r9 d: F
Decision:, y4 ~6 E1 G2 _- P3 O2 A3 G0 Y# \
Software safety is not specifically addressed in IEC 61010-1 at present and therefore, there) K4 k1 ]% g& u0 y S- U" U" ~
are no specific guidelines for this work. A draft collateral standard is in preparation and also
* K' m0 v7 m. n7 ]7 XIEC 61508 deals with this topic.
/ p; e: e% F3 ]7 O+ Z) g& nGenerally, it is advised that devices should not be dependent on software alone for their& _6 N% y7 u- c( Z
safety. There should be a separate independent means provided which acts to prevent a
. }/ Y/ I+ Q4 x; Fdangerous condition arising.9 ?2 d! v7 p. y$ P1 C b& D7 l
Explanation:
! V% Y" q3 w+ g3 S: t# jExperience shows that the analysis of software systems to ensure their safe operation is very
# Q8 Q" [: P7 }, w! J7 s6 r: H+ Pdifficult and in practice, can only provide a measure of confidence. Additionally, the/ p9 g) d5 f9 e, N$ {% U
methods of performing the examination are not widely agreed upon and therefore, subject to
0 y$ t7 m" y* d! h0 ?+ ldoubt. In these circumstances, it is preferred to adopt safety limit methods known from0 c+ u1 E! J9 G
experience to be effective.
9 B$ k7 x5 B5 D$ ~3 E
0 K0 `" e& C4 e" k+ O) e* q3 p: p# e
$ S4 c* a( m; i0 K& w9 [! C5 B+ m
|
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有帐号?注册安规
x
|