Portaria 11 en
Portaria 11 en
Picture 1
Picture 2
1.5. All evidence related to the compliance with the requirements established in this Regulation
shall be provided by the manufacturer.
2. TERMINOLOGY
2.1. Legally relevant
Software/hardware/data that interfere with the requirements regulated by legal metrology,
for example, the measurement’s accuracy, or in the correct functioning of the system.
The national regulatory metrology authority is responsible to specify which
software/hardware/data is considered legally relevant.
2.2. Communication interface
Any type of interface that enables the transfer of information between the components of
the measurement systems (optical, radio, electronics, etc.).
2.3. Authentication
Proof of claimed/alleged identity of a user, process or device.
2.4. Integrity
Guarantee that the data/software/parameters have not been changed during use, repair,
maintenance, transfer or storage without authorization.
2.5. Confidentiality
Guarantee that data/parameters have not been disclosed to unauthorized people, legal
entities or processes during use, repair, maintenance, transfer or storage.
2.6. Availability
Guarantee that the data/software/parameters/system are available to the authorized
processes or legal entities when requested.
2.7. Attack
Any unauthorized action that may compromise the security of the
data/parameters/software/system.
2.8. Download
Automatic software transfer process to the distributed metering system using any
appropriate local or remote means.
2.9. Software identifier
Uniquely assigned readable string to software.
2.10. User interface
Allows for the exchange of information between the human user and the distributed
metering system, or its hardware and software components.
2.11. Validation
Confirmation through analysis and generation of objective evidence that the specific usage
requirements were fully satisfied.
2.12. Hash
Mathematical function that maps values of a block of data into a fixed and reduced
number (hash code), with the following properties:
(i) Changing any bit of a data block implies a different hash code;
(ii) It is not feasible, from a hash code, to return to the original data block;
(iii) It is not feasible to find two blocks that generates the same hash code.
2.13. Digital signature
Code uniquely assigned to a text/data/software file in order to prove its integrity and
authenticity when transmitting or storing. Usually a digital signature is generated in two
steps:
(i) The hash code of the file is initially calculated;
(ii) A private key is used to encode this code.
7. FAILURE SELF-DIAGNOSIS
The software must be able to diagnose a state of malfunctioning.
7.1. Required documentation
a) Description of the fault diagnosis mechanism and when it is invoked;
b) Description of the tests carried out by the manufacturer.
7.2. Backups
There should be a mechanism that provides for periodic copies of legally relevant data,
such as measurement results and the current status of the processes, in order to enable a
subsequent retrieval of the distributed measurement system after a malfunction. This data
must be saved to nonvolatile media.
7.2.1. Technical requirements
The backup frequency must be compatible with the fault diagnosis mechanism.
7.2.2. Required documentation
A description of the data with a copy, a description of the update frequency and the
calculation used to justify this frequency.
9. DYNAMIC BEHAVIOR
Software that is not legally relevant cannot negatively influence the dynamic behavior of a
measurement process. This means that if there is a sharing of processing resources, legally
relevant software must always have the necessary availability for its proper functioning (e.g.:
priority over non-relevant software).
9.1. Technical requirements
a) This requirement applies in addition to the requirements set out in 5.1, 5.2 and 5.3 for
separation of software.
b) This additional requirement ensures that, for real-time meter applications, the dynamic
behavior of legally relevant software is not influenced by legally non-relevant
software, that is, the legally relevant software features cannot be changed in a way not
supported by the non-relevant part.
9.2. Required documentation
a) Description of the interruption hierarchy;
b) Time chart of the software tasks. Execution time limit for legally non-relevant tasks.
10. REQUIREMENTS FOR SOFTWARE VALIDATION
The techniques used for software validation, along with the results of the tests implemented,
should be enumerated. The results of this validation phase are expected to eradicate
predictable errors, such as: extrapolation of input/output limits and division by zero.