|
( E- \1 f% q5 \. R. M/ v+ R; J: [5 X, K6 u0 R9 o0 x: |% c
| DSH 295
: a) v3 ?5 l4 y6 m7 P | Object
- t1 |0 d% I5 I | 1.22 J1 Z3 Z2 Y- k0 v
| 61010-1(ed.1);am1;am2" K' G& I4 ]- x
|
1 A; p L8 t ?1 N. w) e0 ?+ ?0 K! h$ |, F3 n
Standard:
9 o2 P3 T) j$ z* S5 e- ?. S- @IEC 61010-1:1990
$ B2 O4 t! x( p* G0 k) j0 @+A1:1992+A2:1995
. Q" f! x1 d/ u& J) @Sub clause:
. K6 E1 ]# l( p1 y3 T. J, H0 [" G1.2$ R1 L2 c( Q: X! H8 I8 X) a# [
Sheet n. 295! B1 E' @" d/ y' `, R# h% w
Page 1(1)0 T5 |) P0 Y# O- z- t2 C6 M- w
Subject:% t' V5 y1 P; C; @* t
Object
. {! R5 e, [$ s1 @9 h# f cKey words:) N1 a- e" Y( i. m8 v
- Scope( b5 j- T- W/ c% ]- ?
- Software Safety
3 s" q& ~% ~9 \+ z2 b/ Z$ gDecision taken by6 Z. D/ i9 C6 |
ETF3 and confirmed
- I+ _5 V" C) g3 B8 vby CTL at its 38th9 @' M v8 n" P/ d9 M/ O
meeting, in Toronto
' P: d/ v, M- M: aQuestion:
, _4 J# g5 B: X, p. E d( [If safety is dependent on Software, what criteria do laboratories employ to ensure/ U& b, Y! M5 Y0 h
compliance?
- ]3 R5 w! B% K) K: X1 a1 O+ r& A8 O0 IDecision:
/ Z4 E! n* s* V: x H$ b; ~Software safety is not specifically addressed in IEC 61010-1 at present and therefore, there, _+ z9 A6 g# Z V1 U
are no specific guidelines for this work. A draft collateral standard is in preparation and also
/ h7 t, W, M5 L2 M. n8 V/ U# |IEC 61508 deals with this topic.
8 |$ ]5 q, }: p0 @2 {1 [9 _8 `/ Q+ B6 d2 NGenerally, it is advised that devices should not be dependent on software alone for their* z+ R+ j0 {) f
safety. There should be a separate independent means provided which acts to prevent a; ]/ D, R" F0 P) |: L
dangerous condition arising.
: j& }; u2 [. tExplanation:
7 w* A7 S* \ nExperience shows that the analysis of software systems to ensure their safe operation is very! D5 m1 P2 m2 o
difficult and in practice, can only provide a measure of confidence. Additionally, the
7 f2 h4 {6 s0 }0 j0 t# T) Kmethods of performing the examination are not widely agreed upon and therefore, subject to h/ y& P4 ^# a2 S
doubt. In these circumstances, it is preferred to adopt safety limit methods known from* R Z6 {' Q f
experience to be effective.
8 J% t, i5 n3 K+ }3 l+ `6 j7 n1 @) j; B- V+ _7 f
5 b+ t6 i* `0 T' P$ ^. I) n. r
# I l% C6 j" z2 B! X" z0 y; V |
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有帐号?注册安规
x
|