WO2013013243A1 - Avionics gateway interface, systems and methods - Google Patents

Avionics gateway interface, systems and methods Download PDF

Info

Publication number
WO2013013243A1
WO2013013243A1 PCT/US2012/047874 US2012047874W WO2013013243A1 WO 2013013243 A1 WO2013013243 A1 WO 2013013243A1 US 2012047874 W US2012047874 W US 2012047874W WO 2013013243 A1 WO2013013243 A1 WO 2013013243A1
Authority
WO
WIPO (PCT)
Prior art keywords
certified
faa
certified device
data
gateway
Prior art date
Application number
PCT/US2012/047874
Other languages
French (fr)
Inventor
John Uczekaj
Brad Hayden
Peter Lyons
CONSTANTINOS KYRIAKOS (Gus)
Joseph LYLE
Original Assignee
John Uczekaj
Brad Hayden
Peter Lyons
Kyriakos Constantinos Gus
Lyle Joseph
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by John Uczekaj, Brad Hayden, Peter Lyons, Kyriakos Constantinos Gus, Lyle Joseph filed Critical John Uczekaj
Priority to BR112014001567A priority Critical patent/BR112014001567A2/en
Priority to CN201280045734.0A priority patent/CN104115087B/en
Priority to US14/119,966 priority patent/US9141830B2/en
Priority to EP12814808.7A priority patent/EP2734905B1/en
Publication of WO2013013243A1 publication Critical patent/WO2013013243A1/en
Priority to US14/458,680 priority patent/US9189655B2/en
Priority to US14/942,505 priority patent/US9800665B2/en
Priority to US15/685,201 priority patent/US11496566B2/en
Priority to US17/982,433 priority patent/US20230179658A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/18502Airborne stations
    • H04B7/18506Communications with or from aircraft, i.e. aeronautical mobile service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Definitions

  • the present general inventive concept relates to gateway interface systems and methods for avionics devices. More particularly the inventive concept relates to methods and systems to interface communications between FAA-certified and non- certified devices, systems, and equipment.
  • FAR 23.131 1 (b) is a regulatory requirement that requires, among other things, redundant backup instruments in the cockpit.
  • an "FAA-certified device” may include any and all avionics devices, systems, and equipment that comply with FAA regulations and are approved for in-flight use. Approval may be secured via a Technical Standard Order (TSO), Type Certificate (TC), Supplemental Type Certificate (STC), or other similar processes and procedures.
  • TSO Technical Standard Order
  • TC Type Certificate
  • STC Supplemental Type Certificate
  • FAA- certified devices include (but are not limited to) Multi-function Flight Displays (“MFD”) such as the Evolution Flight Display (“EFD”) available from ASPEN AVIONICS, the KSN 770 available from HONEYWELL BENDIX/KING, and the GNS 430/530 available from GARM IN.
  • MFD Multi-function Flight Displays
  • EFD Evolution Flight Display
  • KSN 770 available from HONEYWELL BENDIX/KING
  • GNS 430/530 available from GARM IN.
  • non-certified device may include any mobile electronics communications device. Examples of non-certified devices include (but are not limited to) cell phones, smart phones, BLACKBERRY mobile
  • IPADs IPADs
  • IPODs IPODs
  • IPHONEs laptops
  • tablet PCs tablet PCs
  • non-certified mobile devices and many software applications have become quite popular and commonly available in recent times.
  • the FAA strictly regulates interconnectivity of flight systems to ensure certain minimum standards of flight safety. Unfortunately, because the vast majority of popular mobile communications devices are non-certified devices, the devices and their convenient software applications are unavailable for direct interfacing with FAA- certified devices without compromising the integrity, reliability, and certification of the FAA-certified devices.
  • the present general inventive concept provides a platform (gateway or interface) to enable two-way communications between non-certified devices and FAA-certified devices.
  • One object of the general inventive concept is to seamlessly integrate non-certified devices with FAA-certified avionics devices without interfering
  • Another object of the general inventive concept is to provide wireless connectivity (e.g., a mobile hotspot) for non-certified devices within the cockpit.
  • Another object of the general inventive concept is to provide an electronics communication interface system that is sufficiently robust as to be highly customizable by end-users, and also largely compatible with numerous FAA-certified and non-certified devices and systems, whether currently-in-use or yet-to-be- developed.
  • the gateway interfaces with FAA-certified devices without interfering with any functionality of the FAA-certified devices.
  • Preferred embodiments of hardware interfaces include pre-determined specifications and software interfaces include a set of Application Programming Interface ("API") rules and specifications that guide interaction with the gateway, on both the non-certified end as well as the FAA-certified end.
  • API Application Programming Interface
  • the gateway enables communication between the FAA-certified devices and non-certified devices with both a hardware component and a software component. If instructions are sent to the FAA-certified device via the gateway that may impact any functionality of the FAA-certified device, the instruction does not take effect on the FAA-certified device unless and until a user acknowledges and confirms the instructions via an FAA-certified device. The confirmation of the instructions ensures that the user-acknowledged data or instructions are validated to be received accurately by the using FAA-certified device and the user informed of the status of the validation. In this manner, no activities of the non-certified device or the gateway can interfere with the functionality of the FAA-certified device absent a confirmation or acknowledgment from the FAA- certified device.
  • the gateway as a hardware component, is certified by the FAA as non-interfering with critical systems.
  • the hardware is enclosed in a small box that is blind-mounted in the aircraft as a separate, stand-alone component from the non- certified devices and FAA-certified devices that it integrates together.
  • the feature- rich hardware component contains wireless, Bluetooth and USB connectivity options as well as flash memory storage. It also includes commercially available technology such as standard protocol ports and communications slots that will allow other third party companies to interface peripheral hardware as needed to enhance the utility of their own applications.
  • the gateway of the instant invention will be a hardware and/or a software component that is integrated into a FAA-certified device, such as the EFD available from ASPEN AVION ICS.
  • Non-certified devices allow users to interface with an aircraft's FAA-certified devices via the gateway. Some of these apps allow a user to upload and/or or modify flight planning data on his or her non-certified device and then synchronize this data with the aircraft's navigation and other FAA-certified devices via the gateway. Some of these apps allow a user to manage the aircraft logbook, maintenance records, and/or operational statistics on his or her non-certified device via the gateway.
  • the gateway provides wireless telecommunications connectivity for non-certified devices.
  • the wireless connectivity is provided via a WiFi network (e.g., 802.1 1 a/b/g/n), 3G/4G mobile telecommunications network, iridium satellite telecommunications network, BLUETOOTH, or similar.
  • the gateway provides wired connectivity to non-certified devices.
  • the wired connectivity is provided via USB, Ethernet, or similar.
  • FIGURE 1 is an exemplary embodiment of the general inventive concept where a mobile application is operated on a non-certified device in wireless communication with a gateway which is then in hardwire communication with FAA- certified devices such as multi-function flight displays (via Ethernet) and/or navigation equipment (via ARINC429 or RS232).
  • FAA- certified devices such as multi-function flight displays (via Ethernet) and/or navigation equipment (via ARINC429 or RS232).
  • FIGURE 2 is the end-to-end flight experience employing non-certified devices enabled by a gateway of the general inventive concept.
  • FIGURE 3 is an exemplary embodiment of the general inventive concept where a gateway is used in the cockpit of an aircraft allowing a pilot to coordinate tasks performed on non-certified devices before and after flight with tasks performed during flight on non-certified devices and interfacing with FAA-certified devices.
  • FIGURE 4 is a detailed view of the gateway shown in FIGURE 3.
  • FIGURE 5 is another exemplary embodiment of a gateway of the present general inventive concept.
  • FIGURE 6 is an embodiment of a gateway of the present general inventive concept with a single Ethernet port.
  • FIGURE 7 is a detailed view of an Ethernet connectivity option of a gateway of the present general inventive concept where a switch is added to the gateway to provide additional Ethernet ports.
  • FIGURE 8 is an embodiment of a gateway of the present general inventive concept configured to include three Ethernet ports.
  • FIGURE 9 is a flow chart showing how a flight planning software application interfaces between a non-certified device and an FAA-certified device via a gateway of the present general inventive concept.
  • FIGURE 10 is a flow chart showing how a flight planning service application functions on a gateway of the present general inventive concept.
  • FIGURE 1 1 is a flow chart showing how a flight control/radio tuning software application interfaces between a non-certified device and an FAA-certified device via a gateway of the present general inventive concept.
  • FIGURE 12 is a flow chart showing how a radio tuning software service application functions on a gateway of the present general inventive concept.
  • FIGURE 13 is a flow chart showing how a flight log book software application interfaces between a non-certified device and an FAA-certified device via a gateway of the present general inventive concept.
  • FIGURE 14 is a flow chart showing one exemplary embodiment of secured access protocols for communication between a non-certified mobile computing device and a wireless gateway in a system of the present general inventive concept.
  • FIGURE 15 shows an exemplary embodiment of a system of the present general inventive concept.
  • This general inventive concept provides an electronic gateway interface module designed to provide telecommunications connectivity between cockpit avionics and mobile devices (i.e., between FAA-certified and non-certified devices).
  • a general inventive concept is described, in detail, in co-pending U.S. Provisional Patent Application Serial No. 61 /674,340, filed July 21 , 2012, the entire disclosure of which is incorporated herein by reference.
  • the gateway provides a hardwire telecommunications link to FAA-certified devices, such as ASPEN'S EFD, via an Ethernet interface, or such as a navigation system, via an ARINC429 (RS-232) connection.
  • FAA-certified devices such as ASPEN'S EFD
  • Ethernet interface or such as a navigation system
  • ARINC429 RS-232
  • the gateway provides a wireless link to non-certified devices via WiFi (IEEE 802.1 1 a/b/g/n).
  • the gateway acts as a wireless access point providing a connection point between wireless mobile devices and avionics equipment.
  • the gateway utilizes standard security protocols and/or security certification programs developed to secure wireless computer networks, such as WPA, WPA2, WEP, etc.
  • the gateway may be a standalone device or part of FAA-certified device including software used in that FAA-certified device to provide gateway functionality as defined herein.
  • the gateway is designed to operate with a pre-defined Application
  • API Programming Interface
  • Third-party software developers use the API specifications to develop apps for mobile devices (i.e., non-certified devices) that access data and functions on avionics equipment (i.e., FAA-certified devices) that are connected to the gateway.
  • mobile devices i.e., non-certified devices
  • FAA-certified devices avionics equipment
  • the gateway is connected to ASPEN'S EFD
  • navigation and communications device data are accessible via the EFD.
  • multiple FAA-certified devices are connected to and accessible via the gateway.
  • the methods used to acknowledge, confirm and validate are not limited to being resident in ASPEN'S EFD.
  • the methods, hardware and/or software can be included as part of any FAA- certified device that operates as the FAA-certified interface
  • the gateway when used in combination with third-party non-certified devices and existing and yet-to-be-developed third-party software applications, allows users to streamline the end-to-end flight experience. With the gateway, users can more efficiently coordinate and synchronize efforts on-the-ground before and after flights.
  • the gateway allows users to use information necessary for flight and collected during flight as well as analytics available between flights.
  • a pilot uses non-certified devices to accomplish tasks such as check the latest weather developments, plan a flight, finalize a flight route, file and obtain clearance, prepare and update charts and flight databases, plan for destination logistics, notify others of upcoming flight, confirm pilot and aircraft airworthiness, confirm aircraft availability, and plan for passenger comfort.
  • a pilot uses non-certified devices to interface with FAA-certified devices,
  • a pilot uses non-certified devices to accomplish tasks such as close the flight plan, flight log entry, notify others of arrival, arrange for ground transportation, review flight and debrief, and report any incidents.
  • a pilot uses non-certified devices and information gathered from avionics devices to accomplish tasks such as review flight trends, share experience, analyze data, maintain aircraft, maintain and enhance skills, maintain pilot status, and critique instructor.
  • the general inventive concept also includes a security key feature.
  • the security key feature provides an option for a subscription arrangement in using the gateway. If a user cancels the subscription, then that user's specific security key is deactivated and that user can no longer access the gateway.
  • the security key feature is specific to each app (e.g., the app developer is issued the security key for a specific app). In other embodiments, the security key feature is specific to each user (e.g., each mobile device is issued a unique security key regardless of what apps are used by that device). If an app developer creates an app that somehow damages or improperly interferes with the gateway or an FAA-certified device, the relevant security keys are deactivated and the problematic app and/or user can no longer interface with the gateway. Thus, even if the developer published a pirate app online, it does not function for any user thanks to this security key feature.
  • a gateway of an embodiment the present general inventive concept is installed in the cockpit of an aircraft and interfaces with FAA- certified devices.
  • the gateway provides a wireless access point within the cockpit of the aircraft such that non-certified devices can access and communicate with FAA- certified devices of the aircraft.
  • the gateway provides a wired (e.g., USB) connection for non-certified devices.
  • the pilot performs certain tasks before flight, after flight, and between flights on a non-certified device.
  • the pilot uses a non-certified device to access information and functions of the FAA-certified devices that interface with the gateway.
  • the gateway complies with DO-160E environmental conditions requirements.
  • the gateway meets the requirements under a non-interference mode.
  • the gateway will not interfere with avionics equipment, but may be susceptible to interference from other devices.
  • the gateway is not certified as a critical device.
  • the gateway is a non-essential, non-critical hardware and software component that should not cause interference to the aircraft but whose function may be degraded by noise or environmental conditions.
  • Those skilled in the art will recognize that other configurations and alternative embodiments are equally viable where the software and/or hardware are fully certified by the FAA.
  • the gateway includes a communication module that provides in-aircraft telecommunications connectivity.
  • in-aircraft telecommunications connectivity is WiFi, 3G/4G cellular, Iridium satellite, or USB.
  • the gateway is connected to a power supply.
  • the power supply may be self contained within the gateway (e.g., battery operated), connected to any aircraft power supply system (including an FAA-certified device), or both (one or the other with backup for redundancy).
  • the gateway includes a processor and memory storage, with optional additional external memory interface (e.g., a memory card).
  • the gateway includes several available interface options for connectivity to FAA-certified devices.
  • the gateway connects directly to ASPEN'S EFD multi-function flight display or other similar device via an Ethernet connection.
  • other FAA-certified devices are connected to the EFD or other similar device and are thus accessible via the gateway-EFD (or other similar device) connection.
  • some additional FAA-certified devices such as communication and navigation devices, are optionally directly connected to the gateway via Ethernet , ARINC429 (RS232), or other media interface.
  • the gateway module is based on the PARROT FC6100 processing platform.
  • the FC6100 provides the system processor and
  • the FC6100 is hosted by a custom motherboard designed to provide power to the FC6100, connectors to interface to other modules, and external antennas for the BLUETOOTH and WiFi radios.
  • Figure 5 shows a block diagram of the gateway hardware. Optional items are not required to support the basic functionality, but would provide a more flexible hardware solution allowing for application growth in the future.
  • the gateway includes a PARROT FC6100 processor chip.
  • the gateway includes a MARVELL radio-frequency integrated circuit.
  • the gateway includes a power supply to provide power to the processor, the USB connections, and the Ethernet connections.
  • the gateway includes connections for USB, SPI (SR232), APPLE I2C chip for iPOD/iPHONE port, audio ports (Line In: 2 mic and 2 stereo / Line Out: audio panel), digital audio ports, external memory card slots (SD x2), visual display (LCD / touchscreen), and camera (infrared and/or visible camera).
  • one of the two USB ports connects to an Ethernet adapter with USB hub to provide multiple Ethernet connection ports and additional USB ports. These multiple Ethernet ports connect to ASPEN'S EFD and/or other FAA-certified devices.
  • the additional USB ports are used for software updates, iPOD/iPAD interface, additional external memory devices, digital media players, 3G/4G cellular network, and/or Iridium Satellite phone connections.
  • the gateway provides an access point to a wireless network via WiFi and/or BLUETOOTH.
  • the gateway includes two SD card slots for internal data storage.
  • the purpose of the primary card is to store Android OS, user applications, and application data.
  • the purpose of the secondary card is to store application data, flight logs, data recorder, information, and entertainment media.
  • the gateway includes a connection to standard avionics audio panels. This feature is used to support multimedia applications.
  • the gateway streams media from connected mobile devices, a local SD card, or from Bluetooth connected devices.
  • a microphone input is used for voice controlled
  • the gateway includes an ARINC 429 interface to allow the gateway to be installed in aircraft without an ASPEN EFD, allowing the gateway to interface directly with legacy avionics equipment, such as air data, inertial, navigation, flight control, or other similar aircraft computing systems.
  • Figure 6 shows an embodiment of a gateway of the present general inventive concept with a single Ethernet port.
  • Figure 7 shows a detailed view of an Ethernet connectivity option of a gateway of the present general inventive concept where a switch is added to the gateway to provide additional Ethernet ports.
  • Figure 8 shows an embodiment of a gateway of the present general inventive concept configured to include three Ethernet ports.
  • an EFD or other similar device includes multiple screen configurations that are certified screens (on a certified device, displaying certified data, in a certified format).
  • the EFD or other similar device further includes an additional non-certified screen.
  • the non-certified screen displays information from the app off of the non-certified device.
  • the additional non-certified screen is uncertified. It includes uncertified controls in order to control the uncertified display.
  • the flight planning application allows a pilot to perform standard flight planning activities on an application running on a non-certified device.
  • the flight plan is synchronized with the connected Navigation device (i.e., FAA-certified). If the pilot desires to make further updates, he or she does so directly on the Navigation device (FAA-certified) or through the mobile application (non-certified). All changes are continuously synchronized in real time between the mobile application and the Navigation unit through the gateway.
  • FAA-certified Navigation device
  • non-certified mobile application
  • a flow chart showing how a flight planning software application interfaces between a non-certified device and an FAA-certified device via a gateway of the present general inventive concept is provided.
  • a pilot creates or updates a flight plan on a mobile, non-certified device.
  • the non- certified device is connected to the gateway.
  • the non-certified device connects to the gateway wirelessly, via WiFi or BlueTooth, however, a hardwire USB connection or other connection is possible.
  • the software application sends a request to the gateway indicating a new (or updated) flight plan (this can be initiated automatically by the software application, or manually by input from the pilot).
  • a software/firmware application (or service) on the gateway processes the planned update request from the non-certified device and forwards the request to the FAA-certified device (e.g., ASPEN'S EFD or other similar device).
  • the FAA-certified device e.g., ASPEN'S EFD or other similar device
  • receives the new or updated flight plan from the gateway Before any changes take effect, the FAA-certified devices requests user acknowledgement and confirmation. Only after acknowledgement is received on an FAA-certified device is the Navigation system updated with the new or updated flight plan.
  • the navigation system is updated with the new or updated flight plan.
  • the EFD or other similar device is updated with plan changes and appropriate flags and indicators are set.
  • the EFD or other similar device provides flight plan updates to the gateway.
  • the gateway processes the flight plan updates from the EFD or other similar device and communicates with the mobile application to update the flight plan on the non-certified device. In this manner, a flight plan is synchronized on both non-certified devices and FAA-certified devices, before and during flight.
  • the step of acknowledgement on the FAA-certified device maintains the certified status of the FAA-certified equipment.
  • the non-certified device does not interfere with any of the FAA-certified devices.
  • the non-certified device is not allowed to make any changes or adjustments to any FAA-certified device other than to present data to be previewed and acted upon by the pilot.
  • the acknowledgement on the FAA-certified device allows changes to information or functionality of the FAA- certified device, not anything received directly from any non-certified device. It will be appreciated that in various embodiments of the inventive concept
  • information/data will flow from the non-certified device (e.g. an iPad) to the FAA- certified (e.g. EFD or other similar device) in various manners.
  • information/data is uploaded from the non-certified device to the gateway and stored in a memory device in the gateway until the pilot acknowledges the request. At that point, when acknowledgement is made/completed, the information is uploaded from the gateway into the FAA-certified device.
  • multiple copies of the information are kept on any or all of the FAA- certified device, the non-certified device and the gateway and are "synced" together periodically to keep all copies current.
  • information/data from the non-certified device is stored on the gateway and small packets of data are released in increments to the FAA-certified device from the gateway post- acknowledgement as such data is needed by the FAA-certified device.
  • the gateway (or a software application/service on the gateway) pushes the request for acknowledgement to the FAA-certified device.
  • the gateway pushes the information/data to the FAA-certified device, and upon receipt of such new information/data, the FAA-certified device generates the request for acknowledgement before accepting said data.
  • the new information/data may be stored in a temporary memory location in the FAA-certified device until acknowledgement is completed.
  • the flight planner service will facilitate the coordination of flight plans between the Navigation unit and the mobile application.
  • the gateway will act as a conduit for Navigation flight plans. This service will act much like a web server responding to client pull requests from a mobile application. Requests will
  • the gateway service converts, if necessary, from a format used to communicate with the mobile app to the EFD format.
  • the flight planner service must verify the integrity of the new flight plan before sending to the EFD/Navigation unit.
  • the gateway may poll the EFD and cache results to allow for timely responses to mobile app requests. Referring to Figure 10, a flow chart showing how the gateway flight planner service functions is shown.
  • the flight control application provides control over the communications equipment. This functionality may optionally also be combined with the flight planning application but preferably is separate.
  • the flight control application allows the pilot to tune the radio to the appropriate frequencies via the gateway.
  • FIG. 1 1 a flow chart showing how a flight control/radio tuning software application of one embodiment of the instant inventive concept interfaces between a non-certified device and an FAA-certified device via a gateway of the present general inventive concept is shown.
  • a pilot tunes or selects a radio frequency using a software application on a non-certified device (this can be done in real time on the non-certified device, or alternatively may have been predetermined during the pilots preflight planning on the non-certified device and then initiated automatically by the software application based upon location or some other predetermined flight status criteria).
  • the application connects the non-certified device to the gateway to request a radio frequency change.
  • the gateway processes the radio frequency tuner change request and connects to the EFD or other similar device (FAA-certified device).
  • the EFD or other similar device receives the radio frequency tuner change request and requests user acknowledgement via an FAA- certified device (e.g., the EFD or other similar device). Only after the pilot confirms the radio tuner frequency change on the EFD or other similar device is the radio frequency changed to the new frequency.
  • the gateway then communicates directly with the radio to change the frequency.
  • the EFD or other similar device provides an update to the gateway and the gateway updates the non- certified device.
  • the EFD or other similar device communicates with the radio (a "downstream" device to the EFD) to change the
  • the gateway pushes the selected radio frequency to a "standby" frequency control of the radio, which is activated (or, from a broad perspective, "acknowledged) by the pilot/user by selecting/operating a control on the radio user interface that activates the standby frequency.
  • a mobile application will provide an interface for selecting radio frequencies.
  • the application will issue a radio frequency change request to the gateway, which will in turn send a packet to the EFD or other similar device with the radio tuning message.
  • the EFD or other similar device will command the Navigation radio through an ARINC 429 or RS-232 serial bus.
  • the gateway will respond to the application that the request was completed by the EFD or other similar device.
  • the application also has the ability to query the current active radio frequency from the Navigation radio unit. Referring to Figure 12, a flow chart showing how a radio tuning software service application functions on a gateway of the present general inventive concept is provided.
  • the acknowledgement does not occur through the EFD or other similar device for radio tuning. Instead, the frequency is automatically pushed to the "standby" window of the radio's Nav/Com. The pilot acknowledges the frequency by activating the frequency on the radio from "standby" to "active".
  • the frequency is automatically pushed to the "standby" window of the radio's Nav/Com.
  • the pilot acknowledges the frequency by activating the frequency on the radio from "standby" to "active".
  • a flow chart showing how a flight log book software application interfaces between a non-certified device and an FAA-certified device via a gateway of the present general inventive concept is provided.
  • a pilot initiates logging via a software application on a non-certified device (this can be done in real time on the non-certified device, or alternatively may have been predetermined during the pilot's preflight planning on the non-certified device and
  • the logging app records pilot hours and aircraft performance data.
  • the application sends a request to the gateway to initiate logging.
  • the gateway processes the request and requests aircraft and/or engine status from the EFD or other similar device.
  • the EFD or other similar device receives the request and seeks confirmation from the pilot on the EFD (FAA-certified device). Only after receiving pilot acknowledgement on the EFD does the EFD provide aircraft and/or engine status (or other information to be logged) to the gateway.
  • the gateway stores the log information on an external memory card or forwards it on to the non-certified device for storage.
  • the method includes a method for implementing client authentication protocols with a mobile web server of a gateway device of an embodiment of the invention.
  • the method allows for client authentication with a mobile web server of a gateway that does not have its own internet connection.
  • the system is comprised of three computing nodes: a) a license server issuing license keys to client devices; b) a client device (mobile computing device, tablet, smart phone, etc.) accessing data resources within a mobile server; and c) a mobile web server authenticating and servicing client requests for data.
  • the mobile web server authenticates the client without having access to a certificate authority.
  • the mobile webserver is a component of the gateway, which is connected to a FAA-certified device.
  • the connection between the gateway and the FAA-certified device is a hard wired Ethernet connection; however it will be appreciated that other embodiments utilize a wireless connection.
  • the client device (or devices) is connected to the mobile server via a wireless connection. Nevertheless, it will be appreciated that other embodiments utilize a wired connection.
  • the mobile web server prevents client devices (e.g. non-certified mobile computing devices) from accessing any functionality of the gateway if the mobile server has not authenticated the client device.
  • client devices e.g. non-certified mobile computing devices
  • mobile devices that are not authenticated are only prevented from accessing data resources of the mobile server, such as communicating with (i.e. accessing data from, reading from, writing to and/or transmitting to) FAA-certified
  • a client device that has not been authenticated is permitted to network (assuming the device has been authenticated through any other security protocols for connecting to the gateway - such as WPA or WPA2 SSID and password if the network connection is a wireless connection) with other non-authenticated mobile devices (e.g. as in a typical computer network) and/or with an Internet connection that is connected to the gateway (if the gateway is so connected).
  • the gateway may function as network router between non-authenticated mobile devices (such as those used by aircraft passengers) and entertainment or other non-FAA certified data resources, while at the same time functioning as a platform for two-way communication between authenticated non-certified devices and FAA certified devices/resources.
  • the method includes generating an encrypted license key for a mobile server in operable data connection with said FAA-certified device.
  • An encrypted license key is generated for each mobile server device.
  • the key is a hash of something specific to the mobile server device (Serial Number, MAC address, etc.).
  • the algorithm for generating the key can remain proprietary to the gateway manufacturer and need not be shared with the general public.
  • the algorithm for generating the license key is known only to the mobile server (i.e. stored in memory of the mobile server) and the license server.
  • the client device does not decrypt the key.
  • the algorithm for decrypting the key is not held within the client device application code, preventing the algorithm from being reverse engineered from the binary.
  • the license key is hosted on a license server.
  • the client device connects to the license server (via an Internet connection or other suitable data connection) and downloads the key from the license server after providing authorization credentials (Account information, SN, MAC address, etc., from the purchased mobile device server documentation) to the license server.
  • a client app on the client device downloads the key and stores it within cache on the mobile device.
  • the connection between the client device and license server is encrypted with SSL or another suitable method to preserve the integrity of the key.
  • the client device establishes a
  • connection with the mobile server requests access to certain targeted data resources.
  • the license key is issued with each request or is cached for each session.
  • the network session is encrypted with SSL or another method to preserve the integrity of the license key as it is passed from the client to mobile server. If the network connection is wireless, the channel is encrypted.
  • the mobile server decrypts and validates the key before authorizing access.
  • the general inventive concept provides a system for transmitting and receiving aircraft data communications between cockpit avionics and mobile devices (i.e., between FAA-certified and non-certified devices).
  • the system includes an FAA-certified device that provides AHRS, ADC, navigation, communication or flight plan data.
  • the FAA-certified device is configured to restrict receiving data from non-certified devices such that non-certified devices do not interfere with normal operation of the FAA-certified device.
  • the system also includes at least one non-certified mobile computing device that is configured to send and receive data.
  • the system includes a display that is configured to display data that is targeted to be received by the FAA-certified device from the non-certified mobile computing device.
  • the display is a piece of hardware that allows user inputs as a confirmation so that the pilot can accept or reject the targeted data prior to loading the targeted data to the FAA-certified device. If the targeted data is accepted, then the targeted data is allowed to change information or functionality of the FAA- certified device. However, if the targeted data is not accepted or if it is rejected by the user, then the targeted data is not allowed to change information or functionality of any FAA-certified device.
  • This display hardware is installed on a multi-function display, such as the ASPEN Evolution Backup Display, or any other similar device.
  • the display is sometimes referred to as a scratchpad hardware. Any device that can display textual information (with graphic display a useful option) and can accept at least two distinct user responses (Yes and No) can be used for this function.
  • the software functionality it needs to support is intentionally minimal for two reasons. First, it will place a very low burden on the display (scratchpad hardware) memory and graphics function. Second, the gateway can be used with multiple avionics display manufacturers with reduced risk of incompatibility. The display simply needs to accept a small number of well-defined
  • gateway inputs from the gateway, display them for the user (text only or, if capable, text and appropriate graphics) and transmit the user's Yes or No response back to the gateway.
  • the system includes an FAA-certified gateway hardware device.
  • the gateway is configured to provide a secure data communication connection with the non- certified mobile computing device.
  • the gateway is also configured to provide a separate secure data communication connection with the FAA-certified device.
  • the gateway is configured to provide a data filter or a firewall.
  • one or more of the secure data communication connections is a wireless data connection.
  • one or more of the secure data communication connections is a hard-wired data connection.
  • the gateway includes a secure data communication connection with the internet (i.e., the world wide web).
  • the gateway hardware includes a basic compute module, including RAM and flash memory, and l/Os. It includes sufficient processing power and memory to support relatively significant compute loads while having substantial reserve capacity for future expansion. I/O is supported via Ethernet, RS232, USB, ARINC and/or 429. Other interfaces include Bluetooth, cellular and Iridium. It supports a secure Wi-Fi connection to the non-certified device.
  • the gateway device includes software. It includes an operating system. In some embodiments, the operating system is ANDROID-based.
  • the gateway also includes software to provide the secure data communication connection with the FAA-certified device. It also includes software to provide the secure data communication connection with the non-certified mobile computing device. It also includes software to provide targeted data confirmation protocols.
  • the gateway software provides secure external and internal communications support, firewall services, verification services via internal filters and interaction with the display, reading and writing of data to and from the FAA-certified device after user confirmation/verification.
  • the gateway software provides translation to and from function specific, capability driven "neutral" data formats and support of a Persistent Data Store (PDS) or localized memory store.
  • PDS Persistent Data Store
  • sensor data such as ADC, AHRS, OAT and/or navigator LAT/LONG is stored in a predetermined memory storage device, located locally on the gateway or elsewhere in the system.
  • the sensor data may be obtained directly from sensors connected to the gateway of the instant invention, or alternatively may be obtained by sensors connected to FAA-certified devices connected to the gateway.
  • the data stored in the predetermined memory storage is available for bulk load by applications for later analysis as well as being available to application on a non-real time basis. In some embodiments, this latter is critical due to the non-multitasking nature of iOS (e. g.
  • the data store also maintains current and historical flight plan data in a pre-defined universal format which allows loading into a targeted navigator, or cross loading between navigators of different compatibilities, on a "capabilities" based basis.
  • the data store in which data in the data store originates from an FAA-certified device, the data store maintains a copy of the data that is on the FAA-certified device. In other embodiments, the data store maintains a matrix, lookup table, or pointer to the data that is stored in the FAA-certified device, without actually copying the data. In other embodiments, the data store maintains a copy of some data and a lookup table/pointer to other data of the FAA-certified device. In this manner, the non-certified mobile computing device can access and even manipulate the data within the data store, but not manipulate the data on the FAA-certified device without first receiving proper authorization through the targeted data confirmation protocols of the invention (as is discussed above).
  • the software of the gateway device when a change to data is made through the use of the non-certified mobile computing device, utilizes the scratchpad hardware discussed above with respect to Fig. 15 to obtain authorization to make a change to the data that is stored on the FAA-certified device.
  • the memory storage device of the gateway is a secure, persistent data store located inside and/or outside the certified environment data.
  • the PDS is located outside the certified environment data (such as in a gateway of the instant invention) outside validation of data with, for example, CRC codes is preferred before data may be written to and/or edited within the certified
  • the memory storage device is physically contained in a section of flash memory located in the gateway. It is accessed by gateway software as well as by applications running inside the connected non- certified device. It will be appreciated that a gateway of the instant invention may include multiple PDS and/or other storage environments.
  • the gateway includes one PDS that is accessible and may be edited by the applications running on the connected non-certified device(s), and another PDS that is in an FAA-certified environment and therefore only accessible by (for receiving, reading, writing and/or transmitting data to or from) FAA-certified devices.
  • the memory storage device serves several main functions. In some embodiments, it stores installation (including aircraft type and registration number) and user defined configuration data. One portion is configured at installation time while the other is user editable, and is accessed from the non-certified device via a secure, password controlled program.
  • the user configuration includes a variety of items such as frequency of waypoint, attitude, ADC, OAT info, frequency of sampling of Engine parameters, Retention cycle, etc.
  • the memory storage device stores application configuration and state data. This allows multiple non-certified devices to be used with a single gateway on the same airplane. This also allows one to shift from one non-certified device to another during flight without losing key data (e. g. having a backup Tablet Computer).
  • it provides a place where an application can store any information it chooses. This store is divided into two sections - private and public. The private space is accessible only by the owning application. The other section is available to any application, whether on the originating Tablet Computer or another one. This, in effect, provides an interprocess communication channel between applications.
  • the store includes an extensible XML construct to allow the originating application to tag the data in the public area. There is a data registry associated with these public spaces so applications can query what public space data might be available to them.
  • the memory storage device includes waypoint, attitude and engine data from each flight. This information is retrievable by each application but is only written by the FAA-certified device(s).
  • the memory storage device includes incoming COM audio in digitized form, available when a compatible Audio Panel is installed. In some embodiments, it also contains the textual content of the message derived from the Speech Recognition engine running in the gateway as well as the parsed info and message categorization tag from the parsing engine, also running in the gateway.
  • the memory storage device includes flight plans stored in a format such as ARINC 424 to allow for flight plan validation and interchange. By doing this, and tagging the active one(s) and identifying which Navigator it is loaded into, it simplifies interaction with non-certified device applications. Further, by storing the flight plans in the "neutral language” it solves the back translation issue from "synthetic" flight plans to the base definition. In some embodiments, the flight plan is tagged when loaded into the navigator for correlation to the base.
  • pre-defined APIs are established for reading and writing data to and from the memory storage device along with appropriate validation filters to assure only verified and correct data received from the non-certified device application(s) is stored in the FAA-certified environment.
  • the gateway includes an interface, bi-directional where appropriate, to FAA-certified NAV/COM/GPS devices and other ship's sensors, such as engine sensors, attitude information, ADC information, OAT, etc. This is used to read data from the sensors, and, where appropriate, write data to these sensors. An example of this is the writing of flight plans to navigators and the tuning of NAV and COM radios.
  • the gateway also includes one or more interface to allow interaction with the Audio Panel.
  • the system supports digitization plus storage and playback of incoming COM transmissions. In some embodiments, the digitization, storage and/or playback is handled on the non-certified device.
  • the exemplary embodiment and various other embodiments of the present general inventive concept is implemented as a software algorithm, e.g., computer readable codes, on a computer readable medium, such as on firmware of the avionics devices discussed above.
  • Various other embodiments of the present general inventive concept can be embodied as computer readable codes on a computer readable medium and/or computer readable recording medium
  • readable recording medium may include any data storage device suitable to store data that can be thereafter read by a computer system.
  • Examples of the computer readable recording medium include, but are not limited to, a read-only memory (ROM), a random-access memory (RAM), CD-ROMs, magnetic tapes, floppy disks, optical data storage devices, and carrier waves (such as data transmission through the Internet).
  • the computer readable recording medium can also be distributed over network coupled computer systems so that the computer readable code is stored and executed in a distributed fashion.
  • Various embodiments of the present general inventive concept may also be embodied in hardware or in a combination of hardware and software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Medical Informatics (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Astronomy & Astrophysics (AREA)
  • Mathematical Physics (AREA)
  • Bioethics (AREA)
  • Computer And Data Communications (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

Systems and methods are provided for FAA-certified avionics devices to safely interface with non-certified mobile telecommunications devices before, during, and after flight. Data transmitted to the certified devices do not affect functionality of the certified device unless and until a user acknowledges and/or confirms the data on the certified device. Thus, the integrity of the certified device is maintained.

Description

AVION ICS GATEWAY INTERFACE, SYSTEMS AND METHODS
BACKGROUND
1. Cross-References
This application claims priority pursuant to co-pending U.S. Provisional Patent Application Serial No. 61/510,800, filed July 22, 201 1 , and to co-pending U.S. Provisional Patent Application Serial No. 61/674,340, filed July 21 , 2012, the entire disclosures of which are incorporated herein by reference.
2. Field
The present general inventive concept relates to gateway interface systems and methods for avionics devices. More particularly the inventive concept relates to methods and systems to interface communications between FAA-certified and non- certified devices, systems, and equipment.
The United States Federal Aviation Administration ("FAA") establishes, via regulations, certain minimum standards and requirements that must be satisfied by avionics devices, systems and equipment, particularly when the avionics device is essential or critical to flight safety. For example, FAR 23.131 1 (b) is a regulatory requirement that requires, among other things, redundant backup instruments in the cockpit. As used throughout this specification, an "FAA-certified device" may include any and all avionics devices, systems, and equipment that comply with FAA regulations and are approved for in-flight use. Approval may be secured via a Technical Standard Order (TSO), Type Certificate (TC), Supplemental Type Certificate (STC), or other similar processes and procedures. Examples of FAA- certified devices include (but are not limited to) Multi-function Flight Displays ("MFD") such as the Evolution Flight Display ("EFD") available from ASPEN AVIONICS, the KSN 770 available from HONEYWELL BENDIX/KING, and the GNS 430/530 available from GARM IN.
Third-party software developers have developed, and are expected to continually develop newer, software applications (also known as "apps") for non- certified devices to enhance the flight experience. Applications that can be used by
pilots to add convenience and efficiency have been developed for various mobile operating systems such as APPLE iOS, ANDROID, BLACKBERRY, and others. As used throughout this specification, a "non-certified device" may include any mobile electronics communications device. Examples of non-certified devices include (but are not limited to) cell phones, smart phones, BLACKBERRY mobile
communications devices, IPADs, IPODs, IPHONEs, laptops, tablet PCs, and similar mobile computing platforms. Indeed, non-certified mobile devices and many software applications have become quite popular and commonly available in recent times.
The FAA strictly regulates interconnectivity of flight systems to ensure certain minimum standards of flight safety. Unfortunately, because the vast majority of popular mobile communications devices are non-certified devices, the devices and their convenient software applications are unavailable for direct interfacing with FAA- certified devices without compromising the integrity, reliability, and certification of the FAA-certified devices.
Mobile devices have revolutionized how pilots obtain and use data. Since there is no data link between these mobile devices and the installed avionics, their use in the cockpit has been limited by a lack of integration with onboard systems. The EVOLUTION FLIGHT DISPLAY ("EFD") products available from ASPEN AVION ICS or other similar devices such as Multi-function Displays (MFD) and Primary Flight Displays (PFD) are interoperable with a large variety of new and legacy avionics products from multiple manufacturers, making them a natural gateway to certified flight data. Currently, there is demand for a non-certified, mobile computing device to wirelessly interface directly with FAA-certified devices during flight, but such a device is not available in the market. What is needed is a wireless bridge between handheld devices and the aircraft's certified avionics to increase the pilot's access to data and the utility of the mobile devices.
SUMMARY
The present general inventive concept provides a platform (gateway or interface) to enable two-way communications between non-certified devices and FAA-certified devices. One object of the general inventive concept is to seamlessly integrate non-certified devices with FAA-certified avionics devices without interfering
with the functionality or otherwise compromising the integrity of the FAA-certified devices and systems. Another object of the general inventive concept is to provide wireless connectivity (e.g., a mobile hotspot) for non-certified devices within the cockpit. Another object of the general inventive concept is to provide an electronics communication interface system that is sufficiently robust as to be highly customizable by end-users, and also largely compatible with numerous FAA-certified and non-certified devices and systems, whether currently-in-use or yet-to-be- developed.
In preferred embodiments, the gateway interfaces with FAA-certified devices without interfering with any functionality of the FAA-certified devices. Preferred embodiments of hardware interfaces include pre-determined specifications and software interfaces include a set of Application Programming Interface ("API") rules and specifications that guide interaction with the gateway, on both the non-certified end as well as the FAA-certified end. To simplify the hardware and software interfaces design, standardized protocols and rules are adhered to whenever possible. The use of application specific standards or formats is avoided as much as possible.
In a preferred embodiment, the gateway enables communication between the FAA-certified devices and non-certified devices with both a hardware component and a software component. If instructions are sent to the FAA-certified device via the gateway that may impact any functionality of the FAA-certified device, the instruction does not take effect on the FAA-certified device unless and until a user acknowledges and confirms the instructions via an FAA-certified device. The confirmation of the instructions ensures that the user-acknowledged data or instructions are validated to be received accurately by the using FAA-certified device and the user informed of the status of the validation. In this manner, no activities of the non-certified device or the gateway can interfere with the functionality of the FAA-certified device absent a confirmation or acknowledgment from the FAA- certified device. In some embodiments, the gateway, as a hardware component, is certified by the FAA as non-interfering with critical systems. The software code associated with the gateway, requiring the acknowledgement / confirmation, is likewise certified by the FAA as non-interfering with critical systems.
In a preferred embodiment, the hardware is enclosed in a small box that is blind-mounted in the aircraft as a separate, stand-alone component from the non- certified devices and FAA-certified devices that it integrates together. The feature- rich hardware component contains wireless, Bluetooth and USB connectivity options as well as flash memory storage. It also includes commercially available technology such as standard protocol ports and communications slots that will allow other third party companies to interface peripheral hardware as needed to enhance the utility of their own applications. It will be appreciated that in other embodiments the gateway of the instant invention will be a hardware and/or a software component that is integrated into a FAA-certified device, such as the EFD available from ASPEN AVION ICS.
Applications on non-certified devices allow users to interface with an aircraft's FAA-certified devices via the gateway. Some of these apps allow a user to upload and/or or modify flight planning data on his or her non-certified device and then synchronize this data with the aircraft's navigation and other FAA-certified devices via the gateway. Some of these apps allow a user to manage the aircraft logbook, maintenance records, and/or operational statistics on his or her non-certified device via the gateway.
In preferred embodiments, the gateway provides wireless telecommunications connectivity for non-certified devices. For example, the wireless connectivity is provided via a WiFi network (e.g., 802.1 1 a/b/g/n), 3G/4G mobile telecommunications network, iridium satellite telecommunications network, BLUETOOTH, or similar. In some embodiments, the gateway provides wired connectivity to non-certified devices. For example, the wired connectivity is provided via USB, Ethernet, or similar.
The foregoing and other objects are intended to be illustrative of the general inventive concept and are not meant in a limiting sense. Many possible embodiments of the invention may be made and will be readily evident upon a study of this specification and accompanying drawings comprising a part thereof. Various features and subcombinations may be employed without reference to other features and subcombinations. Other objects and advantages of this invention will become apparent from the following description taken in connection with the accompanying
drawings, wherein is set forth by way of illustration and example, an embodiment of this invention and various features thereof.
BRIEF DESCRIPTION OF THE DRAWINGS
These and/or other aspects and utilities of the present general inventive concept will become apparent and more readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings. For the purpose of illustration, forms of the present general inventive concept which are presently preferred are shown in the drawings; it being understood, however, that the general inventive concept is not limited to the precise arrangements and instrumentalities shown. In the drawings:
FIGURE 1 is an exemplary embodiment of the general inventive concept where a mobile application is operated on a non-certified device in wireless communication with a gateway which is then in hardwire communication with FAA- certified devices such as multi-function flight displays (via Ethernet) and/or navigation equipment (via ARINC429 or RS232).
FIGURE 2 is the end-to-end flight experience employing non-certified devices enabled by a gateway of the general inventive concept.
FIGURE 3 is an exemplary embodiment of the general inventive concept where a gateway is used in the cockpit of an aircraft allowing a pilot to coordinate tasks performed on non-certified devices before and after flight with tasks performed during flight on non-certified devices and interfacing with FAA-certified devices.
FIGURE 4 is a detailed view of the gateway shown in FIGURE 3.
FIGURE 5 is another exemplary embodiment of a gateway of the present general inventive concept.
FIGURE 6 is an embodiment of a gateway of the present general inventive concept with a single Ethernet port.
FIGURE 7 is a detailed view of an Ethernet connectivity option of a gateway of the present general inventive concept where a switch is added to the gateway to provide additional Ethernet ports.
FIGURE 8 is an embodiment of a gateway of the present general inventive concept configured to include three Ethernet ports.
FIGURE 9 is a flow chart showing how a flight planning software application interfaces between a non-certified device and an FAA-certified device via a gateway of the present general inventive concept.
FIGURE 10 is a flow chart showing how a flight planning service application functions on a gateway of the present general inventive concept.
FIGURE 1 1 is a flow chart showing how a flight control/radio tuning software application interfaces between a non-certified device and an FAA-certified device via a gateway of the present general inventive concept.
FIGURE 12 is a flow chart showing how a radio tuning software service application functions on a gateway of the present general inventive concept.
FIGURE 13 is a flow chart showing how a flight log book software application interfaces between a non-certified device and an FAA-certified device via a gateway of the present general inventive concept.
FIGURE 14 is a flow chart showing one exemplary embodiment of secured access protocols for communication between a non-certified mobile computing device and a wireless gateway in a system of the present general inventive concept.
FIGURE 15 shows an exemplary embodiment of a system of the present general inventive concept.
DETAILED DESCRIPTION
This general inventive concept provides an electronic gateway interface module designed to provide telecommunications connectivity between cockpit avionics and mobile devices (i.e., between FAA-certified and non-certified devices). One example of the general inventive concept is described, in detail, in co-pending U.S. Provisional Patent Application Serial No. 61 /674,340, filed July 21 , 2012, the entire disclosure of which is incorporated herein by reference.
Referring to Figure 1 , the gateway provides a hardwire telecommunications link to FAA-certified devices, such as ASPEN'S EFD, via an Ethernet interface, or such as a navigation system, via an ARINC429 (RS-232) connection. The gateway
also provides a telecommunications link to non-certified devices, such as mobile phones, tablets, electronic notebooks, laptops, or similar. In Figure 1 , the gateway provides a wireless link to non-certified devices via WiFi (IEEE 802.1 1 a/b/g/n). The gateway acts as a wireless access point providing a connection point between wireless mobile devices and avionics equipment. In some embodiments the gateway utilizes standard security protocols and/or security certification programs developed to secure wireless computer networks, such as WPA, WPA2, WEP, etc. The gateway may be a standalone device or part of FAA-certified device including software used in that FAA-certified device to provide gateway functionality as defined herein.
The gateway is designed to operate with a pre-defined Application
Programming Interface ("API"). Third-party software developers use the API specifications to develop apps for mobile devices (i.e., non-certified devices) that access data and functions on avionics equipment (i.e., FAA-certified devices) that are connected to the gateway. For example, but not by way of limitation, if the gateway is connected to ASPEN'S EFD, navigation and communications device data are accessible via the EFD. In alternative examples, multiple FAA-certified devices are connected to and accessible via the gateway. The methods used to acknowledge, confirm and validate are not limited to being resident in ASPEN'S EFD. The methods, hardware and/or software, can be included as part of any FAA- certified device that operates as the FAA-certified interface
The gateway, when used in combination with third-party non-certified devices and existing and yet-to-be-developed third-party software applications, allows users to streamline the end-to-end flight experience. With the gateway, users can more efficiently coordinate and synchronize efforts on-the-ground before and after flights. The gateway allows users to use information necessary for flight and collected during flight as well as analytics available between flights. Referring to Figure 2, before flight, a pilot uses non-certified devices to accomplish tasks such as check the latest weather developments, plan a flight, finalize a flight route, file and obtain clearance, prepare and update charts and flight databases, plan for destination logistics, notify others of upcoming flight, confirm pilot and aircraft airworthiness, confirm aircraft availability, and plan for passenger comfort. Referring to Figure 2, during flight, a pilot uses non-certified devices to interface with FAA-certified devices,
via the gateway, to accomplish tasks such as load flight plan and clearance to the avionics systems, tune radios and communicate with others, review and perform flight procedures, manage charts and flight databases, monitor fuel and engine operations, avoid weather, terrain, and obstacles, execute checklist, report and track position, communicate with people on the ground, and keep passengers comfortable. Referring to Figure 2, after flight, a pilot uses non-certified devices to accomplish tasks such as close the flight plan, flight log entry, notify others of arrival, arrange for ground transportation, review flight and debrief, and report any incidents. Referring to Figure 2, between flights, a pilot uses non-certified devices and information gathered from avionics devices to accomplish tasks such as review flight trends, share experience, analyze data, maintain aircraft, maintain and enhance skills, maintain pilot status, and critique instructor.
In some embodiments, the general inventive concept also includes a security key feature. The security key feature provides an option for a subscription arrangement in using the gateway. If a user cancels the subscription, then that user's specific security key is deactivated and that user can no longer access the gateway. In some embodiments, the security key feature is specific to each app (e.g., the app developer is issued the security key for a specific app). In other embodiments, the security key feature is specific to each user (e.g., each mobile device is issued a unique security key regardless of what apps are used by that device). If an app developer creates an app that somehow damages or improperly interferes with the gateway or an FAA-certified device, the relevant security keys are deactivated and the problematic app and/or user can no longer interface with the gateway. Thus, even if the developer published a pirate app online, it does not function for any user thanks to this security key feature.
Referring to Figure 3, a gateway of an embodiment the present general inventive concept is installed in the cockpit of an aircraft and interfaces with FAA- certified devices. The gateway provides a wireless access point within the cockpit of the aircraft such that non-certified devices can access and communicate with FAA- certified devices of the aircraft. Alternatively or additionally, the gateway provides a wired (e.g., USB) connection for non-certified devices. The pilot performs certain tasks before flight, after flight, and between flights on a non-certified device. During
flight, the pilot uses a non-certified device to access information and functions of the FAA-certified devices that interface with the gateway.
For example, and not by way of limitation, in a preferred embodiment, the gateway complies with DO-160E environmental conditions requirements. In this example, the gateway meets the requirements under a non-interference mode. The gateway will not interfere with avionics equipment, but may be susceptible to interference from other devices. The gateway is not certified as a critical device. The gateway is a non-essential, non-critical hardware and software component that should not cause interference to the aircraft but whose function may be degraded by noise or environmental conditions. Those skilled in the art will recognize that other configurations and alternative embodiments are equally viable where the software and/or hardware are fully certified by the FAA.
Referring to Figure 4, a detailed view of the gateway of Figure 3 is provided. As shown in Figure 4, the gateway includes a communication module that provides in-aircraft telecommunications connectivity. As shown in Figure 4, in-aircraft telecommunications connectivity is WiFi, 3G/4G cellular, Iridium satellite, or USB. The gateway is connected to a power supply. The power supply may be self contained within the gateway (e.g., battery operated), connected to any aircraft power supply system (including an FAA-certified device), or both (one or the other with backup for redundancy). The gateway includes a processor and memory storage, with optional additional external memory interface (e.g., a memory card).
According to Figure 4, the gateway includes several available interface options for connectivity to FAA-certified devices. According to Figure 4, the gateway connects directly to ASPEN'S EFD multi-function flight display or other similar device via an Ethernet connection. According to Figure 4, other FAA-certified devices are connected to the EFD or other similar device and are thus accessible via the gateway-EFD (or other similar device) connection. According to Figure 4, some additional FAA-certified devices, such as communication and navigation devices, are optionally directly connected to the gateway via Ethernet , ARINC429 (RS232), or other media interface.
In a preferred embodiment, the gateway module is based on the PARROT FC6100 processing platform. The FC6100 provides the system processor and
several key electrical interconnects including a wireless interface (WiFi and BLUETOOTH). The FC6100 is hosted by a custom motherboard designed to provide power to the FC6100, connectors to interface to other modules, and external antennas for the BLUETOOTH and WiFi radios. Figure 5 shows a block diagram of the gateway hardware. Optional items are not required to support the basic functionality, but would provide a more flexible hardware solution allowing for application growth in the future.
Referring to Figure 5, a preferred exemplary embodiment of a gateway of the present general inventive concept is provided by way of example, and not by way of limitation. According to the example shown in Figure 5, the gateway includes a PARROT FC6100 processor chip. According to the example shown in Figure 5, the gateway includes a MARVELL radio-frequency integrated circuit. According to Figure 4, the gateway includes a power supply to provide power to the processor, the USB connections, and the Ethernet connections. According to Figure 5, the gateway includes connections for USB, SPI (SR232), APPLE I2C chip for iPOD/iPHONE port, audio ports (Line In: 2 mic and 2 stereo / Line Out: audio panel), digital audio ports, external memory card slots (SD x2), visual display (LCD / touchscreen), and camera (infrared and/or visible camera). According to Figure 5, one of the two USB ports connects to an Ethernet adapter with USB hub to provide multiple Ethernet connection ports and additional USB ports. These multiple Ethernet ports connect to ASPEN'S EFD and/or other FAA-certified devices. The additional USB ports are used for software updates, iPOD/iPAD interface, additional external memory devices, digital media players, 3G/4G cellular network, and/or Iridium Satellite phone connections. According to Figure 5, the gateway provides an access point to a wireless network via WiFi and/or BLUETOOTH.
In the preferred embodiment, the gateway includes two SD card slots for internal data storage. The purpose of the primary card is to store Android OS, user applications, and application data. The purpose of the secondary card is to store application data, flight logs, data recorder, information, and entertainment media. In the preferred embodiment, the gateway includes a connection to standard avionics audio panels. This feature is used to support multimedia applications. The gateway streams media from connected mobile devices, a local SD card, or from Bluetooth connected devices. In addition, a microphone input is used for voice controlled
functionality (i.e., voice-recognition). In the preferred embodiment, the gateway includes an ARINC 429 interface to allow the gateway to be installed in aircraft without an ASPEN EFD, allowing the gateway to interface directly with legacy avionics equipment, such as air data, inertial, navigation, flight control, or other similar aircraft computing systems..
Figure 6 shows an embodiment of a gateway of the present general inventive concept with a single Ethernet port. Figure 7 shows a detailed view of an Ethernet connectivity option of a gateway of the present general inventive concept where a switch is added to the gateway to provide additional Ethernet ports. Figure 8 shows an embodiment of a gateway of the present general inventive concept configured to include three Ethernet ports.
By way of example, and not by way of limitation, an EFD or other similar device includes multiple screen configurations that are certified screens (on a certified device, displaying certified data, in a certified format). In this example, the EFD or other similar device further includes an additional non-certified screen. The non-certified screen displays information from the app off of the non-certified device. The additional non-certified screen is uncertified. It includes uncertified controls in order to control the uncertified display. One skilled in the art will recognize that this is but one example and that many other examples are available.
Software applications developed for non-certified devices are common. By interfacing directly with FAA-certified devices via a gateway of the present general inventive concept, a number of software applications have been developed to enhance the flight experience. Several examples of software applications are provided herein, however, it should be recognized that many other software applications will also benefit from interfacing with the gateway.
Most applications running on the gateway, itself, function as Android Services. Services are application components that perform background operations and do not have user interfaces. The services provide the functionality required to transfer data between non-certified devices and FAA-certified devices.
Example 1 : Flight Planning Application
The flight planning application allows a pilot to perform standard flight planning activities on an application running on a non-certified device. When the
non-certified device is connected to the gateway, the flight plan is synchronized with the connected Navigation device (i.e., FAA-certified). If the pilot desires to make further updates, he or she does so directly on the Navigation device (FAA-certified) or through the mobile application (non-certified). All changes are continuously synchronized in real time between the mobile application and the Navigation unit through the gateway.
Referring to Figure 9, a flow chart showing how a flight planning software application interfaces between a non-certified device and an FAA-certified device via a gateway of the present general inventive concept is provided. According to Figure 9, a pilot creates or updates a flight plan on a mobile, non-certified device. The non- certified device is connected to the gateway. Preferably, the non-certified device connects to the gateway wirelessly, via WiFi or BlueTooth, however, a hardwire USB connection or other connection is possible. According to Figure 9, the software application sends a request to the gateway indicating a new (or updated) flight plan (this can be initiated automatically by the software application, or manually by input from the pilot). A software/firmware application (or service) on the gateway processes the planned update request from the non-certified device and forwards the request to the FAA-certified device (e.g., ASPEN'S EFD or other similar device). According to Figure 9, the FAA-certified device (e.g., ASPEN'S EFD or other similar device) receives the new or updated flight plan from the gateway. Before any changes take effect, the FAA-certified devices requests user acknowledgement and confirmation. Only after acknowledgement is received on an FAA-certified device is the Navigation system updated with the new or updated flight plan.
According to Figure 9, after the pilot acknowledges the changes on the EFD or other similar device, the navigation system is updated with the new or updated flight plan. The EFD or other similar device is updated with plan changes and appropriate flags and indicators are set. The EFD or other similar device provides flight plan updates to the gateway. The gateway processes the flight plan updates from the EFD or other similar device and communicates with the mobile application to update the flight plan on the non-certified device. In this manner, a flight plan is synchronized on both non-certified devices and FAA-certified devices, before and during flight.
The step of acknowledgement on the FAA-certified device maintains the certified status of the FAA-certified equipment. The non-certified device does not interfere with any of the FAA-certified devices. The non-certified device is not allowed to make any changes or adjustments to any FAA-certified device other than to present data to be previewed and acted upon by the pilot. The acknowledgement on the FAA-certified device allows changes to information or functionality of the FAA- certified device, not anything received directly from any non-certified device. It will be appreciated that in various embodiments of the inventive concept
information/data will flow from the non-certified device (e.g. an iPad) to the FAA- certified (e.g. EFD or other similar device) in various manners. In some embodiments, information/data is uploaded from the non-certified device to the gateway and stored in a memory device in the gateway until the pilot acknowledges the request. At that point, when acknowledgement is made/completed, the information is uploaded from the gateway into the FAA-certified device. In some embodiments, multiple copies of the information are kept on any or all of the FAA- certified device, the non-certified device and the gateway and are "synced" together periodically to keep all copies current. In other embodiments, information/data from the non-certified device is stored on the gateway and small packets of data are released in increments to the FAA-certified device from the gateway post- acknowledgement as such data is needed by the FAA-certified device. It will further be appreciated that in some embodiments of the instant inventive concept, the gateway (or a software application/service on the gateway) pushes the request for acknowledgement to the FAA-certified device. In other embodiments, the gateway pushes the information/data to the FAA-certified device, and upon receipt of such new information/data, the FAA-certified device generates the request for acknowledgement before accepting said data. It will be appreciated that in such embodiments in which the FAA-certified device generates the request for acknowledgement, the new information/data may be stored in a temporary memory location in the FAA-certified device until acknowledgement is completed.
On the gateway, the flight planner service will facilitate the coordination of flight plans between the Navigation unit and the mobile application. The gateway will act as a conduit for Navigation flight plans. This service will act much like a web server responding to client pull requests from a mobile application. Requests will
take two forms, request for current Navigation flight plan and request for a Navigation flight plan update which will be accompanied by a new flight plan. The gateway service converts, if necessary, from a format used to communicate with the mobile app to the EFD format. The flight planner service must verify the integrity of the new flight plan before sending to the EFD/Navigation unit. The gateway may poll the EFD and cache results to allow for timely responses to mobile app requests. Referring to Figure 10, a flow chart showing how the gateway flight planner service functions is shown.
Example 2: Flight Control Application
The flight control application provides control over the communications equipment. This functionality may optionally also be combined with the flight planning application but preferably is separate. The flight control application allows the pilot to tune the radio to the appropriate frequencies via the gateway.
Referring to Figure 1 1 , a flow chart showing how a flight control/radio tuning software application of one embodiment of the instant inventive concept interfaces between a non-certified device and an FAA-certified device via a gateway of the present general inventive concept is shown. According to Figure 1 1 , a pilot tunes or selects a radio frequency using a software application on a non-certified device (this can be done in real time on the non-certified device, or alternatively may have been predetermined during the pilots preflight planning on the non-certified device and then initiated automatically by the software application based upon location or some other predetermined flight status criteria). The application connects the non-certified device to the gateway to request a radio frequency change. The gateway processes the radio frequency tuner change request and connects to the EFD or other similar device (FAA-certified device). The EFD or other similar device receives the radio frequency tuner change request and requests user acknowledgement via an FAA- certified device (e.g., the EFD or other similar device). Only after the pilot confirms the radio tuner frequency change on the EFD or other similar device is the radio frequency changed to the new frequency. In some embodiments, the gateway then communicates directly with the radio to change the frequency. The EFD or other similar device provides an update to the gateway and the gateway updates the non- certified device. In other embodiments, the EFD or other similar device communicates with the radio (a "downstream" device to the EFD) to change the
frequency. In an alternative embodiment, instead of sending a change request to the EFD or other similar device for the user to acknowledge, the gateway pushes the selected radio frequency to a "standby" frequency control of the radio, which is activated (or, from a broad perspective, "acknowledged) by the pilot/user by selecting/operating a control on the radio user interface that activates the standby frequency.
On the gateway, navigation and communication radio frequencies will be accessed through the flight control service. A mobile application will provide an interface for selecting radio frequencies. The application will issue a radio frequency change request to the gateway, which will in turn send a packet to the EFD or other similar device with the radio tuning message. The EFD or other similar device will command the Navigation radio through an ARINC 429 or RS-232 serial bus. The gateway will respond to the application that the request was completed by the EFD or other similar device. By way of example, and not by way of limitation, the application also has the ability to query the current active radio frequency from the Navigation radio unit. Referring to Figure 12, a flow chart showing how a radio tuning software service application functions on a gateway of the present general inventive concept is provided.
One skilled in the art will recognize that this is but one example of how the flight control application may be implemented. In other embodiments, the acknowledgement does not occur through the EFD or other similar device for radio tuning. Instead, the frequency is automatically pushed to the "standby" window of the radio's Nav/Com. The pilot acknowledges the frequency by activating the frequency on the radio from "standby" to "active". One skilled in the art will readily recognize that many other embodiments are available.
Example 3: Pilot's Logbook Application
Referring to Figure 13, a flow chart showing how a flight log book software application interfaces between a non-certified device and an FAA-certified device via a gateway of the present general inventive concept is provided. According to Figure 13, a pilot initiates logging via a software application on a non-certified device (this can be done in real time on the non-certified device, or alternatively may have been predetermined during the pilot's preflight planning on the non-certified device and
then initiated automatically by the software application based upon location or some other predetermined flight status criteria). The logging app records pilot hours and aircraft performance data. The application sends a request to the gateway to initiate logging. The gateway processes the request and requests aircraft and/or engine status from the EFD or other similar device. The EFD or other similar device receives the request and seeks confirmation from the pilot on the EFD (FAA-certified device). Only after receiving pilot acknowledgement on the EFD does the EFD provide aircraft and/or engine status (or other information to be logged) to the gateway. The gateway stores the log information on an external memory card or forwards it on to the non-certified device for storage.
In some embodiments, the method includes a method for implementing client authentication protocols with a mobile web server of a gateway device of an embodiment of the invention. Referring to Fig. 14, the method allows for client authentication with a mobile web server of a gateway that does not have its own internet connection. The system is comprised of three computing nodes: a) a license server issuing license keys to client devices; b) a client device (mobile computing device, tablet, smart phone, etc.) accessing data resources within a mobile server; and c) a mobile web server authenticating and servicing client requests for data. The mobile web server authenticates the client without having access to a certificate authority.
The mobile webserver is a component of the gateway, which is connected to a FAA-certified device. In a preferred embodiment the connection between the gateway and the FAA-certified device is a hard wired Ethernet connection; however it will be appreciated that other embodiments utilize a wireless connection. In a preferred embodiment, the client device (or devices) is connected to the mobile server via a wireless connection. Nevertheless, it will be appreciated that other embodiments utilize a wired connection.
In some embodiments, the mobile web server prevents client devices (e.g. non-certified mobile computing devices) from accessing any functionality of the gateway if the mobile server has not authenticated the client device. In other embodiments, mobile devices that are not authenticated are only prevented from accessing data resources of the mobile server, such as communicating with (i.e. accessing data from, reading from, writing to and/or transmitting to) FAA-certified
devices connected to the gateway and/or accessing any data stored on or accessible by the gateway from or relating to the FAA-certified devices, but otherwise are allowed to access functionality of the gateway that is separate from the mobile service and/or FAA-certified devices. For example, in one embodiment, a client device that has not been authenticated is permitted to network (assuming the device has been authenticated through any other security protocols for connecting to the gateway - such as WPA or WPA2 SSID and password if the network connection is a wireless connection) with other non-authenticated mobile devices (e.g. as in a typical computer network) and/or with an Internet connection that is connected to the gateway (if the gateway is so connected). In this manner, the gateway may function as network router between non-authenticated mobile devices (such as those used by aircraft passengers) and entertainment or other non-FAA certified data resources, while at the same time functioning as a platform for two-way communication between authenticated non-certified devices and FAA certified devices/resources.
Referring to Fig. 14, the method includes generating an encrypted license key for a mobile server in operable data connection with said FAA-certified device. An encrypted license key is generated for each mobile server device. The key is a hash of something specific to the mobile server device (Serial Number, MAC address, etc.). The algorithm for generating the key can remain proprietary to the gateway manufacturer and need not be shared with the general public. The algorithm for generating the license key is known only to the mobile server (i.e. stored in memory of the mobile server) and the license server. The client device does not decrypt the key. The algorithm for decrypting the key is not held within the client device application code, preventing the algorithm from being reverse engineered from the binary.
The license key is hosted on a license server. The client device connects to the license server (via an Internet connection or other suitable data connection) and downloads the key from the license server after providing authorization credentials (Account information, SN, MAC address, etc., from the purchased mobile device server documentation) to the license server. A client app on the client device downloads the key and stores it within cache on the mobile device. The connection between the client device and license server is encrypted with SSL or another suitable method to preserve the integrity of the key. The client device establishes a
connection with the mobile server and requests access to certain targeted data resources. The license key is issued with each request or is cached for each session. The network session is encrypted with SSL or another method to preserve the integrity of the license key as it is passed from the client to mobile server. If the network connection is wireless, the channel is encrypted. The mobile server decrypts and validates the key before authorizing access.
In some embodiments, the general inventive concept provides a system for transmitting and receiving aircraft data communications between cockpit avionics and mobile devices (i.e., between FAA-certified and non-certified devices). Referring to Figure 15, the system includes an FAA-certified device that provides AHRS, ADC, navigation, communication or flight plan data. The FAA-certified device is configured to restrict receiving data from non-certified devices such that non-certified devices do not interfere with normal operation of the FAA-certified device. The system also includes at least one non-certified mobile computing device that is configured to send and receive data.
The system includes a display that is configured to display data that is targeted to be received by the FAA-certified device from the non-certified mobile computing device. The display is a piece of hardware that allows user inputs as a confirmation so that the pilot can accept or reject the targeted data prior to loading the targeted data to the FAA-certified device. If the targeted data is accepted, then the targeted data is allowed to change information or functionality of the FAA- certified device. However, if the targeted data is not accepted or if it is rejected by the user, then the targeted data is not allowed to change information or functionality of any FAA-certified device. This display hardware is installed on a multi-function display, such as the ASPEN Evolution Backup Display, or any other similar device.
Referring to Fig. 15, the display is sometimes referred to as a scratchpad hardware. Any device that can display textual information (with graphic display a useful option) and can accept at least two distinct user responses (Yes and No) can be used for this function. The software functionality it needs to support is intentionally minimal for two reasons. First, it will place a very low burden on the display (scratchpad hardware) memory and graphics function. Second, the gateway can be used with multiple avionics display manufacturers with reduced risk of incompatibility. The display simply needs to accept a small number of well-defined
inputs from the gateway, display them for the user (text only or, if capable, text and appropriate graphics) and transmit the user's Yes or No response back to the gateway.
The system includes an FAA-certified gateway hardware device. The gateway is configured to provide a secure data communication connection with the non- certified mobile computing device. The gateway is also configured to provide a separate secure data communication connection with the FAA-certified device. In some embodiments, the gateway is configured to provide a data filter or a firewall. In some embodiments, one or more of the secure data communication connections is a wireless data connection. In some embodiments, one or more of the secure data communication connections is a hard-wired data connection. In some embodiments, the gateway includes a secure data communication connection with the internet (i.e., the world wide web).
The gateway hardware includes a basic compute module, including RAM and flash memory, and l/Os. It includes sufficient processing power and memory to support relatively significant compute loads while having substantial reserve capacity for future expansion. I/O is supported via Ethernet, RS232, USB, ARINC and/or 429. Other interfaces include Bluetooth, cellular and Iridium. It supports a secure Wi-Fi connection to the non-certified device.
The gateway device includes software. It includes an operating system. In some embodiments, the operating system is ANDROID-based. The gateway also includes software to provide the secure data communication connection with the FAA-certified device. It also includes software to provide the secure data communication connection with the non-certified mobile computing device. It also includes software to provide targeted data confirmation protocols. The gateway software provides secure external and internal communications support, firewall services, verification services via internal filters and interaction with the display, reading and writing of data to and from the FAA-certified device after user confirmation/verification. The gateway software provides translation to and from function specific, capability driven "neutral" data formats and support of a Persistent Data Store (PDS) or localized memory store.
In some embodiments, sensor data, such as ADC, AHRS, OAT and/or navigator LAT/LONG is stored in a predetermined memory storage device, located locally on the gateway or elsewhere in the system. The sensor data may be obtained directly from sensors connected to the gateway of the instant invention, or alternatively may be obtained by sensors connected to FAA-certified devices connected to the gateway. The data stored in the predetermined memory storage is available for bulk load by applications for later analysis as well as being available to application on a non-real time basis. In some embodiments, this latter is critical due to the non-multitasking nature of iOS (e. g. if a user suspends an application that is monitoring sensor streams by switching to another application, the monitoring application needs to be able to play "catch-up" when it is reactivated). The data store also maintains current and historical flight plan data in a pre-defined universal format which allows loading into a targeted navigator, or cross loading between navigators of different compatibilities, on a "capabilities" based basis.
In some embodiments of the invention, in which data in the data store originates from an FAA-certified device, the data store maintains a copy of the data that is on the FAA-certified device. In other embodiments, the data store maintains a matrix, lookup table, or pointer to the data that is stored in the FAA-certified device, without actually copying the data. In other embodiments, the data store maintains a copy of some data and a lookup table/pointer to other data of the FAA-certified device. In this manner, the non-certified mobile computing device can access and even manipulate the data within the data store, but not manipulate the data on the FAA-certified device without first receiving proper authorization through the targeted data confirmation protocols of the invention (as is discussed above). In some embodiments, when a change to data is made through the use of the non-certified mobile computing device, the software of the gateway device utilizes the scratchpad hardware discussed above with respect to Fig. 15 to obtain authorization to make a change to the data that is stored on the FAA-certified device.
The memory storage device of the gateway is a secure, persistent data store located inside and/or outside the certified environment data. In embodiments in which the PDS is located outside the certified environment data (such as in a gateway of the instant invention) outside validation of data with, for example, CRC codes is preferred before data may be written to and/or edited within the certified
environment. In some embodiments, the memory storage device is physically contained in a section of flash memory located in the gateway. It is accessed by gateway software as well as by applications running inside the connected non- certified device. It will be appreciated that a gateway of the instant invention may include multiple PDS and/or other storage environments. For example, in some embodiments, the gateway includes one PDS that is accessible and may be edited by the applications running on the connected non-certified device(s), and another PDS that is in an FAA-certified environment and therefore only accessible by (for receiving, reading, writing and/or transmitting data to or from) FAA-certified devices.
The memory storage device serves several main functions. In some embodiments, it stores installation (including aircraft type and registration number) and user defined configuration data. One portion is configured at installation time while the other is user editable, and is accessed from the non-certified device via a secure, password controlled program. The user configuration includes a variety of items such as frequency of waypoint, attitude, ADC, OAT info, frequency of sampling of Engine parameters, Retention cycle, etc.
In some embodiments, the memory storage device stores application configuration and state data. This allows multiple non-certified devices to be used with a single gateway on the same airplane. This also allows one to shift from one non-certified device to another during flight without losing key data (e. g. having a backup Tablet Computer). In some embodiments, it provides a place where an application can store any information it chooses. This store is divided into two sections - private and public. The private space is accessible only by the owning application. The other section is available to any application, whether on the originating Tablet Computer or another one. This, in effect, provides an interprocess communication channel between applications. In some embodiments, the store includes an extensible XML construct to allow the originating application to tag the data in the public area. There is a data registry associated with these public spaces so applications can query what public space data might be available to them.
In some embodiments, the memory storage device includes waypoint, attitude and engine data from each flight. This information is retrievable by each application but is only written by the FAA-certified device(s).
In some embodiments, the memory storage device includes incoming COM audio in digitized form, available when a compatible Audio Panel is installed. In some embodiments, it also contains the textual content of the message derived from the Speech Recognition engine running in the gateway as well as the parsed info and message categorization tag from the parsing engine, also running in the gateway.
In some embodiments, the memory storage device includes flight plans stored in a format such as ARINC 424 to allow for flight plan validation and interchange. By doing this, and tagging the active one(s) and identifying which Navigator it is loaded into, it simplifies interaction with non-certified device applications. Further, by storing the flight plans in the "neutral language" it solves the back translation issue from "synthetic" flight plans to the base definition. In some embodiments, the flight plan is tagged when loaded into the navigator for correlation to the base.
In some embodiments, pre-defined APIs are established for reading and writing data to and from the memory storage device along with appropriate validation filters to assure only verified and correct data received from the non-certified device application(s) is stored in the FAA-certified environment.
Referring to Fig. 15, the gateway includes an interface, bi-directional where appropriate, to FAA-certified NAV/COM/GPS devices and other ship's sensors, such as engine sensors, attitude information, ADC information, OAT, etc. This is used to read data from the sensors, and, where appropriate, write data to these sensors. An example of this is the writing of flight plans to navigators and the tuning of NAV and COM radios. The gateway also includes one or more interface to allow interaction with the Audio Panel. The system supports digitization plus storage and playback of incoming COM transmissions. In some embodiments, the digitization, storage and/or playback is handled on the non-certified device.
The exemplary embodiment and various other embodiments of the present general inventive concept is implemented as a software algorithm, e.g., computer readable codes, on a computer readable medium, such as on firmware of the avionics devices discussed above. Various other embodiments of the present general inventive concept can be embodied as computer readable codes on a computer readable medium and/or computer readable recording medium
(collectively "computer readable recording medium" hereafter). The computer
readable recording medium may include any data storage device suitable to store data that can be thereafter read by a computer system. Examples of the computer readable recording medium include, but are not limited to, a read-only memory (ROM), a random-access memory (RAM), CD-ROMs, magnetic tapes, floppy disks, optical data storage devices, and carrier waves (such as data transmission through the Internet). The computer readable recording medium can also be distributed over network coupled computer systems so that the computer readable code is stored and executed in a distributed fashion. Various embodiments of the present general inventive concept may also be embodied in hardware or in a combination of hardware and software
Thus, while the present general inventive concept has been shown in the drawings and fully described above with particularity and detail in connection with what is presently deemed to be the most practical and preferred embodiment(s) of the invention, it will be apparent to those of ordinary skill in the art that many modifications thereof may be made without departing from the principles and concepts set forth herein, including, but not limited to, variations in size, materials, shape, form, function and manner of operation, assembly and use.
It is also to be understood that the following claims are intended to cover all of the generic and specific features of the invention herein described, and all statements of the scope of the invention which, as a matter of language, might be said to fall therebetween. Hence, the proper scope of the present general inventive concept should be determined only by the broadest interpretation of the appended claims so as to encompass all such modifications as well as all relationships equivalent to those illustrated in the drawings and described in the specification.
Finally, it will be appreciated that the purpose of the annexed Abstract is to enable the U.S. Patent and Trademark Office and the public generally, and especially the scientists, engineers and practitioners in the art who are not familiar with patent or legal terms or phraseology, to determine quickly from a cursory inspection the nature and essence of the technical disclosure of the application. Accordingly, the Abstract is neither intended to define the invention or the application, which only is measured by the claims, nor is it intended to be limiting as to the scope of the invention in any way.

Claims

CLAIMS What is claimed is:
1. A method of processing information on-board an aircraft comprising the steps of:
providing an avionics device installed in said aircraft, wherein said avionics device is an FAA-certified device;
operably connecting a non-certified device to said FAA-certified device; generating non-certified information on said non-certified device;
generating FAA-certified information on said FAA-certified device;
transmitting and receiving electronic packets of non-certified information from said non-certified device to said FAA-certified device;
generating a request for a user acknowledgement or confirmation on said
FAA-certified device after said FAA-certified device receives said non- certified information; and
allowing changes to information or functionality of said FAA-certified device only after said user acknowledgement or confirmation is completed.
2. The method as claimed in claim 1 wherein said step of generating a request for user acknowledgement or confirmation is accomplished by a gateway service.
3. The method as claimed in claim 1 wherein said step of generating a request for user acknowledgement or confirmation is accomplished by said FAA-certified device.
4. The method as claimed in claim 3 wherein said step of generating a request for user acknowledgement or confirmation is accomplished by said FAA-certified device and wherein said step of transmitting and receiving electronic packets of non- certified information from said non-certified device to said FAA-certified device is accomplished through a gateway.
5. The method as claimed in claim 1 wherein said step of operably connecting a non-certified device to said FAA-certified device comprises:
generating an encrypted license key for a mobile server in operable data connection with said FAA-certified device;
hosting said license key on a license server;
providing authorization credentials of the non-certified device to said license server;
downloading said license key from said license server to said non-certified device;
storing said license key within cache on said non-certified device;
establishing a data connection between said mobile server and said non- certified device;
providing said license key to said mobile server for validation;
requesting access by said non-certified device to one or more data resources available via said mobile server in operable data connection with said FAA-certified device; and
decrypting and validating said license key by said mobile server before authorizing non-certified device access to said one or more data resources available via said mobile server in operable data connection with said FAA-certified device.
6. A method of displaying information on-board an aircraft comprising the steps of:
providing an avionics device installed in said aircraft, wherein said avionics device is an FAA-certified device;
operably connecting a non-certified device to said FAA-certified device; transmitting information from said non-certified device to said FAA-certified device; and
transmitting information from said FAA-certified device to said non-certified device.
7. The method as claimed in claim 6, wherein said transmitting steps are performed through a gateway device.
8. The method as claimed in claim 6, further comprising the steps of:
generating a request for a user acknowledgement or confirmation on said
FAA-certified device after said FAA-certified device receives said non- certified information; and
allowing changes to information or functionality of said FAA-certified device only after said user acknowledgement or confirmation is completed.
9. The method as claimed in claim 6, further comprising the steps of:
generating a request for a user acknowledgement or confirmation on said
FAA-certified device after said FAA-certified device receives said non- certified information; and
allowing changes to information or functionality of a second FAA-certified device connected to said FAA-certified device only after said user acknowledgement or confirmation is completed.
10. The method as claimed in claim 6, further comprising the steps of:
connecting said avionics device to an avionics display installed in said aircraft, wherein said avionics display is non-certified; and
displaying said information transmitted from said non-certified device on said avionics display.
1 1. The method as claimed in claim 6 wherein said step of operably connecting a non-certified device to said FAA-certified device comprises:
generating an encrypted license key for a mobile server in operable data connection with said FAA-certified device;
hosting said license key on a license server;
providing authorization credentials of the non-certified device to said license server;
downloading said license key from said license server to said non-certified device;
storing said license key within cache on said non-certified device;
establishing a data connection between said mobile server and said non- certified device;
providing said license key to said mobile server for validation;
requesting access by said non-certified device to one or more data resources available via said mobile server in operable data connection with said FAA-certified device; and
decrypting and validating said license key by said mobile server before authorizing non-certified device access to said one or more data resources available via said mobile server in operable data connection with said FAA-certified device.
12. A system for transmitting and receiving aircraft data communications, the system comprising:
an FAA-certified device that provides one or more of AHRS, ADC, or flight plan data and is configured to restrict receiving data from non-certified devices;
a non-certified mobile computing device configured to send and receive data; a display configured to display data targeted to be received by said FAA- certified device from said non-certified mobile computing device; and configured to receive user inputs as a confirmation of targeted data, said confirmation requiring user input to accept or reject said targeted data;
wherein if said targeted data is accepted, then said targeted data is allowed to change information or functionality of said FAA- certified device; and
wherein if said targeted data is not accepted, then said targeted data is not allowed to change information or functionality of said FAA- certified device;
an FAA-certified gateway hardware device configured to provide a secure data communication connection with said non-certified mobile computing device;
said FAA-certified gateway hardware device configured to provide a secure data communication connection with said FAA-certified device;
said FAA-certified gateway hardware device configured to provide a data filter or a firewall; and
said FAA-certified gateway hardware device including a gateway services module comprising:
a software operating system;
software to provide said secure data communication connection with said FAA-certified device and said secure data communication connection with said non-certified mobile computing device; and
software to provide targeted data confirmation protocols for determining if said targeted data is allowed to change information or functionality of said FAA-certified device.
PCT/US2012/047874 2011-07-21 2012-07-23 Avionics gateway interface, systems and methods WO2013013243A1 (en)

Priority Applications (8)

Application Number Priority Date Filing Date Title
BR112014001567A BR112014001567A2 (en) 2011-07-22 2012-07-23 information processing method, information display method and system for transmitting and receiving aircraft data communications
CN201280045734.0A CN104115087B (en) 2011-07-21 2012-07-23 Aviation electronics gateway interface, system and method
US14/119,966 US9141830B2 (en) 2011-07-22 2012-07-23 Avionics gateway interface, systems and methods
EP12814808.7A EP2734905B1 (en) 2011-07-22 2012-07-23 Avionics gateway interface, systems and methods
US14/458,680 US9189655B2 (en) 2011-07-22 2014-08-13 Avionics gateway interface, systems and methods
US14/942,505 US9800665B2 (en) 2011-07-22 2015-11-16 Avionics gateway interface, systems and methods
US15/685,201 US11496566B2 (en) 2011-07-22 2017-08-24 Avionics gateway interface, systems and methods
US17/982,433 US20230179658A1 (en) 2011-07-22 2022-11-07 Avionics gateway interface, systems and methods

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US61/510,800 2011-07-21
US201161510800P 2011-07-22 2011-07-22
US201261674340P 2012-07-21 2012-07-21
US61/674,340 2012-07-21

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US14119966 A-371-Of-International 2013-07-23
US14/458,680 Continuation US9189655B2 (en) 2011-07-22 2014-08-13 Avionics gateway interface, systems and methods

Publications (1)

Publication Number Publication Date
WO2013013243A1 true WO2013013243A1 (en) 2013-01-24

Family

ID=47558530

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2012/047874 WO2013013243A1 (en) 2011-07-21 2012-07-23 Avionics gateway interface, systems and methods

Country Status (5)

Country Link
US (5) US9141830B2 (en)
EP (1) EP2734905B1 (en)
CN (1) CN104115087B (en)
BR (1) BR112014001567A2 (en)
WO (1) WO2013013243A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102013105746A1 (en) * 2013-06-04 2014-12-04 Airbus Defence and Space GmbH Communication system with access control and access granting in a communication system
EP2819317A3 (en) * 2013-06-27 2015-04-15 Airbus Operations (S.A.S) An aircraft-based mobile device connectivity system including an avionic system interface, a wireless interface and a data security module which receives avionic data and transmits them to mobile devices via the interfaces
EP3021497A1 (en) * 2014-10-21 2016-05-18 The Boeing Company System and method for secure wireless communications between a vehicle and a source
US9571181B2 (en) 2012-03-01 2017-02-14 Honeywell International Inc. Programmable portable electronic device for airborne operational communications
EP3208707A1 (en) * 2016-02-22 2017-08-23 Zodiac Aero Electric Interface for aircraft and method for controlling such an interface
CN108062458A (en) * 2016-11-07 2018-05-22 霍尼韦尔国际公司 For managing the method and system of the software license for the vehicles
EP3553654A1 (en) * 2018-04-09 2019-10-16 Honeywell International Inc. Avionics data access function
EP3757759A1 (en) * 2019-06-28 2020-12-30 Honeywell International Inc. System and method to facilitate communication of an application resident on a portable computing device with an application resident in aircraft avionics
US10955227B2 (en) 2014-02-13 2021-03-23 The Boeing Company Fire-retarding artillery shell
US11511881B2 (en) 2019-06-28 2022-11-29 Honeywell International Inc. System and method to facilitate communication of an application resident on a portable computing device with an application resident in aircraft avionics

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR3010853B1 (en) * 2013-09-13 2015-10-16 Thales Sa HIERARCHICAL ARCHITECTURE DISTRIBUTED WITH MULTIPLE ACCESS TO SERVICES
US9284045B1 (en) * 2014-03-28 2016-03-15 Garmin International, Inc. Connected cockpit system and method
US10455384B2 (en) * 2014-07-10 2019-10-22 The Boeing Company Vehicle system and method for indicating available communication channels
US9916701B2 (en) * 2014-09-10 2018-03-13 The Boeing Company Vehicle auditing and control of maintenance and diagnosis for vehicle systems
US9420620B2 (en) * 2014-09-30 2016-08-16 Honeywell International Inc. Systems and methods for aircraft on-ground determination
US9583011B2 (en) * 2015-01-28 2017-02-28 Airbus Helicopters Aircraft system for signaling the presence of an obstacle, an aircraft equipped with this system, and method for the detection of an obstacle
US9602279B1 (en) * 2015-06-09 2017-03-21 Amazon Technologies, Inc. Configuring devices for use on a network using a fast packet exchange with authentication
US10254912B2 (en) 2015-09-10 2019-04-09 Honeywell International Inc. Methods and systems for non-intrusive system data pipe
CN105425639A (en) * 2015-12-11 2016-03-23 中国航空工业集团公司西安航空计算技术研究所 Flight assisting system and method for general aircraft
EP3400682B1 (en) * 2016-01-07 2022-03-30 Genetec Inc. Network sanitization for dedicated communication function and edge enforcement
US9980298B2 (en) * 2016-02-26 2018-05-22 The Boeing Company Method and system for integration of portable devices with flight deck displays
US10706645B1 (en) * 2016-03-09 2020-07-07 Drew Technologies, Inc. Remote diagnostic system and method
CN107277647A (en) * 2016-04-07 2017-10-20 航迅信息技术有限公司 A kind of airborne passenger entertainment data update and information interaction system and method
WO2018023330A1 (en) 2016-08-01 2018-02-08 Honeywell International Inc. Portable datalink equipment for overhearing data or voice communications
US10431014B2 (en) 2016-08-18 2019-10-01 Honeywell International Inc. Data recording function
US10742625B2 (en) * 2016-09-30 2020-08-11 Panasonic Avionics Corporation Automated delivery of security credentials to scheduled crew
US10225349B2 (en) 2016-10-26 2019-03-05 Honeywell International Inc. Software development kit for aircraft tablet device and airborne application server
FR3061331B1 (en) * 2016-12-22 2019-05-10 Thales IDENTIFICATION, SHARING AND DATA MANAGEMENT ASSEMBLY INCLUDING CRITICAL DATA AND NON-CRITICAL DATA
US10297162B2 (en) * 2016-12-28 2019-05-21 Honeywell International Inc. System and method to activate avionics functions remotely
US10839401B2 (en) * 2017-01-20 2020-11-17 Honeywell International Inc. Apparatus and method for qualifying data automatically generated from an unqualified system
US20180247548A1 (en) * 2017-02-27 2018-08-30 Honeywell International Inc. System and method to decipher and display advisory information
US11017297B2 (en) 2017-06-12 2021-05-25 Honeywell International Inc. System and methods to provide seamless information exchange between certified and uncertified applications
FR3067803B1 (en) * 2017-06-16 2020-05-22 Thales SYNCHRONIZATION OF A DUAL AVIONIC AND NON-AVIONIC SYSTEM
US20190110334A1 (en) * 2017-10-09 2019-04-11 Honeywell International Inc. Systems and methods for enhanced vehicle operator connectivity to external networks and onboard systems via single access point
EP3471079B1 (en) * 2017-10-11 2020-05-27 Honeywell International Inc. System and method for aircraft data loading using cabin gateways
FR3072239A1 (en) * 2017-10-11 2019-04-12 Honeywell International Inc. SYSTEM AND METHOD FOR LOADING AIRCRAFT DATA USING CABIN BRIDGES
US10293955B1 (en) * 2017-10-31 2019-05-21 Honeywell International Inc. System and method for consolidating, ratifying and escalation of uncertified applications notifications
US10946977B2 (en) 2017-11-20 2021-03-16 Honeywell International Inc. Method and system for integrating offboard generated parameters into a flight management system
US10901674B2 (en) 2017-12-07 2021-01-26 Honeywell International Inc. Protocol for high integrity personal electronic device applications
US10810808B2 (en) 2017-12-07 2020-10-20 Honeywell International Inc. Avionics server for high integrity tablet applications
US10636390B2 (en) 2017-12-07 2020-04-28 Honeywell International Inc. Display integrity system for ICA monitoring and annunciation for certified aeronautical applications running on a commercial device
US10273020B1 (en) 2017-12-07 2019-04-30 Honeywell International Inc. Mounting device adapter and method in a system for displaying mission critical information on an uncertified display
US10875762B2 (en) 2017-12-07 2020-12-29 Honeywell International Inc. Addressable display system for ICA monitoring and annunciation for certified applications running on a personal electronic device
US10338337B1 (en) 2017-12-07 2019-07-02 Honeywell International Inc. System and method for displaying critical aeronautical information on an uncertified display
US11611624B2 (en) * 2018-01-08 2023-03-21 Honeywell International Inc. Data transfer between application and vehicle management system
US20190243504A1 (en) * 2018-02-05 2019-08-08 Honeywell International Inc. Touch screen controller with data exchange and mining service
US10764749B2 (en) * 2018-03-27 2020-09-01 Honeywell International Inc. System and method for enabling external device connectivity to avionics systems
US10991255B2 (en) * 2018-04-05 2021-04-27 Ge Aviation Systems Llc Providing an open interface to a flight management system
US10580308B2 (en) 2018-05-01 2020-03-03 Honeywell International Inc. Connected instrument procedure placekeeping system
US10944743B2 (en) * 2019-01-22 2021-03-09 Adp, Llc Rich communication services security authentication system
US11012146B2 (en) 2019-02-11 2021-05-18 Pratt & Whitney Canada Corp. System and method for aircraft data transmission
US20200348148A1 (en) * 2019-04-30 2020-11-05 Honeywell International Inc. System and method for rendering dynamic data and controlling the visual form of the data on a cockpit display without altering the certified software
US11048389B2 (en) * 2019-09-16 2021-06-29 Mid-Continent Instrument Co., Inc. Customizable multi-function display
KR102419321B1 (en) * 2022-04-26 2022-07-11 주식회사 링크나인시스템 Data relay system for communication between ARINC 429-based avionic devices and Ethernet-based avionic devices

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6401013B1 (en) 2000-07-11 2002-06-04 Rockwell Collins, Inc. Method and system for integrating a laptop PC in a cockpit
US20040139467A1 (en) * 2002-06-26 2004-07-15 Michael Rogerson Aircraft communication distribution system
US20050228558A1 (en) * 2004-04-12 2005-10-13 Patrick Valette Method and system for remotely communicating and interfacing with aircraft condition monitoring systems
US20080208399A1 (en) * 2007-02-27 2008-08-28 Pham Tuan A Electronic flight bag system and method
US20090041041A1 (en) * 2007-08-08 2009-02-12 Honeywell International Inc. Aircraft data link network routing
US20090058682A1 (en) * 2007-08-27 2009-03-05 Honeywell International Inc. Aircraft data network access for personal electronic devices
US20100100887A1 (en) * 2008-09-15 2010-04-22 Airbus Operations Method and device for encapsulating applications in a computer system for an aircraft

Family Cites Families (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4642775A (en) 1984-05-25 1987-02-10 Sundstrand Data Control, Inc. Airborne flight planning and information system
US4994974A (en) 1986-06-04 1991-02-19 Cummings Elihu C Touch sensitive navigation system
US5270931A (en) 1989-02-23 1993-12-14 The Boeing Company Software controlled aircraft component configuration system
US6047165A (en) 1995-11-14 2000-04-04 Harris Corporation Wireless, frequency-agile spread spectrum ground link-based aircraft data communication system
US5786995A (en) 1996-11-14 1998-07-28 Teledyne Industries, Inc. Avionics system having access through hinged display and control panel
US5875296A (en) 1997-01-28 1999-02-23 International Business Machines Corporation Distributed file system web server user authentication with cookies
US6680694B1 (en) 1997-08-19 2004-01-20 Siemens Vdo Automotive Corporation Vehicle information system
US6189146B1 (en) * 1998-03-18 2001-02-13 Microsoft Corporation System and method for software licensing
US7131136B2 (en) 2002-07-10 2006-10-31 E-Watch, Inc. Comprehensive multi-media surveillance and response system for aircraft, operations centers, airports and other commercial transports, centers and terminals
US6167239A (en) 1999-06-25 2000-12-26 Harris Corporation Wireless spread spectrum ground link-based aircraft data communication system with airborne airline packet communications
US7974775B1 (en) 1999-11-05 2011-07-05 Angela Masson Electronic kit bag
US6671589B2 (en) 2001-02-13 2003-12-30 William Holst Method and apparatus to support remote and automatically initiated data loading and data acquisition of airborne computers using a wireless spread spectrum aircraft data services link
JP2003087146A (en) * 2001-06-28 2003-03-20 Micro Ft:Kk Wireless communication device
US7127683B2 (en) * 2001-08-21 2006-10-24 The Boeing Company Method to detect application spoofing in mixed use avionics display
JP2003110483A (en) 2001-09-26 2003-04-11 Sanshin Ind Co Ltd Ship controller and ship control system
US20030152145A1 (en) 2001-11-15 2003-08-14 Kevin Kawakita Crash prevention recorder (CPR)/video-flight data recorder (V-FDR)/cockpit-cabin voice recorder for light aircraft with an add-on option for large commercial jets
US6803860B1 (en) 2002-02-28 2004-10-12 Garmin International, Inc. Cockpit control systems and methods of controlling data on multiple cockpit instrument panels
US6597294B1 (en) 2002-04-12 2003-07-22 Jeffrey Ariens Multi-function flight information display unit MFIDU
US6816728B2 (en) 2002-04-24 2004-11-09 Teledyne Technologies Incorporated Aircraft data communication system and method
US6915189B2 (en) 2002-10-17 2005-07-05 Teledyne Technologies Incorporated Aircraft avionics maintenance diagnostics data download transmission system
US6868320B1 (en) 2002-12-23 2005-03-15 Garmin Ltd. Methods, devices, and systems for automatic flight logs
US6967830B2 (en) 2003-08-26 2005-11-22 The Boeing Company Expansion module and network for avionic devices
US7310573B2 (en) * 2004-04-13 2007-12-18 Pratt & Whitney Canada Corp. Method and apparatus for isolating aircraft equipment
US7769501B2 (en) 2004-06-23 2010-08-03 The Boeing Company User-configurable electronic flight bag
US7620374B2 (en) 2004-09-16 2009-11-17 Harris Corporation System and method of transmitting data from an aircraft
US7421319B2 (en) 2004-10-25 2008-09-02 Arinc Inc. Systems and methods for preflight planning and inflight execution using portable electronic data storage and display devices
US7599680B2 (en) 2004-10-26 2009-10-06 General Motors Company System and method of billing for minutes shared between a portable wireless communication device and a telematics unit
US7437221B2 (en) 2004-12-16 2008-10-14 Raytheon Company Interactive device for legacy cockpit environments
CN1801807B (en) * 2005-01-05 2010-09-01 英华达(上海)电子有限公司 Safety protection module of mobile communication equipment and its processing method
US7420476B2 (en) 2005-01-07 2008-09-02 Raytheon Company Programmable cockpit upgrade system
US7499798B2 (en) 2005-02-23 2009-03-03 General Motors Corporation Method for transferring routes between navigational devices
EP1726918A1 (en) 2005-05-25 2006-11-29 Lufthansa Sytems Group GmbH Computer system for aircrafts
US8732233B2 (en) 2005-07-13 2014-05-20 The Boeing Company Integrating portable electronic devices with electronic flight bag systems installed in aircraft
US7437225B1 (en) 2005-07-29 2008-10-14 Rockwell Collins, Inc. Flight management system
US20070118274A1 (en) 2005-08-01 2007-05-24 Sytex, Inc. Telematics application protocol along with devices, systems and methods employing the same
US8164485B2 (en) * 2006-04-13 2012-04-24 The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration System and method for aiding pilot preview, rehearsal, review, and real-time visual acquisition of flight mission progress
US20080019530A1 (en) * 2006-05-30 2008-01-24 International Business Machines Corporation Message archival assurance for encrypted communications
US7689327B2 (en) 2006-11-21 2010-03-30 United Technologies Corporation Microserver adapter for an avionics box
FR2917206B1 (en) * 2007-06-06 2009-12-25 Airbus France ON-BOARD ACCESS CONTROL SYSTEM FOR OPEN DOMAIN COMMUNICATION TO THE AVIONIC DOMAIN.
US7684904B2 (en) 2007-06-27 2010-03-23 Arinc Incorporated Systems and methods for communication, navigation, surveillance and sensor system integration in a vehicle
US7835734B2 (en) 2007-09-20 2010-11-16 Honeywell International Inc. System and method for wireless routing of data from an aircraft
FR2922705B1 (en) * 2007-10-23 2011-12-09 Sagem Defense Securite BIDIRECTIONAL GATEWAY WITH REINFORCED SAFETY LEVEL
US8731155B2 (en) 2007-12-31 2014-05-20 General Motors Llc Method for remotely controlling vehicle features
FR2926375B1 (en) 2008-01-11 2010-02-12 Airbus France METHOD FOR PERFORMING COMPUTER APPLICATION, KIT AND AIRCRAFT
US8321083B2 (en) 2008-01-30 2012-11-27 The Boeing Company Aircraft maintenance laptop
US9719799B2 (en) 2008-12-12 2017-08-01 Honeywell International Inc. Next generation electronic flight bag
US20130305391A1 (en) * 2012-05-14 2013-11-14 Rosemount Aerospace, Inc. Common Computing Apparatus Providing Distinct Non-Certified And Certified Computing Platforms

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6401013B1 (en) 2000-07-11 2002-06-04 Rockwell Collins, Inc. Method and system for integrating a laptop PC in a cockpit
US20040139467A1 (en) * 2002-06-26 2004-07-15 Michael Rogerson Aircraft communication distribution system
US20050228558A1 (en) * 2004-04-12 2005-10-13 Patrick Valette Method and system for remotely communicating and interfacing with aircraft condition monitoring systems
US20080208399A1 (en) * 2007-02-27 2008-08-28 Pham Tuan A Electronic flight bag system and method
US20090041041A1 (en) * 2007-08-08 2009-02-12 Honeywell International Inc. Aircraft data link network routing
US20090058682A1 (en) * 2007-08-27 2009-03-05 Honeywell International Inc. Aircraft data network access for personal electronic devices
US20100100887A1 (en) * 2008-09-15 2010-04-22 Airbus Operations Method and device for encapsulating applications in a computer system for an aircraft

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2734905A4

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10523309B2 (en) 2012-03-01 2019-12-31 Honeywell International Inc. System for preventing unauthorized access to operational aircraft data
US10985831B2 (en) 2012-03-01 2021-04-20 Honeywell International Inc. System for preventing unauthorized access to operational aircraft data
US9571181B2 (en) 2012-03-01 2017-02-14 Honeywell International Inc. Programmable portable electronic device for airborne operational communications
US9154951B2 (en) 2013-06-04 2015-10-06 Eads Deutschland Gmbh Communication system having access control as well as method for granting access in a communication system
DE102013105746A1 (en) * 2013-06-04 2014-12-04 Airbus Defence and Space GmbH Communication system with access control and access granting in a communication system
EP2819317A3 (en) * 2013-06-27 2015-04-15 Airbus Operations (S.A.S) An aircraft-based mobile device connectivity system including an avionic system interface, a wireless interface and a data security module which receives avionic data and transmits them to mobile devices via the interfaces
US9694903B2 (en) 2013-06-27 2017-07-04 Airbus Operations (Sas) Secure aircraft-based mobile device connectivity systems and methods
US10955227B2 (en) 2014-02-13 2021-03-23 The Boeing Company Fire-retarding artillery shell
US9369868B2 (en) 2014-10-21 2016-06-14 The Boeing Company System and method for secure wireless communications between a vehicle and a source
EP3021497A1 (en) * 2014-10-21 2016-05-18 The Boeing Company System and method for secure wireless communications between a vehicle and a source
US10338803B2 (en) 2016-02-22 2019-07-02 Zodiac Aero Electric Interface for aircraft and method of control of such an interface
FR3048094A1 (en) * 2016-02-22 2017-08-25 Zodiac Aero Electric AIRCRAFT INTERFACE AND METHOD OF CONTROLLING SUCH AN INTERFACE
EP3208707A1 (en) * 2016-02-22 2017-08-23 Zodiac Aero Electric Interface for aircraft and method for controlling such an interface
CN108062458A (en) * 2016-11-07 2018-05-22 霍尼韦尔国际公司 For managing the method and system of the software license for the vehicles
CN108062458B (en) * 2016-11-07 2023-10-13 霍尼韦尔国际公司 Method and system for managing software licenses for vehicles
EP3553654A1 (en) * 2018-04-09 2019-10-16 Honeywell International Inc. Avionics data access function
EP3757759A1 (en) * 2019-06-28 2020-12-30 Honeywell International Inc. System and method to facilitate communication of an application resident on a portable computing device with an application resident in aircraft avionics
US11511881B2 (en) 2019-06-28 2022-11-29 Honeywell International Inc. System and method to facilitate communication of an application resident on a portable computing device with an application resident in aircraft avionics

Also Published As

Publication number Publication date
BR112014001567A2 (en) 2017-06-27
US20160219110A1 (en) 2016-07-28
EP2734905A4 (en) 2015-04-08
US9189655B2 (en) 2015-11-17
US20230179658A1 (en) 2023-06-08
EP2734905A1 (en) 2014-05-28
US9800665B2 (en) 2017-10-24
US9141830B2 (en) 2015-09-22
EP2734905B1 (en) 2019-07-17
US20170353557A1 (en) 2017-12-07
US20150074424A1 (en) 2015-03-12
CN104115087A (en) 2014-10-22
US20150019862A1 (en) 2015-01-15
US11496566B2 (en) 2022-11-08
CN104115087B (en) 2018-11-27

Similar Documents

Publication Publication Date Title
US20230179658A1 (en) Avionics gateway interface, systems and methods
EP2779480B1 (en) Aircraft communications switching system
US9917895B2 (en) Information providing system and method thereof
US20200068358A1 (en) Wireless Content Distribution
JP2012224328A (en) Avionics data input device
KR101707549B1 (en) Digital signage system using cloud server and control method for the same
US20210136578A1 (en) Data distribution from a movable object
EP2770787B1 (en) Passenger mobile station registration with a passenger communications system using near field communications
CN109315005B (en) Automatic updating of connections to movable objects
CN104836834A (en) System and method for remote access to on-board aircraft systems
US10070372B2 (en) Multi-mode mobile device
US10999394B2 (en) Communication method, in-vehicle communication device, computer-readable medium, and in-vehicle communication system
US20230007460A1 (en) Method and system for segmenting and transmiting data between computing devices and vehicle head units
US12112642B2 (en) Systems, methods, and apparatus for collaborative aircraft checklists
CN208682840U (en) A kind of vehicle-bone media device of rail vehicles
US20190228170A1 (en) Supporting protocol independent movable object application development
GB2524838A (en) Content delivery architecture
US11258863B1 (en) Systems, devices, and methods for establishing multiple electronic flight bag sessions with a flight management computer

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12814808

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2012814808

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 14119966

Country of ref document: US

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112014001567

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 112014001567

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20140122