Skip to main content
QMSQMS
QMS
  • Welcome to your QMS
  • Quality Manual
  • Procedures
  • Records
  • Legit.Health Plus Version 1.1.0.0
    • Index
    • Overview and Device Description
    • Information provided by the Manufacturer
    • Design and Manufacturing Information
    • GSPR
    • Benefit-Risk Analysis and Risk Management
    • Product Verification and Validation
      • Software
        • Test plans
        • Test runs
        • R-TF-012-033 Software Tests Plan
        • R-TF-012-023 Software Development Plan
        • EN 62304 Checklist
        • EN 82304 Checklist
        • R-TF-012-029 Software Architecture Description
        • R-TF-012-034 Software Test Description
        • R-TF-012-035 Software Test Report
        • R-TF-012-038 Verified Version Release
        • Design History File
      • Artificial Intelligence
      • Cybersecurity
      • Usability and Human Factors Engineering
      • Clinical
      • Commissioning
    • Post-Market Surveillance
  • Legit.Health Plus Version 1.1.0.1
  • Licenses and accreditations
  • Applicable Standards and Regulations
  • Grants
  • Pricing
  • Public tenders
  • Legit.Health Plus Version 1.1.0.0
  • Product Verification and Validation
  • Software
  • R-TF-012-029 Software Architecture Description

R-TF-012-029 Software Architecture Description

Document Information​

FieldValue
Product Name
Version
Prepared By
Prepared Date
Reviewed By
Review Date
Approved By
Approval Date
Related SRS Document

1. Introduction​

1.1 Purpose​

This document describes the software architecture for the medical device software, including the high-level structure, key software components, interfaces, and design decisions. The architecture provides the framework for implementing the software requirements specified in the Software Requirements Specification (SRS).

1.2 Scope​

This architecture description covers:

  • High-level software architecture and system decomposition
  • Software elements and their responsibilities
  • Interfaces between software elements and external systems
  • SOUP (Software of Unknown Provenance) components
  • Data flow and control flow
  • Architectural decisions and rationale

1.3 References​

ReferenceTitleVersion
R-TF-012-023Software Development Plan
R-TF-012-028Software Requirements Specification
R-TF-012-019SOUPs
R-TF-013-002Risk Management Record

2. Architectural Overview​

2.1 System Context​

[Describe the system context, including external systems, users, and interfaces]

2.2 Architectural Style​

[Describe the architectural style/pattern used: microservices, layered, event-driven, etc.]

2.3 High-Level Architecture​

[Provide a high-level architecture diagram showing major software elements]

3. Software Elements​

3.1 Software Element Decomposition​

Software ElementDescriptionResponsibilitiesInterfaces

3.2 Software Element Details​

3.2.1 [Element Name]​

Description: [Detailed description of the software element]

Responsibilities:

  • [Responsibility 1]
  • [Responsibility 2]

Inputs: [Data inputs]

Outputs: [Data outputs]

Interfaces: [Description of interfaces with other elements]

SOUP Dependencies: [List any SOUP components used]

4. Interfaces​

4.1 Internal Interfaces​

4.1.1 Interface Between [Element A] and [Element B]​

AttributeDescription
Interface TypeAPI / Message Queue / Database / etc.
ProtocolREST / gRPC / AMQP / etc.
Data FormatJSON / XML / Binary / etc.
Error Handling[Description]

Interface Definition: [Provide detailed interface specification, including methods, parameters, return values]

4.2 External Interfaces​

4.2.1 User Interface​

[Description of user interface, including screens, workflows, and user interactions]

4.2.2 Hardware Interfaces​

[If applicable, describe interfaces with hardware components]

4.2.3 Software Interfaces​

External SystemPurposeInterface TypeProtocolData Format

4.2.4 Communication Interfaces​

[Describe network communication, APIs, web services]

5. Data Architecture​

5.1 Data Model​

[Describe the data model, including entities, relationships, and key attributes]

5.2 Data Flow​

[Describe how data flows through the system]

5.3 Data Storage​

Data TypeStorage LocationRetention PeriodBackup Strategy

5.4 Data Security​

[Describe data encryption, access control, and security measures]

6. SOUP (Software of Unknown Provenance)​

6.1 SOUP Components​

SOUP NameVersionPurposeFunctional RequirementsHardware/Software Requirements

For detailed SOUP documentation, see SOUP Directory.

6.2 SOUP Risk Analysis​

[Reference to risk analysis for SOUP components]

7. Risk Control Measures​

7.1 Segregation for Risk Control​

[If applicable for Class C software, describe segregation necessary for risk control]

7.2 Software Elements Contributing to Hazardous Situations​

Software ElementPotential HazardRisk Control MeasureVerification Method

For detailed risk analysis, see R-TF-013-002 Risk Management Record.

8. Architectural Decisions​

8.1 Key Architectural Decisions​

Decision IDDecisionRationaleAlternatives ConsideredTrade-offs
AD-001

8.2 Technology Stack​

LayerTechnologyVersionJustification
Frontend
Backend
Database
Infrastructure

9. Non-Functional Requirements​

9.1 Performance​

[Describe performance requirements and how the architecture addresses them]

9.2 Scalability​

[Describe scalability considerations]

9.3 Security​

[Describe security architecture and measures]

9.4 Reliability and Availability​

[Describe reliability and availability considerations]

9.5 Maintainability​

[Describe how the architecture supports maintenance and evolution]

10. Architecture Verification​

10.1 Verification Activities​

Verification ActivityMethodResultReference
Consistency with requirementsReview☐ Pass ☐ Fail
Implementation feasibilityReview☐ Pass ☐ Fail
Maintainability assessmentReview☐ Pass ☐ Fail
Security reviewReview☐ Pass ☐ Fail

10.2 Architecture Review Results​

[Document the results of architecture verification activities]

11. Traceability​

11.1 Requirements to Architecture Elements​

Requirement IDRequirement DescriptionArchitecture Element(s)

For the traceability matrix template, see T-012-043.

12. Deployment Architecture​

12.1 Deployment Environment​

[Describe the deployment environment: cloud, on-premise, hybrid]

12.2 Deployment Diagram​

12.3 Infrastructure Requirements​

ComponentSpecificationQuantityPurpose

Approvals​

RoleNameSignatureDate
Prepared By (JD-007)
Reviewed By (JD-003)
Approved By (JD-001)

End of Software Architecture Description

Previous
EN 82304 Checklist
Next
R-TF-012-034 Software Test Description
  • Document Information
  • 1. Introduction
    • 1.1 Purpose
    • 1.2 Scope
    • 1.3 References
  • 2. Architectural Overview
    • 2.1 System Context
    • 2.2 Architectural Style
    • 2.3 High-Level Architecture
  • 3. Software Elements
    • 3.1 Software Element Decomposition
    • 3.2 Software Element Details
      • 3.2.1 [Element Name]
  • 4. Interfaces
    • 4.1 Internal Interfaces
      • 4.1.1 Interface Between [Element A] and [Element B]
    • 4.2 External Interfaces
      • 4.2.1 User Interface
      • 4.2.2 Hardware Interfaces
      • 4.2.3 Software Interfaces
      • 4.2.4 Communication Interfaces
  • 5. Data Architecture
    • 5.1 Data Model
    • 5.2 Data Flow
    • 5.3 Data Storage
    • 5.4 Data Security
  • 6. SOUP (Software of Unknown Provenance)
    • 6.1 SOUP Components
    • 6.2 SOUP Risk Analysis
  • 7. Risk Control Measures
    • 7.1 Segregation for Risk Control
    • 7.2 Software Elements Contributing to Hazardous Situations
  • 8. Architectural Decisions
    • 8.1 Key Architectural Decisions
    • 8.2 Technology Stack
  • 9. Non-Functional Requirements
    • 9.1 Performance
    • 9.2 Scalability
    • 9.3 Security
    • 9.4 Reliability and Availability
    • 9.5 Maintainability
  • 10. Architecture Verification
    • 10.1 Verification Activities
    • 10.2 Architecture Review Results
  • 11. Traceability
    • 11.1 Requirements to Architecture Elements
  • 12. Deployment Architecture
    • 12.1 Deployment Environment
    • 12.2 Deployment Diagram
    • 12.3 Infrastructure Requirements
  • Approvals
All the information contained in this QMS is confidential. The recipient agrees not to transmit or reproduce the information, neither by himself nor by third parties, through whichever means, without obtaining the prior written permission of Legit.Health (AI LABS GROUP S.L.)