|
. o! W. s7 f. b% H
- t8 N$ T. H7 u5 L: H | DSH 2951 }& r% f6 u5 z2 G _5 c! h1 t" a
| Object
3 u7 N" f8 o/ t% b; }1 e) P# ~ | 1.2" W8 x" N6 j# ~
| 61010-1(ed.1);am1;am2# m; f" n1 C1 z+ ~/ g$ H
| 4 `, Z1 _9 w$ s- m5 y" ?* I Y
( h+ G* E" A3 Q1 hStandard:
% W2 h' `7 m3 a) Z- U! gIEC 61010-1:1990
& [; Y' T" m* m3 v5 [3 q! I+A1:1992+A2:1995
1 a, W! q# [5 Y: y% L8 mSub clause:
6 V: S L9 D. p6 k, U2 z. e! d7 q1.2
: E8 [+ \- K) I, GSheet n. 295
5 f% u% b w. W N& W, C! q. bPage 1(1)! n/ i) t! H; _% u, j
Subject:
6 O: O4 t* ^% ]' G! f% N) Q" z/ g0 M" aObject
: p7 h, [/ ]0 Q7 QKey words:
) Y8 @6 J1 u: V) d" f0 q* a- Scope" Z% `2 ?/ G" U; o9 q5 ]
- Software Safety9 ^% v' T' A9 x+ t+ t
Decision taken by
1 _8 h# o% R$ w9 `8 iETF3 and confirmed; s' O# R$ H) ]0 k; S
by CTL at its 38th
0 O( z7 W0 M; ?- z( T& j, imeeting, in Toronto
3 b: Q8 b o2 ?8 u6 v2 @2 Y) WQuestion:+ K5 S' @6 w/ z q
If safety is dependent on Software, what criteria do laboratories employ to ensure# M8 w( {/ d4 ^( P: g) k c) P
compliance?* @1 D5 X- U) J* f' l0 z1 w
Decision:
- C9 n( o% I. V1 W; S; z, B1 YSoftware safety is not specifically addressed in IEC 61010-1 at present and therefore, there
: y$ T, ~6 H7 Bare no specific guidelines for this work. A draft collateral standard is in preparation and also
- _! H: L) E) y7 Z0 D/ ]+ xIEC 61508 deals with this topic.6 p3 M( g0 Z) G+ _3 p, u' V# Y
Generally, it is advised that devices should not be dependent on software alone for their s+ C' O" `1 R$ l$ M) _
safety. There should be a separate independent means provided which acts to prevent a7 i0 ~( o5 z6 \% c
dangerous condition arising.$ Z; G# W/ F8 T7 n2 ~: N: v
Explanation:$ s. N& ~+ h/ F% H2 j
Experience shows that the analysis of software systems to ensure their safe operation is very& {0 S* F2 \ R4 Y$ u: V! }& O
difficult and in practice, can only provide a measure of confidence. Additionally, the
5 N3 u3 m P+ N' Jmethods of performing the examination are not widely agreed upon and therefore, subject to
) m$ \; Q! I5 l5 \doubt. In these circumstances, it is preferred to adopt safety limit methods known from6 T7 G3 n' v) b* E! l
experience to be effective.3 ?* i$ m* H# q7 G! }# t
- O6 U" {2 Z8 G8 k! E5 q Q7 D( m1 Q# C/ l, G( \* \, ^. Z7 ~
0 F, J6 x! d9 @0 I, e
|
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有账号?注册安规
x
|