|
2 V) P+ U4 y4 D' C
" h. s& c9 w- I& R$ X9 G | DSH 295
/ n+ i- T, O3 |# F | Object
, M4 }, f- X# n | 1.2
+ T7 k/ |. b! e5 F | 61010-1(ed.1);am1;am22 s$ s; l! x3 Y- `' h4 j$ {
|
2 S& k! q2 V8 B( O. U4 d
3 w# M+ O5 W6 V$ MStandard:
$ Y, ]' Y" a* g( H* g3 [' q6 ~IEC 61010-1:1990' W5 ?- J8 C& s% H0 x; d# C
+A1:1992+A2:1995
( k9 N3 ]+ ~- G+ d6 k: A) V6 w1 aSub clause:, @. h: Q& M# x8 t1 e
1.2
6 Q+ K7 f6 X; DSheet n. 295
+ A: K' s% q: @( L# m/ j: F UPage 1(1)
' X ]5 _, z+ P: j4 l }! d! MSubject:% e# s5 W$ T3 n8 r
Object
" ]) |. _( @. E/ Y" X4 x7 f+ _4 O8 pKey words:
8 w: s1 e; j2 R3 E- Scope
1 [2 C, e, n) U6 L$ O- Software Safety
p* |) n& T8 Y# p6 @Decision taken by0 \) w. e* o8 j9 P1 Q
ETF3 and confirmed9 K3 h( r) w; F( O" h( R* Z) _9 i
by CTL at its 38th. ^+ M/ C0 I* C5 V2 P6 t; c4 p
meeting, in Toronto2 Y/ t- X5 S# b% n0 O
Question:
2 d, R3 |! I( b: u3 m$ EIf safety is dependent on Software, what criteria do laboratories employ to ensure. [1 w5 {9 L( K1 B* e
compliance?
0 s! @7 ]: q$ E" J, x# uDecision:
% F! l) f8 a0 [1 P0 BSoftware safety is not specifically addressed in IEC 61010-1 at present and therefore, there1 ~. H% S, Y/ y) e; b: u" j# E* M
are no specific guidelines for this work. A draft collateral standard is in preparation and also2 f$ D2 c: i; v2 s: f L5 ~
IEC 61508 deals with this topic.
" n+ I8 B# P# h2 c# M5 E0 gGenerally, it is advised that devices should not be dependent on software alone for their& _, S" D1 e- }: l
safety. There should be a separate independent means provided which acts to prevent a
% H- L6 s# ~7 v* ldangerous condition arising.
! a. N7 X$ ], J7 g. [% d' R# a X3 OExplanation:
0 l2 Z: M. n" X+ I% t! J8 L( D# O# A2 qExperience shows that the analysis of software systems to ensure their safe operation is very" m5 _1 s' @/ [' f
difficult and in practice, can only provide a measure of confidence. Additionally, the
z; o# B6 Q# Z8 Y; lmethods of performing the examination are not widely agreed upon and therefore, subject to; S- b4 x% r( l/ p- Y
doubt. In these circumstances, it is preferred to adopt safety limit methods known from6 J. N/ _' {- F6 F7 c
experience to be effective./ t* E* ]/ k2 C3 D* z3 z. y6 Z
! ^- F& u4 [3 R" ]8 u3 f8 h" Q' F e5 ~0 w z0 m, p
2 T: |9 [8 Y. O0 B. G
|
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有账号?注册安规
x
|