Skip to content
12 · Onboarding · Aircraft

Onboarding Aircraft

Andi Lamprecht Andi Lamprecht ·· 8 min read· Draft
Lifecycle event. Aircraft onboarding has two halves: factory provisioning (when the airframe is built) and platform onboarding (when an operator first connects the airframe to ATOMx). Together they establish the cryptographic ground truth against which every future authorization is checked. The substrate model is in Aircraft Hardware Identity; the runtime mechanics are in Flight Lifecycle §1.

1. Factory Provisioning (at the OEM line)

Every aircraft ships with a hardware secure element — a dedicated tamper-resistant chip that holds cryptographic keys and performs signing on-chip. At the manufacturing line, the secure element:

  • Generates its own keypair on first boot; the private key never leaves the chip
  • Receives the ATOMx Root public key as an immutable trust anchor
  • Receives its identity certificate signed by the manufacturer’s intermediate CA
  • Has its TPM NV storage locked (EK Cert under WRITE_ONCE, Drone Assembly Cert under WRITE_LOCKED)
    sequenceDiagram
    autonumber
    participant SE as Aircraft Secure Element
    participant Line as OEM Manufacturing Line
    participant HSMo as OEM HSM
    participant ATOMx
    Line->>SE: Power on, initiate provisioning
    SE->>SE: Generate keypair on-chip
    SE->>Line: CSR (public key + airframe serial + hardware attestation)
    Line->>HSMo: Forward CSR
    HSMo->>HSMo: Sign with Manufacturer Intermediate CA
    HSMo-->>Line: Aircraft Identity Certificate
    Line->>SE: Install certificate + ATOMx Root public key + lock NV storage
    Line->>ATOMx: Signed batch attestation (serials, firmware, attestation hashes)
    ATOMx-->>Line: Registry entry: "manufactured, unassigned"
  

After provisioning, the aircraft’s lifecycle state in ATOMx is Manufactured, unassigned. It cannot fly yet — it has not been bound to an operator, and the platform has not performed its own attestation challenge.

2. Platform Onboarding (first connection)

The first time the aircraft connects to the platform — typically through the operator’s mobile app via the OEM controller (see Disconnected Operations §3.1) — the platform runs the TPM attestation challenge. This is documented in full in Flight Lifecycle §1. In summary:

  1. Platform sends a nonce challenge.
  2. Drone TPM responds with EK Certificate, AK Certificate request, and PCR Quote.
  3. Platform verifies EK chain to TPM manufacturer Root, issues AK Certificate.
  4. Drone presents Drone Assembly Certificate; platform verifies chain to OEM Root and the EK cross-reference.
  5. Platform records the security posture as the ground-truth registration record.

The result is the JSON registration record in Flight Lifecycle §1.3. This record is the ground truth against which all future authorization requests for this aircraft are evaluated. It is cryptographically established at onboarding, not self-reported by the pilot.

3. Aircraft Lifecycle States

#StateEntered ByWhat It Allows
1ManufacturedOEM batch attestation submittedSit in inventory; no operator yet
2RegisteredOperator binds airframe serial to its orgBe assigned to pilots
3Pilot-AssignedOperator grants a pilot operating rightsReceive flight plans submitted by that pilot
4Connected-ReadyAircraft has performed a recent routine check-in (revocation list, time anchor, trust anchors all current)Receive Authorization Packages
5Authorized-for-FlightAuthorization Package issued and capsule loadedTake off
6FlyingAircraft is airborneBroadcast identity + telemetry; conform to approved operation
7ReconciledAircraft has landed and uploaded its signed flight logReturn to Connected-Ready
RevokedAircraft certificate revoked (loss, theft, decommission, security event)Nothing; cannot be re-authorized
    flowchart LR
    M(Manufactured) --> R(Registered)
    R --> P(Pilot-Assigned)
    P --> C(Connected-Ready)
    C --> A(Authorized-for-Flight)
    A --> F(Flying)
    F --> Re(Reconciled)
    Re --> C
    C --> X([Revoked])
    classDef active fill:#eef3ff,stroke:#1f6feb
    classDef terminal fill:#ffe1e1,stroke:#b91c1c
    class M,R,P,C,A,F,Re active
    class X terminal
  

4. Registration to an Operator

When an operator acquires the aircraft, they submit proof of ownership (or an OEM-signed transfer record) to ATOMx. ATOMx records a signed binding from the airframe serial to the operator’s org cert. State advances to Registered. This is also when the platform-side attestation challenge typically runs, if it has not already.

5. Pilot Assignment

A pilot under the operator’s org may be granted operating rights to specific airframes. The binding is recorded server-side; the aircraft itself does not need to know which pilot will fly it next, only that an Authorization Package presented at flight time is signed for an enrolled pilot under its bound operator.

6. Re-Attestation and Lifecycle Events

6.1 Re-Attestation Cadence

The TPM attestation challenge in §2 is not a one-shot event. ATOMx requires re-attestation:

TriggerEffect
Routine check-in (typically daily, or before each flight session)Aircraft presents a fresh PCR Quote; ATOMx confirms PCRs match the current OEM-published baseline for the running firmware version
Firmware updateNew PCR baseline rolls forward — see Aircraft Hardware Identity §9.3
Trust-anchor refreshUpdated Manufacturer CA list pulled into aircraft’s signed reference store
Time-anchor freshnessFresh signed time anchor delivered; if stale, aircraft enters time-degraded state

An aircraft that has not completed a routine check-in within the configured window cannot enter Connected-Ready state and therefore cannot receive new Authorization Packages.

6.2 Re-Onboarding Triggers

Full re-onboarding (Phase 0 from scratch) is required when:

  • TPM hardware is replaced (rare; see Aircraft Hardware Identity §9.4)
  • Mainboard is replaced (most RMA cases)
  • Whole airframe is replaced
  • Cryptographic chain validation fails irrecoverably (tamper response triggered, secure-element fault)
  • Aircraft is transferred between operator orgs across a registry boundary that requires fresh attestation

6.3 Loss, Theft, Decommissioning

EventPath
Reported lostOperator marks aircraft as Suspect; flights paused; recoverable to active state if recovered
Reported stolenAircraft certificate Revoked; CRL update; aircraft cannot fly under any operator
End-of-life decommissioningOperator submits decommission request; aircraft Revoked with reason; record retained for audit; can be donated to a museum but cannot be re-registered
RMA / repairSee §6.2 — usually requires re-onboarding

6.4 Fleet Onboarding (Bulk Path)

For operators bringing tens or hundreds of aircraft online at once, ATOMx supports a bulk onboarding API that accepts a signed batch manifest from the operator referencing pre-validated aircraft serials and their corresponding OEM batch-attestation records. Each aircraft still completes its own TPM attestation challenge on first connection, but operator-side workflow (operator binding, pilot pre-assignment, default policy) is applied in one pass.

Bulk onboarding does not skip the per-aircraft cryptographic ceremony; it streamlines the operator-side ledger entries that surround it.

6.5 Transfer Between Operators

A transfer between operators is not a simple ownership rebinding — it produces an audit-significant event:

  1. Selling operator submits transfer record signed by an authorized operator user
  2. Buying operator countersigns
  3. ATOMx records the transfer; aircraft state moves to Manufactured, unassigned if a fresh attestation is required, or directly to Registered under the new operator if the current attestation is fresh and the buying operator’s risk policy accepts a warm transfer
  4. Pilot assignments under the previous operator are revoked
  5. Outstanding authorizations are revoked or completed

Leasing is a special case of transfer with a defined return event; the lessor remains the regulatory owner of record.

7. The Fallback for BYOD or Non-TPM Aircraft

When an OEM lacks a TPM or the customer is bringing legacy hardware, ATOMx supports an encrypted-vault fallback: a non-root encrypted vault inside a read-only Docker container. The trust tier degrades from L5 (hardware-anchored) to L4 (software-anchored). Liability for key protection shifts to the customer. See Origins and Decisions §3.13.

8. Cross-References

Implementation Readiness — Open Questions

Each entry below identifies a decision not yet locked. Items marked (ADR) should be formalized as an Architecture Decision Record before implementation begins. Items marked (blocking) must be resolved before the relevant feature can be built.

#QuestionOwnerADR?Blocking?
1TPM attestation challenge wire format — exact protocol (TPM2_Quote payload framing, nonce length, signature algorithm, transport envelope, error codes). Needed for OEM SDK interop.Engineering + OEM-externalYes — ADR: Platform TPM Attestation Challenge Wire ProtocolYes
2Re-attestation cadence default — daily routine check-in vs per-flight quote vs hybrid (daily anchor + per-session freshness token). What window length defines “fresh” per trust tier (L5 vs L4)?Product + EngineeringYes — ADR: Re-Attestation Cadence and Freshness WindowsYes
3Freshness-check failure modes — which conditions degrade Connected-Ready → blocked (stale PCR Quote, stale time anchor, stale CRL, stale trust anchors), and what user-facing remediation path applies in each case.Product + EngineeringYes — ADR: Freshness Failure Taxonomy and RemediationYes
4PCR baseline storage — where the OEM-published PCR baselines live in the registry, how they are signed, version-pinned per firmware build, and how the platform looks them up at quote-verification time.Engineering + OEM-externalYes — ADR: PCR Baseline Registry Schema and SigningYes
5OTA firmware roll-forward protocol — exact sequence for baseline rotation: new PCR baseline pre-publish window, dual-baseline acceptance period, rollback handling, mid-update attestation behavior.Engineering + OEM-externalYes — ADR: OTA Firmware Roll-Forward and PCR Baseline RotationNo
6RMA detection mechanism — how the platform recognizes that a TPM, mainboard, or airframe has been swapped (EK Cert mismatch, Drone Assembly Cert change, OEM-signed RMA record) and which signal authoritatively triggers re-onboarding.Engineering + OEM-externalYes — ADR: RMA Detection and Re-Onboarding TriggersNo
7Fleet bulk-onboarding API contract — request/response schema for the signed batch manifest, idempotency keys, partial-failure semantics, rate limits, and how per-aircraft attestation status is reported back asynchronously.Engineering + ProductYes — ADR: Fleet Bulk Onboarding APINo
8Transfer-between-operators — legal workflow (bill of sale, regulatory owner-of-record handoff, ITAR/export considerations) vs technical workflow (countersigned transfer record, attestation refresh policy). Who signs what, and which steps gate the state transition.Legal + ProductYes — ADR: Operator-to-Operator Transfer WorkflowYes
9Leasing semantics in the registry — how lessor (regulatory owner) and lessee (operator) are represented, lease-term enforcement, automatic return event, sublease rules, revocation rights during the lease.Legal + ProductYes — ADR: Leasing and Dual-Party Aircraft RegistrationNo
10Secure-element mid-flight failure — behavior when the SE faults or fails an in-flight self-test (e.g., during long BVLOS): does the aircraft RTL, continue under degraded trust, or terminate; how is the post-flight reconciliation handled.Engineering + ProductYes — ADR: Secure-Element Runtime Failure ResponseYes
11Encrypted-vault fallback security parameters — KDF choice, key-rotation cadence, vault unlock UX, container hardening posture, audit logging, and the precise capability gap between L4 vault and L5 hardware tiers.Engineering + ProductYes — ADR: Encrypted-Vault Fallback Security ProfileNo
Last updated on