|
/ X1 J. @) K- m( v! u, C* j" @/ H$ l
| DSH 2952 |6 ?1 k2 K% I1 G& o1 X
| Object. a0 R7 g6 o# q( M4 ^- |" ~4 v0 d
| 1.2
# a: ]5 S7 _, ?+ A) s. m: H | 61010-1(ed.1);am1;am2( g# L/ S& Y" R2 O* g: [: s
|
4 q# M% J! z0 ]6 j6 T
( `3 E# e1 s, Z- b2 q* NStandard:9 v9 K7 q$ h; J( Z) e5 b
IEC 61010-1:1990. C: v& U E$ A. |2 Y; G+ H2 F6 L
+A1:1992+A2:1995& m! G- x& M( r! I$ `, l
Sub clause:) ]" m0 j$ K: L$ o5 n9 B" ?
1.2
( R% o- M0 O* z" }* sSheet n. 295
" h2 A, O7 T7 y5 Z7 APage 1(1)& m9 `$ Z) N g0 m- O: [
Subject:% I! n7 {0 _2 Y5 q+ k2 }( \; b- e) N
Object( w" x4 X8 y; l3 Q
Key words:
( d2 q8 r$ |* |6 t w( [. k& ?- Scope
! `0 y+ V5 t; H& ?3 D- f$ @- Software Safety
0 k+ o4 `+ ~6 J8 O! C* jDecision taken by# j* C: E2 k) g# [4 O& d$ f
ETF3 and confirmed1 y" K- ^& z) i$ O4 `5 i$ J
by CTL at its 38th1 c/ t5 G4 ~1 P- P
meeting, in Toronto# U0 I( n! v9 l7 W
Question:
# H- r$ c8 F# A: C5 _) i( mIf safety is dependent on Software, what criteria do laboratories employ to ensure
0 V5 v) R" ~# Icompliance?
/ ^/ r0 D K" }; W) [1 ADecision:: V- c# u3 H8 U- L3 ?) H
Software safety is not specifically addressed in IEC 61010-1 at present and therefore, there) r5 x/ R% T) a0 L. i3 j2 ~* I
are no specific guidelines for this work. A draft collateral standard is in preparation and also
( C3 A' _8 l$ W" \) \IEC 61508 deals with this topic.5 r$ m4 m3 H0 T' K* e/ v4 G
Generally, it is advised that devices should not be dependent on software alone for their
* A9 I! j! X& d9 t! |. x8 d" tsafety. There should be a separate independent means provided which acts to prevent a/ J6 M/ C* ]' [4 u, r
dangerous condition arising.
9 S1 m. J. `5 m( w) f: O) AExplanation:
, R: {+ B* {- oExperience shows that the analysis of software systems to ensure their safe operation is very
# O3 f2 e' K0 y' S: }9 b7 Xdifficult and in practice, can only provide a measure of confidence. Additionally, the! a7 m, ~8 f2 l& e5 p& t# I }# ?
methods of performing the examination are not widely agreed upon and therefore, subject to: s! v: Y% v# E( z6 S
doubt. In these circumstances, it is preferred to adopt safety limit methods known from
# \' Z" O) x" m. l- vexperience to be effective.* a6 K* y N: K' R. V* f
+ U( D5 e2 T/ _# m! o
1 j/ E' {/ N" M& d9 r
* d5 Z8 J+ Q% d" ^
|
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有帐号?注册安规
x
|