Apparatus for encrypting external communication for an electric aircraft

ABSTRACT

In an aspect an apparatus for encrypting external communication for an electric aircraft. The apparatus may comprise a communication component configured to communicate with a network node. The apparatus may also include a battery pack configured to power the electric aircraft and a battery sensor, wherein a battery senor is configured to generate battery datum. A computing device may be included within the apparatus. The computing device may be configured to be receive the battery datum, encrypt the battery datum using an encryption process, identify the network node and transmit the encrypted battery datum to the network node using the communication component.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of Non-provisional application Ser. No. 17/736,458 filed on May 4, 2022 and entitled “APPARATUS FOR ENCRYPTING EXTERNAL COMMUNICATION FOR AN ELECTRIC AIRCRAFT,” the entirety of which is incorporated herein by reference.

FIELD OF THE INVENTION

The present invention generally relates to the field of electric vehicles. In particular, the present invention is directed to an apparatus for encrypting external communication for an electric aircraft.

BACKGROUND

In the operation of an electric aircraft, communication between the pilot of the electric aircraft and ground support. A reliable network may aid in connecting the pilot to ground support.

SUMMARY OF THE DISCLOSURE

In an aspect an apparatus for encrypting external communication for an electric aircraft is described. The apparatus includes a communication component configured to communicate with an electric aircraft, and a computing device communicatively connected to the communication component. The computing device is configured to receive a battery datum associated with the electric aircraft, and transmit the battery datum associated with the electric aircraft. the apparatus further includes a ground support associated with the communication component, wherein the ground support includes a charging station configured to charge the electric aircraft.

In an aspect, a method of use for encrypting external communication for an electric aircraft is described. The method includes communicating, using a communication component, with an electric aircraft. The method further including receiving, by a computing device communicatively connected to the communication component, a battery datum associated with the electric aircraft. The method further including transmitting, by the computing device, the battery datum associated with the electric aircraft. The method further including charging the electric aircraft using a charging station of a ground support, wherein the ground support is associated with the communication component.

These and other aspects and features of non-limiting embodiments of the present invention will become apparent to those skilled in the art upon review of the following description of specific non-limiting embodiments of the invention in conjunction with the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

For the purpose of illustrating the invention, the drawings show aspects of one or more embodiments of the invention. However, it should be understood that the present invention is not limited to the precise arrangements and instrumentalities shown in the drawings, wherein:

FIG. 1 is a block diagram depicting an apparatus for encrypting external communication for an electric aircraft;

FIG. 2 is a block diagram of an exemplary machine-learning process;

FIG. 3 is a schematic of an exemplary electric aircraft;

FIG. 4 is a diagrammatic representation of an exemplary s of a battery module;

FIG. 5 is a block diagram of an exemplary embodiment of an authentication module;

FIG. 6 is a block diagram illustrating an exemplary embodiment of an authentication database;

FIG. 7 is a block diagram illustrating an exemplary embodiment of a physical signature database;

FIG. 8 is a schematic of an exemplary sensor suite;

FIG. 9 is a block diagram of an exemplary flight controller;

FIG. 10 is a schematic of an exemplary avionic mesh network;

FIG. 11 is a block diagram of an exemplary method of use for an apparatus for encrypting external communication for an electric aircraft; and

FIG. 12 is a block diagram of a computing system that can be used to implement any one or more of the methodologies disclosed herein and any one or more portions thereof.

The drawings are not necessarily to scale and may be illustrated by phantom lines, diagrammatic representations, and fragmentary views. In certain instances, details that are not necessary for an understanding of the embodiments or that render other details difficult to perceive may have been omitted.

DETAILED DESCRIPTION

At a high level, aspects of the present disclosure are directed to an apparatus for encrypting external communication for an electric aircraft. The apparatus may comprise a communication component configured to generate a communication link with ground support. The apparatus may also include a battery pack configured to power the electric aircraft and a battery sensor, wherein a battery senor is configured to generate battery datum. A computing device may be included within the apparatus. The computing device may be configured to be receive the battery datum, encrypt the battery datum using an encryption process, and transmit the battery datum using the communication component. Exemplary embodiments illustrating aspects of the present disclosure are described below in the context of several specific examples.

Referring now to FIG. 1 , an exemplary embodiment of an apparatus 100 for an apparatus for encrypting external communication for an electric aircraft is illustrated. System includes a computing device 104. computing device 104 may include any computing device as described in this disclosure, including without limitation a microcontroller, microprocessor, digital signal processor (DSP) and/or system on a chip (SoC) as described in this disclosure. Computing device may include, be included in, and/or communicate with a mobile device such as a mobile telephone or smartphone. computing device 104 may include a single computing device operating independently, or may include two or more computing device operating in concert, in parallel, sequentially or the like; two or more computing devices may be included together in a single computing device or in two or more computing devices. computing device 104 may interface or communicate with one or more additional devices as described below in further detail via a network interface device. Network interface device may be utilized for connecting computing device 104 to one or more of a variety of networks, and one or more devices. Examples of a network interface device include, but are not limited to, a network interface card (e.g., a mobile network interface card, a LAN card), a modem, and any combination thereof. Examples of a network include, but are not limited to, a wide area network (e.g., the Internet, an enterprise network), a local area network (e.g., a network associated with an office, a building, a campus or other relatively small geographic space), a telephone network, a data network associated with a telephone/voice provider (e.g., a mobile communications provider data and/or voice network), a direct connection between two computing devices, and any combinations thereof. A network may employ a wired and/or a wireless mode of communication. In general, any network topology may be used. Information (e.g., data, software etc.) may be communicated to and/or from a computer and/or a computing device. computing device 104 may include but is not limited to, for example, a computing device or cluster of computing devices in a first location and a second computing device or cluster of computing devices in a second location. computing device 104 may include one or more computing devices dedicated to data storage, security, distribution of traffic for load balancing, and the like. computing device 104 may distribute one or more computing tasks as described below across a plurality of computing devices of computing device, which may operate in parallel, in series, redundantly, or in any other manner used for distribution of tasks or memory between computing devices. computing device 104 may be implemented using a “shared nothing” architecture in which data is cached at the worker, in an embodiment, this may enable scalability of system 100 and/or computing device.

With continued reference to FIG. 1 , computing device 104 may be designed and/or configured to perform any method, method step, or sequence of method steps in any embodiment described in this disclosure, in any order and with any degree of repetition. For instance, computing device 104 may be configured to perform a single step or sequence repeatedly until a desired or commanded outcome is achieved; repetition of a step or a sequence of steps may be performed iteratively and/or recursively using outputs of previous repetitions as inputs to subsequent repetitions, aggregating inputs and/or outputs of repetitions to produce an aggregate result, reduction or decrement of one or more variables such as global variables, and/or division of a larger processing task into a set of iteratively addressed smaller processing tasks. computing device 104 may perform any step or sequence of steps as described in this disclosure in parallel, such as simultaneously and/or substantially simultaneously performing a step two or more times using two or more parallel threads, processor cores, or the like; division of tasks between parallel threads and/or processes may be performed according to any protocol suitable for division of tasks between iterations. Persons skilled in the art, upon reviewing the entirety of this disclosure, will be aware of various ways in which steps, sequences of steps, processing tasks, and/or data may be subdivided, shared, or otherwise dealt with using iteration, recursion, and/or parallel processing.

Still referring to FIG. 1 , apparatus 100 may include an electric aircraft. In a non-limiting embodiment, the electric aircraft may include an electric vertical take-off and landing (eVTOL) aircraft, a drone, an unmanned aerial vehicle (UAV), etc. In a non-limiting embodiment, apparatus 100 may include electric aircraft 108, wherein electric aircraft 108 is configured to transmit their respective aircraft data or battery datum 112 to computing device 104. An “aircraft data,” for the purpose of this disclosure, is a collection of information generated by an electric aircraft describing any information involving the electric aircraft and/or captured by the electric aircraft. In a non-limiting embodiment, aircraft data may include a component state data. A “component state data,” for the purposes of this disclosure, is an element of data describing the status or health status of a flight component or any component of an electric aircraft. A “flight component,” for the purposes of this disclosure, includes components related to, and mechanically connected to an aircraft that manipulates a fluid medium in order to propel and maneuver the aircraft through the fluid medium. A flight component or component may include a motor and/or an airframe of an electric aircraft. In some cases, component state data may include motor overspeed, motor over attempt, motor overtemperature, airframe overload and the like. The operation of the aircraft through the fluid medium will be discussed at greater length hereinbelow. The component state data may include information such as, but not limited to, an aircraft flight duration, a distance of the aircraft flight, a plurality of distances of an aircraft from the surface, and the like. The component state data may denote a location of the aircraft, status of the aircraft such as health and/or functionality, aircraft flight time, aircraft on frame time, and the like thereof. In a non-limiting embodiment, component state data may include aircraft logistics of an electric aircraft of a plurality of electrical aircraft. An “aircraft logistics,” for the purposes of this disclosure, refer to a collection of datum representing any detailed organization and implementation of an operation of an electric aircraft. In a non-limiting embodiment, aircraft logistics may include unique identification numbers assigned to each electric aircraft. In a non-limiting embodiment, aircraft logistics may include a historical record of locations corresponding to an electric aircraft that may represent the aircraft's destination or potential destination. Aircraft logistics may include time an electric aircraft was in the air and a historical record of the different rate of velocity the aircraft may have commanded. In a non-limiting embodiment, the component state data may include a history of health information of an electric aircraft. In a non-limiting embodiment, a history of an electric aircraft's health may be measured with the ability to be presented in a visual format to a user.

With continued reference to FIG. 1 , apparatus 100 may include a network 116 configured to connect the electric aircraft 108 to ground control and other electric aircrafts and communicate with each other as a function of computing device 104. A “network,” for the purpose of this disclosure, is any medium configured to facilitate communication between two or more devices. Network 116 may include any mesh network described in this disclosure, for example without limitation an avionic mesh network. For instance and without limitation, the avionic mesh network may be consistent with the avionic mesh network in U.S. patent application Ser. No. 17/348,916 and entitled “METHODS AND SYSTEMS FOR SIMULATED OPERATION OF AN ELECTRIC VERTICAL TAKE-OFF AND LANDING (EVTOL) AIRCRAFT,” which is incorporated by reference herein in its entirety. In a non-limiting embodiment, network 116 may include a central mesh network and a plurality of local mesh networks. A “central mesh network,” as used in this disclosure, is a mesh network used by electric aircrafts, wherein each node of the central mesh network includes an entity that is associated with the fleet. Any mesh network may include a computing device configured to generate nodes to its mesh network. In a non-limiting embodiment, each node of the central mesh network may include any electric aircraft of the same fleet and any entity such as, but not limited to, a ground support 124 associated with the fleet, a fleet manager of the fleet of electric aircrafts operating a remote device, and the like thereof. A “local mesh network,” as used in this disclosure, is a mesh network created by the computing device of an electric aircraft of the fleet, wherein the electric aircraft is the central node of its local mesh network. In a non-limiting embodiment, each electric aircraft may be the central node if its respective local mesh network. This is so, at least in part, because an electric aircraft of the fleet may detect other entities not associated with the fleet such as, but not limited to, other aircrafts, an air traffic control authority, and the like thereof, that the central mesh network of the fleet may not be in range of detecting the other entities. The central mesh network and/or the local mesh network may include some security program such as authentication module 136 to authorize some level of communication between the electric aircraft and the other entities. In a non-limiting embodiment, the central mesh network may authenticate the other entities and generate additional nodes into the central mesh network temporarily. In another non-limiting embodiment, the central mesh network may merge with the plurality of local mesh networks. Alternatively or additionally, the central mesh network may be a merge of the plurality of local mesh networks. In some embodiments, the central mesh network may generate the additional nodes and integrate them into the central mesh network and delete those nodes. The central mesh network may only temporarily generate the additional nodes to allow for any data the central mesh network may have to be sent over to the other entities via the additional nodes. The central mesh network may then delete those nodes once communication is complete. The central mesh network may include a central node, which may be a ground station associated with the fleet and/or a fleet manager, wherein the range of the central mesh network originates from the position of the central node. Persons skilled in the art, upon reviewing the entirety of this disclosure, will be aware of various levels of access of nodes and data for purposes as described herein.

In a non-limiting embodiment, network 116 may be configured to identify any nearby electric aircraft. Network 116 and/or computing device 104 may be configured to identify if the nearby electric aircraft is part of the fleet of electric aircrafts associated with computing device 104 and/or network 116 via an authentication module 136. An “authentication module,” for the purpose of this disclosure, is a hardware and/or software module configured to authenticate an electric aircraft and/or user associated with the electric aircraft. In a non-limiting embodiment, computing device 104 may be configured to establish a connection with between the plurality of electric aircrafts of the electric aircraft fleet, via network 116 or any radio frequency or Bluetooth connection using authentication module 136. In a non-limiting embodiment, authentication may be performed automatically via authentication module 136. In a non-limiting embodiment, authentication may be performed manually by a fleet manager using a remote user device comprising computing device 104. A “fleet manager,” for the purpose of this disclosure, is an authoritative figure configured to monitor, manage, and/or supervise the network communication of an electric aircraft fleet assigned to the fleet manager. A “remote user device,” for the purpose of this disclosure, is a computing device that includes an interactive device and graphical user interface (GUI). The remote user device may be used as an interactive platform that may provide visualization of the fleet communication and aircraft data 108 being transferred. The remote user device may be used to monitor and verify additional electric aircrafts of the fleet into network 116. Persons skilled in the art, upon reviewing the entirety of this disclosure, will be aware of the management of the electric aircraft fleet communication by a fleet manager for authentication purposes as described herein.

Still referring to FIG. 1 , apparatus 100 may include communication components 120. “Communication components” as used in this disclosure are any devices capable of receiving and transmitting data. In a non-limiting embodiment, the communication components may include a transceiver. For example and without limitation, communication components 120 may be configured to transfer transmissions signals describing battery datum 112 to each other. Each communication component may be assigned to an electric aircraft or ground support. In a non-limiting embodiment, computing device 104 may include a plurality of communication components for each electric aircraft of the fleet or each ground support station. In a non-limiting embodiment, only some of the electric aircraft or ground support 124 stations may be online and/or communicating via network 116, in which only the connected electric aircrafts and ground support station and their associated communication components may be active in the communication process.

Still referring to FIG. 1 , the communication components may include a physical CAN bus unit and/or virtual CAN bus unit. For example and without limitation, each communication component may receive transmission signals comprising of aircraft data 108 from a physical CAN bus unit of the electric aircraft the communication component is receiving from. For instance, if electric aircraft 108 wants to communicate and/or transmit data to ground support, electric aircraft 108 may transmit battery data to communication component 120, which may transfer transmission signals of battery datum 112 to ground support 12 In a non-limiting embodiment, communication component 120 comprising a physical CAN bus unit may transmit the transmission signals containing battery datum 112 to a physical CAN bus unit of communication component 120. Alternatively or additionally communication component 120 comprising a virtual CAN bus unit may transmit the transmission signals containing battery datum 112 to a virtual CAN bus unit of communication component 120.

Still referring to FIG. 1 , computing device 104 may use communication component 120 to generate various networking systems and/or layers. In a non-limiting embodiment, computing device 104 may include an automated broadcaster configured to determine the location of each electric aircraft connected within network 116. The automated broadcaster may include an Automatic Dependent Surveillance-Broadcast (ADS-B) which includes a surveillance technology in which a simulated vehicle may determine the position of the simulated vehicle of its respected simulation device. In a non-limiting embodiment, computing device 104 may be configured to communicate with an air traffic control (ATC) operator and or pilots of other electric aircrafts for flight plan purpose. For example and without limitation, the data from automated broadcaster can also be received by other aircrafts to provide situational awareness and allow self-separation. In a non-limiting embodiment, ADS-B is “automatic” in that it requires no pilot or external input. It is “dependent” in that it depends on data from the aircraft's navigation system. In a non-limiting embodiment, the automated broadcaster may be configured to be a hub for digital communication with at least a simulated air traffic control operator of the simulated air traffic control. For instance and without limitation, the communication component may be consistent with the communication component in U.S. patent application Ser. No. 17/574,919 (Attorney Docket No. 1024-193USU1) and entitled “SYSTEMS AND METHODS FOR SWARM COMMUNICATION FOR AN ELECTRIC AIRCRAFT FLEET,” which is incorporated by reference herein in its entirety.

With continued reference to FIG. 1 , computing device 104 may include a plurality of physical controller area network buses. A “physical controller area network bus,” as used in this disclosure, is vehicle bus unit including a central processing unit (CPU), a CAN controller, and a transceiver designed to allow devices to communicate with each other's applications without the need of a host computer which is located physically at the aircraft. For instance and without limitation, CAN bus unit may be consistent with disclosure of CAN bus unit in U.S. patent application Ser. No. 17/218,342 and titled “METHOD AND SYSTEM FOR VIRTUALIZING A PLURALITY OF CONTROLLER AREA NETWORK BUS UNITS COMMUNICATIVELY CONNECTED TO AN AIRCRAFT,” which is incorporated herein by reference in its entirety. Physical controller area network (CAN) bus unit may include physical circuit elements that may use, for instance and without limitation, twisted pair, digital circuit elements/FGPA, microcontroller, or the like to perform, without limitation, processing and/or signal transmission processes and/or tasks; circuit elements may be used to implement CAN bus components and/or constituent parts as described in further detail below. Physical CAN bus unit may include multiplex electrical wiring for transmission of multiplexed signaling. Physical CAN bus unit may include message-based protocol(s), wherein the invoking program sends a message to a process and relies on that process and its supporting infrastructure to then select and run appropriate programing. In a non-limiting embodiment, computing device 104 may include a plurality of physical CAN bus units wherein each physical CAN bus unit is configured to receive an aircraft data from an electric aircraft, wherein each physical CAN bus unit is associated with receiving datum from that specific electric aircraft. In some embodiments, computing device 104 may assign a physical CAN bus unit to a unique electric aircraft of the fleet.

Still referring to FIG. 1 , computing device 104 may include a plurality of controller area network gateways connected to the plurality of physical CAN bus units. A “controller area network gateway,” as used in this disclosure, is a piece of networking hardware used for transmission of data signals from one discrete network to another. In a non-limiting embodiment, the CAN gateways may include routers and/or switches which may provide interoperability between physical CAN bus units communicatively connected with the electric aircrafts and switches, such as Ethernet switches, wherein the intraoperatively may include the transmission of battery datum 112 between the electric aircraft and the Ethernet switch. In a non-limiting embodiment, computing device 104 may include at least a network switch communicatively connected to the plurality of controller area network gateways configured to receive the transmitted measured state data and transmit the measured state data via a transmission signal. A “network switch,” as used in this disclosure, is a networking hardware that connects devices on a computer network using packet switching to receive and forward data to a destination device. A network switch may include an Ethernet hub switch, which may be used for Fiber Channel.

Continuing in reference to FIG. 1 , a transmission signal of battery datum 112 from a physical CAN bus unit located at aircraft may be transmitted to a virtual CAN bus, and/or virtual CAN bus unit. For instance and without limitation, the virtual CAN bus unit may be consistent with the virtual CAN bus unit in U.S. patent application Ser. No. 17/218,342. In a non-limiting embodiment, computing device 104 may additionally include or be configured to perform operations functioning a virtual controller area network. virtual CAN bus unit may be configured to demultiplex an incoming transmission signal into a plurality of outgoing messages originating from the plurality of physical controller area network buses. Demultiplexing may include processes of reconverting a transmission signal containing, for example containing multiple analogue and/or digital signal streams from at electric aircraft 108 and/or computing device 104, back into original separate and unrelated signals originally relayed from controller area network. Demultiplexing may include extracting original channels on a receiving end to identify which physical CAN bus unit a signal originates from. Demultiplexing may be performed using a demultiplexer such as a binary decoder, or any programmable logic device. Demultiplexing may be performed using a computing software operating on the virtual CAN bus unit, which may deconvolute a signal.

With continued reference to FIG. 1 , the term ‘battery’ is used as a collection of cells connected in series or parallel to each other. A battery cell 128 may, when used in conjunction with other cells, may be electrically connected in series, in parallel or a combination of series and parallel. Series connection comprises wiring a first terminal of a first cell to a second terminal of a second cell and further configured to comprise a single conductive path for electricity to flow while maintaining the same current (measured in Amperes) through any component in the circuit. A battery cell 128 may use the term ‘wired’, but one of ordinary skill in the art would appreciate that this term is synonymous with ‘electrically connected’, and that there are many ways to couple electrical elements like battery cells 128 together. An example of a connector that do not comprise wires may be prefabricated terminals of a first gender that mate with a second terminal with a second gender. Battery cells 128 may be wired in parallel. Parallel connection comprises wiring a first and second terminal of a first battery cell to a first and second terminal of a second battery cell and further configured to comprise more than one conductive path for electricity to flow while maintaining the same voltage (measured in Volts) across any component in the circuit. Battery cells 128 may be wired in a series-parallel circuit which combines characteristics of the constituent circuit types to this combination circuit. Battery cells 128 may be electrically connected in a virtually unlimited arrangement which may confer onto the system the electrical advantages associated with that arrangement such as high-voltage applications, high-current applications, or the like. In an exemplary embodiment, Battery module 128 comprise 196 battery cells in series and 18 battery cells in parallel. This is, as someone of ordinary skill in the art would appreciate, is only an example and Battery module 104 may be configured to have a near limitless arrangement of battery cell configurations. For instance and without limitation, the battery may be consistent with the battery in U.S. patent application Ser. No. 17/564,305 (Attorney Docket No. 1024-355USU1) and entitled “SYSTEM FOR TRANSMITTING BATTERY PACK DATA OF AN ELECTRIC AIRCRAFT AND METHOD FOR ITS USE,” which is incorporated by reference herein in its entirety.

With continued reference to FIG. 1 , a plurality of battery modules 128 may also comprise a side wall which comprises a laminate of a plurality of layers configured to thermally insulate the plurality of battery cells 128 from external components of battery module 128. Side wall layers may comprise materials which possess characteristics suitable for thermal insulation as described in the entirety of this disclosure like fiberglass, air, iron fibers, polystyrene foam, and thin plastic films, to name a few. Side wall may additionally or alternatively electrically insulate the plurality of battery cells 128 from external components of battery module and the layers of which may comprise polyvinyl chloride (PVC), glass, asbestos, rigid laminate, varnish, resin, paper, Teflon, rubber, and mechanical lamina. Center sheet may be mechanically coupled to side wall in any manner described in the entirety of this disclosure or otherwise undisclosed methods, alone or in combination. Side wall may comprise a feature for alignment and coupling to center sheet. This feature may comprise a cutout, slots, holes, bosses, ridges, channels, and/or other undisclosed mechanical features, alone or in combination. Plurality of battery module may be a combination of a plurality of battery module 128 utilized to power the electric aircraft. Battery module may include any of the batteries described in U.S. Nonprovisional application Ser. No. 16/948,140, filed on Sep. 4, 2020, and entitled “SYSTEM AND METHOD FOR HIGH ENERGY DENSITY BATTERY MODULE”, the entirety of which is incorporated herein by reference.

With continued reference to FIG. 1 , at least a battery sensor 132 is configured to detect battery datum 112. For the purposes of this disclosure, a “battery datum” is an electronic signal representing an element of information and/or a parameter of a detected electrical and/or physical characteristic and/or phenomenon correlated with a state of a battery. Battery datum 112 may include but is not limited to battery temperature, battery health, battery life cycle, battery capacity, battery discharge rate, battery charge cycle, battery maximum capacity, battery remaining capacity, and the like. Battery datum 112 may additionally include any information describing the state of the battery pack. In some embodiments, battery datum may include data regarding the amount of energy used by the electric aircraft, such as the amount of energy used since last charge.

Still referring to FIG. 1 , as used in this disclosure, a “sensor” is a device that is configured to detect a phenomenon and transmit information related to the detection of the phenomenon electronically. For example, in some cases a sensor may transduce a detected phenomenon, such as without limitation, voltage, current, speed, direction, force, torque, resistance, moisture temperature, pressure, and the like, into a sensed signal. Sensor may include one or more sensors which may be the same, similar, or different. Sensor may include a plurality of sensors which may be the same, similar, or different. Sensor may include one or more sensor suites with sensors in each sensor suite being the same, similar, or different.

Still referring to FIG. 1 , battery sensor 132 may include any number of suitable sensors which may be efficaciously used to detect battery datum 112. For example, and without limitation, these sensors may include a voltage sensor, current sensor, multimeter, voltmeter, ammeter, electrical current sensor, resistance sensor, impedance sensor, capacitance sensor, a Wheatstone bridge, displacements sensor, vibration sensor, Daly detector, electroscope, electron multiplier, Faraday cup, galvanometer, Hall effect sensor, Hall probe, magnetic sensor, optical sensor, magnetometer, magnetoresistance sensor, MEMS magnetic field sensor, metal detector, planar Hall sensor, thermal sensor, and the like, among others. Battery sensor 132 may efficaciously include, without limitation, any of the sensors disclosed in the entirety of the present disclosure

With continued reference to FIG. 1 , battery datum 112 may include battery temperature. As used in the current disclosure, “battery temperature” is the temperature of the battery at a given time. In some embodiments, Battery temperature may include the ideal temperature of the battery. In other embodiments, battery temperature may include the current temperature of the battery. Battery temperature may include pre-flight battery temperature and post charging battery temperature. As used in this disclosure, a “pre-flight battery temperature” is a temperature a battery is to be set to before the electric aircraft takes off. As used in this disclosure, “post-charging battery temperature datum” is datum related to and/or indicating a temperature of a battery during a charging process or shortly after the charging process is complete. Battery temperature may also include a comparison between the pre-flight battery temperature and the post-charging battery temperature.

With continued reference to FIG. 1 , battery datum 112 may include battery health. As used in the current disclosure, a “battery health datum” is a datum indicative of an overall state of health of the battery. The state of health of the battery may be measured by comparing the batteries current state of health against the batteries state of health at the time it was manufactured. The state of health of the battery may take into account internal resistance, capacity, voltage, self-discharge, ability to accept a charge, number of charge-discharge cycles, age of the battery, the average temperature of the battery and the like.

With continued reference to FIG. 1 , battery datum 112 may include battery life cycle datum. As used in the current disclosure, “battery life cycle datum” is a datum regarding the batteries charge cycle. A charge cycle is the process of charging a rechargeable battery and discharging it as required into a load. In general, number of cycles for a rechargeable battery indicates how many times it can undergo the process of complete charging and discharging until failure or it starting to lose capacity. In embodiments, battery life cycle datum may be used to estimate when the battery needs to be replaced. In other embodiments, battery life cycle datum maybe used to estimate how much charge a battery will be able to hold. A determination of state of charge (SOC) may be used to determine the battery life cycle datum. As a non-limiting example, the power and current draws may be from environmental conditions, components of the energy source or other factors which impact the energy source state of charge (SOC). SOC, as used herein, is a measure of remaining capacity as a function of time and is described in more detail below. SOC and/or maximum power the battery 104 can deliver may decrease during flight as the voltage decreases during discharge. SOC and/or power output capacity of an energy source may be associated with an ability of the battery to deliver energy as needed for a task such as driving a propulsor for a phase of flight such as landing, hovering, or the like. As a non-limiting example, other factors, including state of voltage, and/or estimates of state of voltage or other electrical parameters of an energy source, may be used to estimate current state of a battery 128 and/or future ability to deliver power and/or energy. Certain calculations of battery life cycle datum, state of charge, and state of voltage which may efficaciously be utilized in accordance with certain embodiments of the present disclosure are disclosed in U.S. Nonprovisional application Ser. No. 17/349,182, filed on Jun. 16, 2021, entitled “SYSTEMS AND METHODS FOR INFLIGHT OPERATION ASSESSMENT,” (Attorney Docket No. 1024-004USC1), the entirety of which is incorporated herein by reference.

Still referring to FIG. 1 , computing device 104 may be configured to analyze battery datum 112. As used in the current disclosure, “Analyzing battery datum” is the process of systematically applying statistical and/or logical techniques to describe and illustrate, condense, and recap, and evaluate battery datum. In embodiments, analyzing battery datum 112 may consist of taking the raw battery data collected from at least a sensor and refining it into useful statistics and metrics regarding the electric aircraft. For example, battery datum analysis may include analyzing the batteries life cycle datum and the batteries health. Battery datum analysis may also include information about the electric vehicle.

Still referring to FIG. 1 , computing device 104 may be configured to analyze battery datum 112 using machine learning. Machine-learning module may perform determinations, classification, and/or analysis steps, methods, processes, or the like as described in this disclosure using machine learning processes. A “machine learning process,” as used in this disclosure, is a process that automatedly uses training data to generate an algorithm that will be performed by a computing device/module to produce a battery datum analysis given battery data provided as inputs. As used in the current disclosure, “training data,” as used herein, is data containing correlations that a machine-learning process may use to model relationships between two or more categories of data. In some embodiments, the inputs into the machine learning process are a batteries life cycle datum and the batteries health and the output of the process the battery datum analysis. In a non-limiting example, training data that may be correlated to include battery datum such as internal resistance, capacity, voltage, self-discharge, ability to accept a charge, number of charge-discharge cycles, age of the battery, the average temperature of the battery, batteries life cycle datum, batteries health and the like. In some embodiments, training data may include datum recorded previous flights where batteries acted within an optimal range, did not require modifications to the flight plan due to battery issues, and did not exceed or drop below a desired temperature range. In some embodiments, training data may be generated via electronic communication between a computing device and plurality of sensors. In other embodiments, training data may be communicated to a machine learning model from a remote device. Once the machine learning process receives training data, it may be implemented in any manner suitable for generation of receipt, implementation, or generation of machine learning.

Still referring to FIG. 1 , computing device 104 may be configured to analyze battery datum as a function of a battery's life cycle datum. In embodiments, battery datum 112 analysis may include analysis of the batteries life cycle to determine life expectancy of the battery. This life expectancy analysis may be averaged with the life span of other batteries to create an estimated life expectancy of a battery. In other embodiments, battery datum analysis may be used to determine the capacity of the battery to hold a charge. Battery datum analysis maybe electric vehicles to estimate fleet's life span and maintenance costs.

Still referring to FIG. 1 , computing device 104 may be configured to analyze battery datum as a function of a battery's health. In embodiments, battery datum analysis may include an evaluation of battery datum such as internal resistance, capacity, voltage, self-discharge, ability to accept a charge, number of charge-discharge cycles, age of the battery, the average temperature of the battery and the like. Battery datum analysis may compile all the aforementioned variables into one statistic to determine the overall state of health of the battery. Battery datum analysis compare the current state of health of the battery to the state of health of the Battery at the time of manufacturing

With continued reference to FIG. 1 , the electric aircraft 108 may encrypt its respective battery datum 112 before transmitting it to another party such as ground support 124, another electric aircraft 108, and/or computing device 104. Computing device 104 may be configured to decrypt aircraft data 108 received, confirm the identity of the electric aircraft of both the sender and recipient of the aircraft data, which could be another electric aircraft, and transmit the aircraft data to the recipient. For example and without limitation, electric aircraft 108 may want to transmit its battery datum 112 to another electric aircraft or ground support 124, in which the transmission is completed through computing device 104 and its communication components 120. Persons skilled in the art, upon reviewing the entirety of this disclosure, will be aware of the using encryption and decryption methodologies in the context of transferring data between electric aircrafts.

With continued reference to FIG. 1 , apparatus 100 may include a ground support 124. As used in the current disclosure, “ground support” is a ground-based air traffic controllers who direct aircraft on the ground and through a given section of controlled airspace and can provide advisory services to aircraft in non-controlled airspace. Ground support 124 may include but is not limited to a charging station, landing station, air traffic control, airports, and the like. IN an embodiment Ground support 124 may monitor the location of aircraft in their assigned airspace by radar and communicate with the pilots by radio. In other embodiments, Ground Support 124 enforces traffic separation rules and other FAA rules, which ensure each aircraft always maintains a minimum amount of empty space around it. Ground support 124 may direct an aircraft to a charging station as a function of battery datum. Ground support 124 may also be in communication with the pilot of an electric aircraft.

With continued reference to FIG. 1 , network 116 may be configured to identify any nearby ground support 124. Network 116 and/or computing device 104 may be configured to identify if the nearby ground support 124 or electric aircraft associated with computing device 104 and/or network 116 via an authentication module 136. An “authentication module,” for the purpose of this disclosure, is a hardware and/or software module configured to authenticate an electric aircraft and/or user associated with the electric aircraft. In a non-limiting embodiment, computing device 104 may be configured to establish a connection with between the plurality of electric aircrafts of the electric aircraft fleet, via network 116 or any radio frequency or Bluetooth connection using authentication module 136. In a non-limiting embodiment, authentication may be performed automatically via authentication module 136. In a non-limiting embodiment, authentication may be performed manually by a fleet manager using a remote user device comprising computing device 104. A “fleet manager,” for the purpose of this disclosure, is an authoritative figure configured to monitor, manage, and/or supervise the network communication of an electric aircraft fleet assigned to the fleet manager. A “remote user device,” for the purpose of this disclosure, is a computing device that includes an interactive device and graphical user interface (GUI). The remote user device may be used as an interactive platform that may provide visualization of the fleet communication and aircraft data 108 being transferred. The remote user device may be used to monitor and verify additional electric aircrafts of the fleet into network 116. Persons skilled in the art, upon reviewing the entirety of this disclosure, will be aware of the management of the electric aircraft fleet communication by a fleet manager for authentication purposes as described herein.

In a non-limiting embodiment, computing device 104 may be configured to compare the credential from user device to an authorized credential stored within an authentication database, and bypass authentication for user device based on the comparison of the credential from user device to the authorized credential stored within the authentication database. A “credential” as described in the entirety of this disclosure, is any datum representing an identity, attribute, code, and/or characteristic specific to a user, a user device, and/or an electric aircraft. For example and without limitation, the credential may include a username and password unique to the user, the user device, and/or the electric aircraft. The username and password may include any alpha-numeric character, letter case, and/or special character. As a further example and without limitation, the credential may include a digital certificate, such as a PKI certificate. The remote user device and/or the electric aircraft may include an additional computing device, such as a mobile device, laptop, desktop computer, or the like; as a non-limiting example, the user device may be a computer and/or smart phone operated by a pilot-in-training at an airport hangar. The remote user device and/or electric aircraft may include, without limitation, a display in communication with computing device 104; the display may include any display as described in the entirety of this disclosure such as a light emitting diode (LED) screen, liquid crystal display (LCD), organic LED, cathode ray tube (CRT), touch screen, or any combination thereof. Output data from computing device 104 may be configured to be displayed on user device using an output graphical user interface. An output graphical user interface may display any output as described in the entirety of this disclosure. As a further embodiment, authentication module 136 and/or computing device 104 may be configured to receive a credential from an admin device. The admin device may include any additional computing device as described above in further detail, wherein the additional computing device is utilized by/associated with an employee of an administrative body, such as an employee of the federal aviation administration.

With continued reference to FIG. 1 , apparatus 100 may include a cloud database 140 configured to record any record or data that may be transmitted within network 116. A “cloud database,” for the purpose of this disclosure, is a data storage system that runs on a cloud computing platform such as computing device 104. In a non-limiting embodiment, cloud database 140 may store any aircraft data 108 as described herein. In another non-limiting embodiment, cloud database 140 may be used by computing device 104 to retrieve any training data for machine-learning purposes.

Referring now to FIG. 2 , an exemplary embodiment of a machine-learning module 200 that may perform one or more machine-learning processes as described in this disclosure is illustrated. Machine-learning module may perform determinations, classification, and/or analysis steps, methods, processes, or the like as described in this disclosure using machine learning processes. A “machine learning process,” as used in this disclosure, is a process that automatedly uses training data 204 to generate an algorithm that will be performed by a computing device/module to produce outputs 208 given data provided as inputs 212; this is in contrast to a non-machine learning software program where the commands to be executed are determined in advance by a user and written in a programming language.

Still referring to FIG. 2 , “training data,” as used herein, is data containing correlations that a machine-learning process may use to model relationships between two or more categories of data elements. For instance, and without limitation, training data 204 may include a plurality of data entries, each entry representing a set of data elements that were recorded, received, and/or generated together; data elements may be correlated by shared existence in a given data entry, by proximity in a given data entry, or the like. Multiple data entries in training data 204 may evince one or more trends in correlations between categories of data elements; for instance, and without limitation, a higher value of a first data element belonging to a first category of data element may tend to correlate to a higher value of a second data element belonging to a second category of data element, indicating a possible proportional or other mathematical relationship linking values belonging to the two categories. Multiple categories of data elements may be related in training data 204 according to various correlations; correlations may indicate causative and/or predictive links between categories of data elements, which may be modeled as relationships such as mathematical relationships by machine-learning processes as described in further detail below. Training data 204 may be formatted and/or organized by categories of data elements, for instance by associating data elements with one or more descriptors corresponding to categories of data elements. As a non-limiting example, training data 204 may include data entered in standardized forms by persons or processes, such that entry of a given data element in a given field in a form may be mapped to one or more descriptors of categories. Elements in training data 204 may be linked to descriptors of categories by tags, tokens, or other data elements; for instance, and without limitation, training data 204 may be provided in fixed-length formats, formats linking positions of data to categories such as comma-separated value (CSV) formats and/or self-describing formats such as extensible markup language (XML), JavaScript Object Notation (JSON), or the like, enabling processes or devices to detect categories of data.

Alternatively or additionally, and continuing to refer to FIG. 2 , training data 204 may include one or more elements that are not categorized; that is, training data 204 may not be formatted or contain descriptors for some elements of data. Machine-learning algorithms and/or other processes may sort training data 204 according to one or more categorizations using, for instance, natural language processing algorithms, tokenization, detection of correlated values in raw data and the like; categories may be generated using correlation and/or other processing algorithms. As a non-limiting example, in a corpus of text, phrases making up a number “n” of compound words, such as nouns modified by other nouns, may be identified according to a statistically significant prevalence of n-grams containing such words in a particular order; such an n-gram may be categorized as an element of language such as a “word” to be tracked similarly to single words, generating a new category as a result of statistical analysis. Similarly, in a data entry including some textual data, a person's name may be identified by reference to a list, dictionary, or other compendium of terms, permitting ad-hoc categorization by machine-learning algorithms, and/or automated association of data in the data entry with descriptors or into a given format. The ability to categorize data entries automatedly may enable the same training data 204 to be made applicable for two or more distinct machine-learning algorithms as described in further detail below. Training data 204 used by machine-learning module 200 may correlate any input data as described in this disclosure to any output data as described in this disclosure. As a non-limiting illustrative example flight elements and/or pilot signals may be inputs, wherein an output may be an autonomous function.

Further referring to FIG. 2 , training data may be filtered, sorted, and/or selected using one or more supervised and/or unsupervised machine-learning processes and/or models as described in further detail below; such models may include without limitation a training data classifier 216. Training data classifier 216 may include a “classifier,” which as used in this disclosure is a machine-learning model as defined below, such as a mathematical model, neural net, or program generated by a machine learning algorithm known as a “classification algorithm,” as described in further detail below, that sorts inputs into categories or bins of data, outputting the categories or bins of data and/or labels associated therewith. A classifier may be configured to output at least a datum that labels or otherwise identifies a set of data that are clustered together, found to be close under a distance metric as described below, or the like. Machine-learning module 200 may generate a classifier using a classification algorithm, defined as a process whereby a computing device and/or any module and/or component operating thereon derives a classifier from training data 204. Classification may be performed using, without limitation, linear classifiers such as without limitation logistic regression and/or naive Bayes classifiers, nearest neighbor classifiers such as k-nearest neighbors classifiers, support vector machines, least squares support vector machines, fisher's linear discriminant, quadratic classifiers, decision trees, boosted trees, random forest classifiers, learning vector quantization, and/or neural network-based classifiers. As a non-limiting example, training data classifier 1616 may classify elements of training data to sub-categories of flight elements such as torques, forces, thrusts, directions, and the like thereof.

Still referring to FIG. 2 , machine-learning module 200 may be configured to perform a lazy-learning process 220 and/or protocol, which may alternatively be referred to as a “lazy loading” or “call-when-needed” process and/or protocol, may be a process whereby machine learning is conducted upon receipt of an input to be converted to an output, by combining the input and training set to derive the algorithm to be used to produce the output on demand. For instance, an initial set of simulations may be performed to cover an initial heuristic and/or “first guess” at an output and/or relationship. As a non-limiting example, an initial heuristic may include a ranking of associations between inputs and elements of training data 204. Heuristic may include selecting some number of highest-ranking associations and/or training data 204 elements. Lazy learning may implement any suitable lazy learning algorithm, including without limitation a K-nearest neighbors algorithm, a lazy naïve Bayes algorithm, or the like; persons skilled in the art, upon reviewing the entirety of this disclosure, will be aware of various lazy-learning algorithms that may be applied to generate outputs as described in this disclosure, including without limitation lazy learning applications of machine-learning algorithms as described in further detail below.

Alternatively or additionally, and with continued reference to FIG. 2 , machine-learning processes as described in this disclosure may be used to generate machine-learning models 224. A “machine-learning model,” as used in this disclosure, is a mathematical and/or algorithmic representation of a relationship between inputs and outputs, as generated using any machine-learning process including without limitation any process as described above and stored in memory; an input is submitted to a machine-learning model 224 once created, which generates an output based on the relationship that was derived. For instance, and without limitation, a linear regression model, generated using a linear regression algorithm, may compute a linear combination of input data using coefficients derived during machine-learning processes to calculate an output datum. As a further non-limiting example, a machine-learning model 224 may be generated by creating an artificial neural network, such as a convolutional neural network comprising an input layer of nodes, one or more intermediate layers, and an output layer of nodes. Connections between nodes may be created via the process of “training” the network, in which elements from a training data 204 set are applied to the input nodes, a suitable training algorithm (such as Levenberg-Marquardt, conjugate gradient, simulated annealing, or other algorithms) is then used to adjust the connections and weights between nodes in adjacent layers of the neural network to produce the desired values at the output nodes. This process is sometimes referred to as deep learning.

Still referring to FIG. 2 , machine-learning algorithms may include at least a supervised machine-learning process 228. At least a supervised machine-learning process 228, as defined herein, include algorithms that receive a training set relating a number of inputs to a number of outputs, and seek to find one or more mathematical relations relating inputs to outputs, where each of the one or more mathematical relations is optimal according to some criterion specified to the algorithm using some scoring function. For instance, a supervised learning algorithm may include flight elements and/or pilot signals as described above as inputs, autonomous functions as outputs, and a scoring function representing a desired form of relationship to be detected between inputs and outputs; scoring function may, for instance, seek to maximize the probability that a given input and/or combination of elements inputs is associated with a given output to minimize the probability that a given input is not associated with a given output. Scoring function may be expressed as a risk function representing an “expected loss” of an algorithm relating inputs to outputs, where loss is computed as an error function representing a degree to which a prediction generated by the relation is incorrect when compared to a given input-output pair provided in training data 204. Persons skilled in the art, upon reviewing the entirety of this disclosure, will be aware of various possible variations of at least a supervised machine-learning process 228 that may be used to determine relation between inputs and outputs. Supervised machine-learning processes may include classification algorithms as defined above.

Further referring to FIG. 2 , machine learning processes may include at least an unsupervised machine-learning processes 232. An unsupervised machine-learning process, as used herein, is a process that derives inferences in datasets without regard to labels; as a result, an unsupervised machine-learning process may be free to discover any structure, relationship, and/or correlation provided in the data. Unsupervised processes may not require a response variable; unsupervised processes may be used to find interesting patterns and/or inferences between variables, to determine a degree of correlation between two or more variables, or the like.

Still referring to FIG. 2 , machine-learning module 200 may be designed and configured to create a machine-learning model 224 using techniques for development of linear regression models. Linear regression models may include ordinary least squares regression, which aims to minimize the square of the difference between predicted outcomes and actual outcomes according to an appropriate norm for measuring such a difference (e.g. a vector-space distance norm); coefficients of the resulting linear equation may be modified to improve minimization. Linear regression models may include ridge regression methods, where the function to be minimized includes the least-squares function plus term multiplying the square of each coefficient by a scalar amount to penalize large coefficients. Linear regression models may include least absolute shrinkage and selection operator (LASSO) models, in which ridge regression is combined with multiplying the least-squares term by a factor of 1 divided by double the number of samples. Linear regression models may include a multi-task lasso model wherein the norm applied in the least-squares term of the lasso model is the Frobenius norm amounting to the square root of the sum of squares of all terms. Linear regression models may include the elastic net model, a multi-task elastic net model, a least angle regression model, a LARS lasso model, an orthogonal matching pursuit model, a Bayesian regression model, a logistic regression model, a stochastic gradient descent model, a perceptron model, a passive aggressive algorithm, a robustness regression model, a Huber regression model, or any other suitable model that may occur to persons skilled in the art upon reviewing the entirety of this disclosure. Linear regression models may be generalized in an embodiment to polynomial regression models, whereby a polynomial equation (e.g. a quadratic, cubic or higher-order equation) providing a best predicted output/actual output fit is sought; similar methods to those described above may be applied to minimize error functions, as will be apparent to persons skilled in the art upon reviewing the entirety of this disclosure.

Continuing to refer to FIG. 2 , machine-learning algorithms may include, without limitation, linear discriminant analysis. Machine-learning algorithm may include quadratic discriminate analysis. Machine-learning algorithms may include kernel ridge regression. Machine-learning algorithms may include support vector machines, including without limitation support vector classification-based regression processes. Machine-learning algorithms may include stochastic gradient descent algorithms, including classification and regression algorithms based on stochastic gradient descent. Machine-learning algorithms may include nearest neighbors algorithms. Machine-learning algorithms may include Gaussian processes such as Gaussian Process Regression. Machine-learning algorithms may include cross-decomposition algorithms, including partial least squares and/or canonical correlation analysis. Machine-learning algorithms may include naïve Bayes methods. Machine-learning algorithms may include algorithms based on decision trees, such as decision tree classification or regression algorithms. Machine-learning algorithms may include ensemble methods such as bagging meta-estimator, forest of randomized tress, AdaBoost, gradient tree boosting, and/or voting classifier methods. Machine-learning algorithms may include neural net algorithms, including convolutional neural net processes.

Continuing to refer to FIG. 2 , wherein a machine learning model is configured to generate analysis as a function of battery datum. In embodiments, training data for a machine learning model may include battery datum. Battery datum may also be used as a Training Example for a machine learning process. As used in the current disclosure, a “Training Example” is an example that a machine learning device uses to correlate the current example to a similar examples with the goal to train the machine learning device. Training example may include any scenario regarding the battery of an aircraft. In a non-limiting example, a training example may cover failure of the battery during flight. In other embodiments, a training example may cover an irregular temperature of the battery. A training example may include training data and any derivation or calculation stemming from battery datum. Training examples may also include battery life cycle datum and battery health datum. A machine learning device may be configured to receive a training example. A machine learning device may be configured to generate analysis of the battery datum as a function of the training examples battery datum.

Referring now to FIG. 3 , an exemplary embodiment of an aircraft 300 is illustrated. Aircraft 300 may include an electrically powered aircraft (i.e., electric aircraft). In some embodiments, electrically powered aircraft may be an electric vertical takeoff and landing (eVTOL) aircraft. Electric aircraft may be capable of rotor-based cruising flight, rotor-based takeoff, rotor-based landing, fixed-wing cruising flight, airplane-style takeoff, airplane-style landing, and/or any combination thereof. “Rotor-based flight,” as described in this disclosure, is where the aircraft generated lift and propulsion by way of one or more powered rotors coupled with an engine, such as a quadcopter, multi-rotor helicopter, or other vehicle that maintains its lift primarily using downward thrusting propulsors. “Fixed-wing flight,” as described in this disclosure, is where the aircraft is capable of flight using wings and/or foils that generate lift caused by the aircraft's forward airspeed and the shape of the wings and/or foils, such as airplane-style flight.

Still referring to FIG. 3 , aircraft 300 may include a fuselage 304. As used in this disclosure a “fuselage” is the main body of an aircraft, or in other words, the entirety of the aircraft except for the cockpit, nose, wings, empennage, nacelles, any and all control surfaces, and generally contains an aircraft's payload. Fuselage 304 may comprise structural elements that physically support the shape and structure of an aircraft. Structural elements may take a plurality of forms, alone or in combination with other types. Structural elements may vary depending on the construction type of aircraft and specifically, the fuselage. Fuselage 304 may comprise a truss structure. A truss structure may be used with a lightweight aircraft and may include welded aluminum tube trusses. A truss, as used herein, is an assembly of beams that create a rigid structure, often in combinations of triangles to create three-dimensional shapes. A truss structure may alternatively comprise titanium construction in place of aluminum tubes, or a combination thereof. In some embodiments, structural elements may comprise aluminum tubes and/or titanium beams. In an embodiment, and without limitation, structural elements may include an aircraft skin. Aircraft skin may be layered over the body shape constructed by trusses. Aircraft skin may comprise a plurality of materials such as aluminum, fiberglass, and/or carbon fiber, the latter of which will be addressed in greater detail later in this paper.

Still referring to FIG. 3 , aircraft 300 may include a plurality of actuators 308. Actuator 308 may include any motor and/or propulsor described in this disclosure, for instance in reference to FIGS. 1-11 . In an embodiment, actuator 308 may be mechanically coupled to an aircraft. As used herein, a person of ordinary skill in the art would understand “mechanically coupled” to mean that at least a portion of a device, component, or circuit is connected to at least a portion of the aircraft via a mechanical coupling. Said mechanical coupling can include, for example, rigid coupling, such as beam coupling, bellows coupling, bushed pin coupling, constant velocity, split-muff coupling, diaphragm coupling, disc coupling, donut coupling, elastic coupling, flexible coupling, fluid coupling, gear coupling, grid coupling, Hirth joints, hydrodynamic coupling, jaw coupling, magnetic coupling, Oldham coupling, sleeve coupling, tapered shaft lock, twin spring coupling, rag joint coupling, universal joints, or any combination thereof. As used in this disclosure an “aircraft” is vehicle that may fly. As a non-limiting example, aircraft may include airplanes, helicopters, airships, blimps, gliders, paramotors, and the like thereof. In an embodiment, mechanical coupling may be used to connect the ends of adjacent parts and/or objects of an electric aircraft. Further, in an embodiment, mechanical coupling may be used to join two pieces of rotating electric aircraft components.

With continued reference to FIG. 3 , a plurality of actuators 308 may be configured to produce a torque. As used in this disclosure a “torque” is a measure of force that causes an object to rotate about an axis in a direction. For example, and without limitation, torque may rotate an aileron and/or rudder to generate a force that may adjust and/or affect altitude, airspeed velocity, groundspeed velocity, direction during flight, and/or thrust. For example, plurality of actuators 308 may include a component used to produce a torque that affects aircrafts' roll and pitch, such as without limitation one or more ailerons. An “aileron,” as used in this disclosure, is a hinged surface which form part of the trailing edge of a wing in a fixed wing aircraft, and which may be moved via mechanical means such as without limitation servomotors, mechanical linkages, or the like. As a further example, plurality of actuators 308 may include a rudder, which may include, without limitation, a segmented rudder that produces a torque about a vertical axis. Additionally or alternatively, plurality of actuators 308 may include other flight control surfaces such as propulsors, rotating flight controls, or any other structural features which can adjust movement of aircraft 300. Plurality of actuators 308 may include one or more rotors, turbines, ducted fans, paddle wheels, and/or other components configured to propel a vehicle through a fluid medium including, but not limited to air.

Still referring to FIG. 3 , plurality of actuators 308 may include at least a propulsor component. As used in this disclosure a “propulsor component” or “propulsor” is a component and/or device used to propel a craft by exerting force on a fluid medium, which may include a gaseous medium such as air or a liquid medium such as water. In an embodiment, when a propulsor twists and pulls air behind it, it may, at the same time, push an aircraft forward with an amount of force and/or thrust. More air pulled behind an aircraft results in greater thrust with which the aircraft is pushed forward. Propulsor component may include any device or component that consumes electrical power on demand to propel an electric aircraft in a direction or other vehicle while on ground or in-flight. In an embodiment, propulsor component may include a puller component. As used in this disclosure a “puller component” is a component that pulls and/or tows an aircraft through a medium. As a non-limiting example, puller component may include a flight component such as a puller propeller, a puller motor, a puller propulsor, and the like. Additionally, or alternatively, puller component may include a plurality of puller flight components. In another embodiment, propulsor component may include a pusher component. As used in this disclosure a “pusher component” is a component that pushes and/or thrusts an aircraft through a medium. As a non-limiting example, pusher component may include a pusher component such as a pusher propeller, a pusher motor, a pusher propulsor, and the like. Additionally, or alternatively, pusher flight component may include a plurality of pusher flight components.

In another embodiment, and still referring to FIG. 3 , propulsor may include a propeller, a blade, or any combination of the two. A propeller may function to convert rotary motion from an engine or other power source into a swirling slipstream which may push the propeller forwards or backwards. Propulsor may include a rotating power-driven hub, to which several radial airfoil-section blades may be attached, such that an entire whole assembly rotates about a longitudinal axis. As a non-limiting example, blade pitch of propellers may be fixed at a fixed angle, manually variable to a few set positions, automatically variable (e.g. a “constant-speed” type), and/or any combination thereof as described further in this disclosure. As used in this disclosure a “fixed angle” is an angle that is secured and/or substantially unmovable from an attachment point. For example, and without limitation, a fixed angle may be an angle of 2.2° inward and/or 1.7° forward. As a further non-limiting example, a fixed angle may be an angle of 3.6° outward and/or 2.7° backward. In an embodiment, propellers for an aircraft may be designed to be fixed to their hub at an angle similar to the thread on a screw makes an angle to the shaft; this angle may be referred to as a pitch or pitch angle which may determine a speed of forward movement as the blade rotates. Additionally or alternatively, propulsor component may be configured having a variable pitch angle. As used in this disclosure a “variable pitch angle” is an angle that may be moved and/or rotated. For example, and without limitation, propulsor component may be angled at a first angle of 3.3° inward, wherein propulsor component may be rotated and/or shifted to a second angle of 1.7° outward.

Still referring to FIG. 3 , propulsor may include a thrust element which may be integrated into the propulsor. Thrust element may include, without limitation, a device using moving or rotating foils, such as one or more rotors, an airscrew or propeller, a set of airscrews or propellers such as contra-rotating propellers, a moving or flapping wing, or the like. Further, a thrust element, for example, can include without limitation a marine propeller or screw, an impeller, a turbine, a pump-jet, a paddle or paddle-based device, or the like.

With continued reference to FIG. 3 , plurality of actuators 308 may include power sources, control links to one or more elements, fuses, and/or mechanical couplings used to drive and/or control any other flight component. Plurality of actuators 308 may include a motor that operates to move one or more flight control components and/or one or more control surfaces, to drive one or more propulsors, or the like. A motor may be driven by direct current (DC) electric power and may include, without limitation, brushless DC electric motors, switched reluctance motors, induction motors, or any combination thereof. Alternatively or additionally, a motor may be driven by an inverter. A motor may also include electronic speed controllers, inverters, or other components for regulating motor speed, rotation direction, and/or dynamic braking.

Still referring to FIG. 3 , plurality of actuators 308 may include an energy source. An energy source may include, for example, a generator, a photovoltaic device, a fuel cell such as a hydrogen fuel cell, direct methanol fuel cell, and/or solid oxide fuel cell, an electric energy storage device (e.g. a capacitor, an inductor, and/or a battery). An energy source may also include a battery cell, or a plurality of battery cells connected in series into a module and each module connected in series or in parallel with other modules. Configuration of an energy source containing connected modules may be designed to meet an energy or power requirement and may be designed to fit within a designated footprint in an electric aircraft in which system may be incorporated.

In an embodiment, and still referring to FIG. 3 , an energy source may be used to provide a steady supply of electrical power to a load over a flight by an electric aircraft 300. For example, energy source may be capable of providing sufficient power for “cruising” and other relatively low-energy phases of flight. An energy source may also be capable of providing electrical power for some higher-power phases of flight as well, particularly when the energy source is at a high SOC, as may be the case for instance during takeoff. In an embodiment, energy source may include an emergency power unit which may be capable of providing sufficient electrical power for auxiliary loads including without limitation, lighting, navigation, communications, de-icing, steering, or other systems requiring power or energy. Further, energy source may be capable of providing sufficient power for controlled descent and landing protocols, including, without limitation, hovering descent, or runway landing. As used herein the energy source may have high power density where electrical power an energy source can usefully produce per unit of volume and/or mass is relatively high. As used in this disclosure, “electrical power” is a rate of electrical energy per unit time. An energy source may include a device for which power that may be produced per unit of volume and/or mass has been optimized, for instance at an expense of maximal total specific energy density or power capacity. Non-limiting examples of items that may be used as at least an energy source include batteries used for starting applications including Li ion batteries which may include NCA, NMC, Lithium iron phosphate (LiFePO4) and Lithium Manganese Oxide (LMO) batteries, which may be mixed with another cathode chemistry to provide more specific power if the application requires Li metal batteries, which have a lithium metal anode that provides high power on demand, Li ion batteries that have a silicon or titanite anode, energy source may be used, in an embodiment, to provide electrical power to an electric aircraft or drone, such as an electric aircraft vehicle, during moments requiring high rates of power output, including without limitation takeoff, landing, thermal de-icing and situations requiring greater power output for reasons of stability, such as high turbulence situations, as described in further detail below. A battery may include, without limitation a battery using nickel based chemistries such as nickel cadmium or nickel metal hydride, a battery using lithium ion battery chemistries such as a nickel cobalt aluminum (NCA), nickel manganese cobalt (NMC), lithium iron phosphate (LiFePO4), lithium cobalt oxide (LCO), and/or lithium manganese oxide (LMO), a battery using lithium polymer technology, lead-based batteries such as without limitation lead acid batteries, metal-air batteries, or any other suitable battery. Persons skilled in the art, upon reviewing the entirety of this disclosure, will be aware of various devices of components that may be used as an energy source.

Still referring to FIG. 3 , an energy source may include a plurality of energy sources, referred to herein as a module of energy sources. Module may include batteries connected in parallel or in series or a plurality of modules connected either in series or in parallel designed to satisfy both power and energy requirements. Connecting batteries in series may increase a potential of at least an energy source which may provide more power on demand. High potential batteries may require cell matching when high peak load is needed. As more cells are connected in strings, there may exist a possibility of one cell failing which may increase resistance in module and reduce overall power output as voltage of the module may decrease as a result of that failing cell. Connecting batteries in parallel may increase total current capacity by decreasing total resistance, and it also may increase overall amp-hour capacity. Overall energy and power outputs of at least an energy source may be based on individual battery cell performance or an extrapolation based on a measurement of at least an electrical parameter. In an embodiment where energy source includes a plurality of battery cells, overall power output capacity may be dependent on electrical parameters of each individual cell. If one cell experiences high self-discharge during demand, power drawn from at least an energy source may be decreased to avoid damage to a weakest cell. Energy source may further include, without limitation, wiring, conduit, housing, cooling system and battery management system. Persons skilled in the art will be aware, after reviewing the entirety of this disclosure, of many different components of an energy source. Exemplary energy sources are disclosed in detail in U.S. patent application Ser. Nos. 16/948,157 and 16/048,140 both entitled “SYSTEM AND METHOD FOR HIGH ENERGY DENSITY BATTERY MODULE” by S. Donovan et al., which are incorporated in their entirety herein by reference.

Still referring to FIG. 3 , according to some embodiments, an energy source may include an emergency power unit (EPU) (i.e., auxiliary power unit). As used in this disclosure an “emergency power unit” is an energy source as described herein that is configured to power an essential system for a critical function in an emergency, for instance without limitation when another energy source has failed, is depleted, or is otherwise unavailable. Exemplary non-limiting essential systems include navigation systems, such as MFD, GPS, VOR receiver or directional gyro, and other essential flight components, such as propulsors.

Still referring to FIG. 3 , another exemplary actuator may include landing gear. Landing gear may be used for take-off and/or landing/Landing gear may be used to contact ground while aircraft 300 is not in flight. Exemplary landing gear is disclosed in detail in U.S. patent application Ser. No. 17/196,719 entitled “SYSTEM FOR ROLLING LANDING GEAR” by R. Griffin et al., which is incorporated in its entirety herein by reference.

Still referring to FIG. 3 , aircraft 300 may include a pilot control 312, including without limitation, a hover control, a thrust control, an inceptor stick, a cyclic, and/or a collective control. As used in this disclosure a “collective control” or “collective” is a mechanical control of an aircraft that allows a pilot to adjust and/or control the pitch angle of the plurality of actuators 308. For example and without limitation, collective control may alter and/or adjust the pitch angle of all of the main rotor blades collectively. For example, and without limitation pilot control 312 may include a yoke control. As used in this disclosure a “yoke control” is a mechanical control of an aircraft to control the pitch and/or roll. For example and without limitation, yoke control may alter and/or adjust the roll angle of aircraft 300 as a function of controlling and/or maneuvering ailerons. In an embodiment, pilot control 312 may include one or more footbrakes, control sticks, pedals, throttle levels, and the like thereof. In another embodiment, and without limitation, pilot control 312 may be configured to control a principal axis of the aircraft. As used in this disclosure a “principal axis” is an axis in a body representing one three dimensional orientations. For example, and without limitation, principal axis or more yaw, pitch, and/or roll axis. Principal axis may include a yaw axis. As used in this disclosure a “yaw axis” is an axis that is directed towards the bottom of the aircraft, perpendicular to the wings. For example, and without limitation, a positive yawing motion may include adjusting and/or shifting the nose of aircraft 300 to the right. Principal axis may include a pitch axis. As used in this disclosure a “pitch axis” is an axis that is directed towards the right laterally extending wing of the aircraft. For example, and without limitation, a positive pitching motion may include adjusting and/or shifting the nose of aircraft 300 upwards. Principal axis may include a roll axis. As used in this disclosure a “roll axis” is an axis that is directed longitudinally towards the nose of the aircraft, parallel to the fuselage. For example, and without limitation, a positive rolling motion may include lifting the left and lowering the right wing concurrently.

Still referring to FIG. 3 , pilot control 312 may be configured to modify a variable pitch angle. For example, and without limitation, pilot control 312 may adjust one or more angles of attack of a propeller. As used in this disclosure an “angle of attack” is an angle between the chord of the propeller and the relative wind. For example, and without limitation angle of attack may include a propeller blade angled 3.2°. In an embodiment, pilot control 312 may modify the variable pitch angle from a first angle of 2.71° to a second angle of 3.82°. Additionally or alternatively, pilot control 312 may be configured to translate a pilot desired torque for flight component 308. For example, and without limitation, pilot control 312 may translate that a pilot's desired torque for a propeller be 160 lb. ft. of torque. As a further non-limiting example, pilot control 312 may introduce a pilot's desired torque for a propulsor to be 290 lb. ft. of torque. Additional disclosure related to pilot control 312 may be found in U.S. patent application Ser. Nos. 17/001,845 and 16/929,206 both of which are entitled “A HOVER AND THRUST CONTROL ASSEMBLY FOR DUAL-MODE AIRCRAFT” by C. Spiegel et al., which are incorporated in their entirety herein by reference.

Still referring to FIG. 3 , aircraft 300 may include a loading system. A loading system may include a system configured to load an aircraft of either cargo or personnel. For instance, some exemplary loading systems may include a swing nose, which is configured to swing the nose of aircraft 300 of the way thereby allowing direct access to a cargo bay located behind the nose. A notable exemplary swing nose aircraft is Boeing 747. Additional disclosure related to loading systems can be found in U.S. patent application Ser. No. 17/137,594 entitled “SYSTEM AND METHOD FOR LOADING AND SECURING PAYLOAD IN AN AIRCRAFT” by R. Griffin et al., entirety of which in incorporated herein by reference.

Still referring to FIG. 3 , aircraft 300 may include a sensor 316. Sensor 316 may include any sensor or noise monitoring circuit described in this disclosure, for instance in reference to FIGS. 1-12 . Sensor 316 may be configured to sense a characteristic of pilot control 312. Sensor may be a device, module, and/or subsystem, utilizing any hardware, software, and/or any combination thereof to sense a characteristic and/or changes thereof, in an instant environment, for instance without limitation a pilot control 312, which the sensor is proximal to or otherwise in a sensed communication with, and transmit information associated with the characteristic, for instance without limitation digitized data. Sensor 316 may be mechanically and/or communicatively coupled to aircraft 300, including, for instance, to at least a pilot control 312. Sensor 316 may be configured to sense a characteristic associated with at least a pilot control 312. An environmental sensor may include without limitation one or more sensors used to detect ambient temperature, barometric pressure, and/or air velocity, one or more motion sensors which may include without limitation gyroscopes, accelerometers, inertial measurement unit (IMU), and/or magnetic sensors, one or more humidity sensors, one or more oxygen sensors, or the like. Additionally or alternatively, sensor 316 may include at least a geospatial sensor. Sensor 316 may be located inside an aircraft; and/or be included in and/or attached to at least a portion of the aircraft. Sensor may include one or more proximity sensors, displacement sensors, vibration sensors, and the like thereof. Sensor may be used to monitor the status of aircraft 300 for both critical and non-critical functions. Sensor may be incorporated into vehicle or aircraft or be remote.

Still referring to FIG. 3 , in some embodiments, sensor 316 may be configured to sense a characteristic associated with any pilot control described in this disclosure. Non-limiting examples of a sensor 316 may include an inertial measurement unit (IMU), an accelerometer, a gyroscope, a proximity sensor, a pressure sensor, a light sensor, a pitot tube, an air speed sensor, a position sensor, a speed sensor, a switch, a thermometer, a strain gauge, an acoustic sensor, and an electrical sensor. In some cases, sensor 316 may sense a characteristic as an analog measurement, for instance, yielding a continuously variable electrical potential indicative of the sensed characteristic. In these cases, sensor 316 may additionally comprise an analog to digital converter (ADC) as well as any additionally circuitry, such as without limitation a Whetstone bridge, an amplifier, a filter, and the like. For instance, in some cases, sensor 316 may comprise a strain gage configured to determine loading of one or flight components, for instance landing gear. Strain gage may be included within a circuit comprising a Whetstone bridge, an amplified, and a bandpass filter to provide an analog strain measurement signal having a high signal to noise ratio, which characterizes strain on a landing gear member. An ADC may then digitize analog signal produces a digital signal that can then be transmitted other systems within aircraft 300, for instance without limitation a computing system, a pilot display, and a memory component. Alternatively or additionally, sensor 316 may sense a characteristic of a pilot control 312 digitally. For instance in some embodiments, sensor 316 may sense a characteristic through a digital means or digitize a sensed signal natively. In some cases, for example, sensor 316 may include a rotational encoder and be configured to sense a rotational position of a pilot control; in this case, the rotational encoder digitally may sense rotational “clicks” by any known method, such as without limitation magnetically, optically, and the like.

Still referring to FIG. 3 , electric aircraft 300 may include at least a motor 1224, which may be mounted on a structural feature of the aircraft. Design of motor 1224 may enable it to be installed external to structural member (such as a boom, nacelle, or fuselage) for easy maintenance access and to minimize accessibility requirements for the structure.; this may improve structural efficiency by requiring fewer large holes in the mounting area. In some embodiments, motor 1224 may include two main holes in top and bottom of mounting area to access bearing cartridge. Further, a structural feature may include a component of electric aircraft 300. For example, and without limitation structural feature may be any portion of a vehicle incorporating motor 1224, including any vehicle as described in this disclosure. As a further non-limiting example, a structural feature may include without limitation a wing, a spar, an outrigger, a fuselage, or any portion thereof; persons skilled in the art, upon reviewing the entirety of this disclosure, will be aware of many possible features that may function as at least a structural feature. At least a structural feature may be constructed of any suitable material or combination of materials, including without limitation metal such as aluminum, titanium, steel, or the like, polymer materials or composites, fiberglass, carbon fiber, wood, or any other suitable material. As a non-limiting example, at least a structural feature may be constructed from additively manufactured polymer material with a carbon fiber exterior; aluminum parts or other elements may be enclosed for structural strength, or for purposes of supporting, for instance, vibration, torque, or shear stresses imposed by at least propulsor 308. Persons skilled in the art, upon reviewing the entirety of this disclosure, will be aware of various materials, combinations of materials, and/or constructions techniques.

Still referring to FIG. 3 , electric aircraft 300 may include a vertical takeoff and landing aircraft (eVTOL). As used herein, a vertical take-off and landing (eVTOL) aircraft is one that can hover, take off, and land vertically. An eVTOL, as used herein, is an electrically powered aircraft typically using an energy source, of a plurality of energy sources to power the aircraft. In order to optimize the power and energy necessary to propel the aircraft. eVTOL may be capable of rotor-based cruising flight, rotor-based takeoff, rotor-based landing, fixed-wing cruising flight, airplane-style takeoff, airplane-style landing, and/or any combination thereof. Rotor-based flight, as described herein, is where the aircraft generated lift and propulsion by way of one or more powered rotors coupled with an engine, such as a “quad copter,” multi-rotor helicopter, or other vehicle that maintains its lift primarily using downward thrusting propulsors. Fixed-wing flight, as described herein, is where the aircraft is capable of flight using wings and/or foils that generate life caused by the aircraft's forward airspeed and the shape of the wings and/or foils, such as airplane-style flight.

With continued reference to FIG. 3 , a number of aerodynamic forces may act upon the electric aircraft 300 during flight. Forces acting on electric aircraft 300 during flight may include, without limitation, thrust, the forward force produced by the rotating element of the electric aircraft 300 and acts parallel to the longitudinal axis. Another force acting upon electric aircraft 300 may be, without limitation, drag, which may be defined as a rearward retarding force which is caused by disruption of airflow by any protruding surface of the electric aircraft 300 such as, without limitation, the wing, rotor, and fuselage. Drag may oppose thrust and acts rearward parallel to the relative wind. A further force acting upon electric aircraft 300 may include, without limitation, weight, which may include a combined load of the electric aircraft 300 itself, crew, baggage, and/or fuel. Weight may pull electric aircraft 300 downward due to the force of gravity. An additional force acting on electric aircraft 300 may include, without limitation, lift, which may act to oppose the downward force of weight and may be produced by the dynamic effect of air acting on the airfoil and/or downward thrust from the propulsor 308 of the electric aircraft. Lift generated by the airfoil may depend on speed of airflow, density of air, total area of an airfoil and/or segment thereof, and/or an angle of attack between air and the airfoil. For example, and without limitation, electric aircraft 300 are designed to be as lightweight as possible. Reducing the weight of the aircraft and designing to reduce the number of components is essential to optimize the weight. To save energy, it may be useful to reduce weight of components of electric aircraft 300, including without limitation propulsors and/or propulsion assemblies. In an embodiment, motor 1224 may eliminate need for many external structural features that otherwise might be needed to join one component to another component. Motor 1224 may also increase energy efficiency by enabling a lower physical propulsor profile, reducing drag and/or wind resistance. This may also increase durability by lessening the extent to which drag and/or wind resistance add to forces acting on electric aircraft 300 and/or propulsors.

FIG. 4 illustrates an exemplary embodiment of a battery pack 400 that may be housed in the power storage unit to store power. Battery pack 400 may be a power storing device that is configured to store electrical energy in the form of a plurality of battery modules, which themselves may be comprised of a plurality of electrochemical cells. These cells may utilize electrochemical cells, galvanic cells, electrolytic cells, fuel cells, flow cells, and/or voltaic cells. In general, an electrochemical cell is a device capable of generating electrical energy from chemical reactions or using electrical energy to cause chemical reactions. Voltaic or galvanic cells are electrochemical cells that generate electric current from chemical reactions, while electrolytic cells generate chemical reactions via electrolysis. In general, the term ‘battery’ is used as a collection of cells connected in series or parallel to each other. A battery cell may, when used in conjunction with other cells, be electrically connected in series, in parallel or a combination of series and parallel. Series connection comprises wiring a first terminal of a first cell to a second terminal of a second cell and further configured to comprise a single conductive path for electricity to flow while maintaining the same current (measured in Amperes) through any component in the circuit. A battery cell may use the term ‘wired,’ but one of ordinary skill in the art would appreciate that this term is synonymous with ‘electrically connected,’ and that there are many ways to couple electrical elements like battery cells together. An example of a connector that does not comprise wires may be prefabricated terminals of a first gender that mate with a second terminal with a second gender. Battery cells may be wired in parallel. Parallel connection comprises wiring a first and second terminal of a first battery cell to a first and second terminal of a second battery cell and further configured to comprise more than one conductive path for electricity to flow while maintaining the same voltage (measured in Volts) across any component in the circuit. Battery cells may be wired in a series-parallel circuit which combines characteristics of the constituent circuit types to this combination circuit. Battery cells may be electrically connected in a virtually unlimited arrangement which may confer onto the system the electrical advantages associated with that arrangement such as high-voltage applications, high current applications, or the like. In an exemplary embodiment, battery pack 400 may include at least 196 battery cells in series and at least 18 battery cells in parallel. This is, as someone of ordinary skill in the art would appreciate, only an example and battery pack 400 may be configured to have a near limitless arrangement of battery cell configurations.

With continued reference to FIG. 4 , battery pack 400 may include a plurality of battery modules 404. The battery modules may be wired together in series and in parallel. Battery pack 400 may include a center sheet 408 which may include a thin barrier. The barrier may include a fuse connecting battery modules on either side of center sheet 408. The fuse may be disposed in or on center sheet 408 and configured to connect to an electric circuit comprising a first battery module and therefore battery unit and cells. In general, and for the purposes of this disclosure, a fuse is an electrical safety device that operate to provide overcurrent protection of an electrical circuit. As a sacrificial device, its essential component is metal wire or strip that melts when too much current flows through it, thereby interrupting energy flow. The fuse may comprise a thermal fuse, mechanical fuse, blade fuse, expulsion fuse, spark gap surge arrestor, varistor, or a combination thereof.

Battery pack 400 may also include a side wall 412 which may include a laminate of a plurality of layers configured to thermally insulate the plurality of battery modules 404 from external components of battery pack 400. Side wall 412 layers may include materials which possess characteristics suitable for thermal insulation such as fiberglass, air, iron fibers, polystyrene foam, and thin plastic films. Side wall 412 may additionally or alternatively electrically insulate the plurality of battery modules 404 from external components of battery pack 400 and the layers of which may include polyvinyl chloride (PVC), glass, asbestos, rigid laminate, varnish, resin, paper, Teflon, rubber, and mechanical lamina. Center sheet 408 may be mechanically coupled to side wall 412. Side wall 412 may include a feature for alignment and coupling to center sheet 408. This feature may comprise a cutout, slots, holes, bosses, ridges, channels, and/or other undisclosed mechanical features, alone or in combination.

Battery pack 400 may also include an end panel 416 having a plurality of electrical connectors and further configured to fix battery pack 400 in alignment with at least a side wall 412. End panel 416 may include a plurality of electrical connectors of a first gender configured to electrically and mechanically couple to electrical connectors of a second gender. End panel 416 may be configured to convey electrical energy from battery cells to at least a portion of an eVTOL aircraft. Electrical energy may be configured to power at least a portion of an eVTOL aircraft or comprise signals to notify aircraft computers, personnel, users, pilots, and any others of information regarding battery health, emergencies, and/or electrical characteristics. The plurality of electrical connectors may comprise blind mate connectors, plug and socket connectors, screw terminals, ring and spade connectors, blade connectors, and/or an undisclosed type alone or in combination. The electrical connectors of which end panel 416 comprises may be configured for power and communication purposes.

A first end of end panel 416 may be configured to mechanically couple to a first end of a first side wall 412 by a snap attachment mechanism, similar to end cap and side panel configuration utilized in the battery module. To reiterate, a protrusion disposed in or on end panel 416 may be captured, at least in part, by a receptacle disposed in or on side wall 412. A second end of end panel 416 may be mechanically coupled to a second end of a second side wall 412 in a similar or the same mechanism.

Referring now to FIG. 5 , an embodiment of authentication module 136, as pictured in FIG. 1 , is illustrated in detail. Authentication module 136 may include any suitable hardware and/or software module. Authentication module 136 and/or computing device 104 can be configured to authenticate electric aircraft 108A-D and or any electric aircraft 108A-D of the electric aircraft fleet. Authenticating, for example and without limitation, can include determining an electric vehicle's ability/authorization to access information included in each module and/or engine of the plurality of modules and/or engines operating on computing device 104. As a further example and without limitation, authentication may include determining an instructor's authorization/ability of access to the information included in each module and/or engine of the plurality of modules and/or engines operating on computing device 104. As a further non-limiting example, authentication may include determining an administrator's authorization/ability to access the information included in each module and/or engine of the plurality of modules and/or engines operating on computing device 104. Authentication may enable access to an individual module and/or engine, a combination of modules and/or engines, and/or all the modules and/or engines operating on computing device 104. In a non-limiting embodiment, authentication module 136 may be configured to receive credential 500 from electric aircraft 108A-DA-D. Credential 500 may include any credential as described above in further detail in reference to FIG. 1 . For example and without limitation, credential 500 may include a username and password unique to the user and/or electric aircraft 108A-D. As a further example and without limitation, credential 500 may include a PKI certificate unique to the user and/or electric aircraft 108A-D. As a further embodiment, credential 500 may be received from remote user device 516 and/or admin device 520, such that credential 500 would authenticate an admin device 520, respectively. An “remote user device,” for the purpose of this disclosure, may be a user device used by a fleet manager for managing, monitoring, and/or facilitating communication of the fleet of electric aircraft as described in FIG. 1 . In a non-limiting embodiment, a fleet manager may communicate with each electric aircraft of the fleet of electric aircraft 108A-D via remote user device 516. For example and without limitation, the operator may monitor the plurality of electric aircrafts in the sky that are in range and/or connected to the network, authenticate any incoming electric aircraft of the fleet, and facilitate communication between the plurality of electric aircrafts which may include transferring a plurality of aircraft data using any means as described herein.

Continuing to refer to FIG. 5 , authentication module 136 and/or computing device 104 may be further designed and configured to compare credential 500 from electric aircraft 108A-D to an authorized credential stored in authentication database 504. For example, authentication module 136 and/or computing device 104 may be configured to compare credential 500 from electric aircraft 108A-D to a stored authorized credential to determine if credential 500 matches the stored authorized credential. As a further embodiment, authentication module 136 and/or computing device may compare credential 500 from remote user device 516 to an authorized credential stored in authentication database 504. For example, authentication module 136 and/or computing device may be configured to compare credential 500 from remote user device 516 to a stored authorized credential to determine if credential 500 matches the stored authorized credential. As a further non-limiting example, authentication module 136 and/or computing device 112 may match credential 500 from admin device 520 to an authorized credential stored in authentication database 504. For example, authentication module 136 and/or computing device may be configured to compare credential 500 from admin device 520 to a stored authorized credential to determine if credential 500 matches the stored authorized credential. In embodiments, comparing credential 500 to an authorized credential stored in authentication database 504 can include identifying an authorized credential stored in authentication database 504 by matching credential 500 to at least one authorized credential stored in authentication database 504. Authentication module 136 and/or computing device 104 may include or communicate with authentication database 504. Authentication database 504 may be implemented as any database and/or datastore suitable for use as authentication database 504 as described in the entirety of this disclosure. The “authorized credential” as described in the entirety of this disclosure, is the unique identifier that will successfully authorize each pilot and/or electric aircraft 108A-DA-D if received. For example and without limitation, the authorized credential is the correct alpha-numeric spelling, letter case, and special characters of the username and password for electric aircraft 108A-D. Persons skilled in the art, upon reviewing the entirety of this disclosure, will be aware of various examples of authorized credentials that may be stored in the authentication database consistently with this disclosure.

Still referring to FIG. 5 , authentication module 136 and/or computing device 104 is further designed and configured to bypass authentication for electric aircraft 108A-D based on the identification of the authorized credential stored within authentication database 504. Bypassing authentication may include permitting access to electric aircraft 108A-D to access the information included in each module and/or engine of the plurality of modules and/or engines operating on computing device 104. Bypassing authentication may enable access to an individual module and/or engine, a combination of modules and/or engines, and/or all the modules and/or engines operating on computing device 104, as described in further detail in the entirety of this disclosure. As a further example and without limitation, bypassing authentication may include bypassing authentication for remote user device 516 based on the comparison of the authorized credential stored in authentication database 504. As a further non-limiting example, bypassing authentication may include bypassing authentication for admin device 520 based on the comparison of the authorized credential stored in authentication database 112.

With continued reference to FIG. 5 , authentication module 136 and/or computing device 104 may be further configured to authenticate electric aircraft 108A-D as a function of a physical signature authentication. A “physical signature authentication,” for the purpose of this disclosure, is an authentication process that determines an electric vehicle's ability to access the information included in each module and/or engine of the plurality of modules and/or engines operating on computing device 104 as a function of a physical signature credential 508. In a non-limiting embodiment, physical signature authentication, in the embodiment, includes receiving physical signature credential 508 from electric aircraft 108A-D, comparing and/or matching physical signature credential 508 from electric aircraft 108A-D to an authorized physical signature credential stored in a physical signature database 512, and bypassing authentication for electric aircraft 108A-D based on the comparison of the authorized physical signature credential stored within physical signature database 512. Physical signature authentication employing authentication module 136 may also include authenticating remote user device 516 and/or admin device 520. Authentication module 136 and/or computing device 104 may include or communicate with physical signature database 512. Physical signature database 512 may be implemented as any database and/or datastore suitable for use as a physical signature database entirely with this disclosure. An exemplary embodiment of physical signature database 512 is provided below in reference to FIG. 5 . The “physical signature credential” as used in this disclosure, is any physical identifier, measurement, and/or calculation utilized for identification purposes regarding an electric vehicle and/or its pilot. In a non-limiting embodiment, physical signature credential 508 may include, but not limited to, a physiological characteristic and/or behavioral characteristic of the pilot associated with the electric vehicle. For example and without limitation, physical signature credential 508 may include vehicle model number, vehicle model type, vehicle battery type, vehicle authority level, pilot authority level, and the like thereof. The “authorized physical signature credential” as described in the entirety of this disclosure, is unique physical signature identifier that will successfully authorize each user and/or electric aircraft 108A-D, such that the authorized physical signature credential is the correct physical signature credential which will enable the user and/or electric aircraft 108A-D access to the plurality of modules and/or engines operating on computing device 104. Persons skilled in the art, upon reviewing the entirety of this disclosure, will be aware of various examples of physical signature credentials and authorized physical signature credentials that may be utilized by authentication module 136 consistently with this disclosure.

Referring now to FIG. 6 , an embodiment of authentication database 504 is illustrated. Authentication database 504 may include any data structure for ordered storage and retrieval of data, which may be implemented as a hardware or software module. Authentication database 504 may be implemented, without limitation, as a relational database, a key-value retrieval datastore such as a NOSQL database, or any other format or structure for use as a datastore that a person skilled in the art would recognize as suitable upon review of the entirety of this disclosure. Authorization database 504 may include a plurality of data entries and/or records corresponding to credentials as described above. Data entries and/or records may describe, without limitation, data concerning authorized credential datum and failed credential datum.

With continued reference to FIG. 6 , one or more database tables in authentication database 504 may include as a non-limiting example an authorized credential datum table 600. Authorized credential datum table 600 may be a table storing authorized credentials, wherein the authorized credentials may be for electric aircraft 108A-D, remote user device, as described in further detail in the entirety of this disclosure. For instance, and without limitation, authentication database 504 may include an authorized credential datum table 600 listing unique identifiers stored for electric aircraft 108A-D, wherein the authorized credential is compared/matched to a credential 500 received from electric aircraft 108A-D.

Still referring to FIG. 6 , one or more database tables in authentication database 504 may include, as a non-limiting example, failed credential datum table 604. A “failed credential,” as described in the entirety of this disclosure, is a credential received from a device that did not match an authorized credential stored within authorized credential datum table 600 of authentication database 504. Such credentials can be received from electric aircraft 108A-D, remote user device 516. Failed credential datum table 604 may be a table storing and/or matching failed credentials. For instance and without limitation, authentication database 504 may include failed credential datum table 604 listing incorrect unique identifiers received by a device in authentication module 168, wherein authentication of the device did not result. Tables presented above are presented for exemplary purposes only; persons skilled in the art will be aware of various ways in which data may be organized in authentication database 504 consistently with this disclosure.

Referring now to FIG. 7 , an embodiment of physical signature database 512 is illustrated. Physical signature database 512 may include any data structure for ordered storage and retrieval of data, which may be implemented as a hardware or software module. Physical signature database 512 may be implemented, without limitation, as a relational database, a key-value retrieval datastore such as a NOSQL database, or any other format or structure for use as a datastore that a person skilled in the art would recognize as suitable upon review of the entirety of this disclosure. Physical signature database 512 may include a plurality of data entries and/or records corresponding to elements of physical signature datum as described above. Data entries and/or records may describe, without limitation, data concerning particular physiological characteristics and/or behavioral characteristics that have been collected. Data entries in a physical signature database 512 may be flagged with or linked to one or more additional elements of information, which may be reflected in data entry cells and/or in linked tables such as tables related by one or more indices in a relational database; one or more additional elements of information may include data associating a physical signature with one or more cohorts, including demographic groupings such as ethnicity, sex, age, income, geographical region, or the like. Additional elements of information may include one or more categories of physical signature datum as described above. Persons skilled in the art, upon reviewing the entirety of this disclosure, will be aware of various ways in which data entries in a physical signature database 512 may reflect categories, cohorts, and/or populations of data consistently with this disclosure.

Still referring to FIG. 7 , one or more database tables in physical signature database 512 may include, as a non-limiting example, vehicle model data table 700. Vehicle model data table 700 may be a table correlating, relating, and/or matching physical signature credentials received from a device, such as electric aircraft 108A-D and/or remote user device 516 as described above, to fingerprint data. For instance, and without limitation, physical signature database 512 may include a vehicle model data table 700 listing samples acquired from an electric vehicle having allowed system 100 to retrieve data describing the make and model of the electric vehicle. The data may be retrieved by any identifier scanner that is configured to scan the shape, size, and/or any digital signature incorporated onto the electric vehicle. In a non-limiting embodiment, the electric vehicle itself may transmit the model data itself. Such data may be inserted in vehicle model data table 700.

With continued reference to FIG. 7 , physical signature database 512 may include tables listing one or more samples according to a sample source. As another non-limiting example, physical signature database 512 may include flight plan data table 704, which may list samples acquired from an electric vehicle associated with electric aircraft 108A-D that has allowed system 100 to obtain information such as a flight plan of the electric vehicle, destination, cruising speed, and/or the like. For instance, and without limitation, physical signature database 512 may include pilot data table 708 listing samples acquired from an electric vehicle by obtaining the information regarding the pilot such as, pilot experience level, pilot authority level, pilot seniority level, and the like thereof. As a further non-limiting example, physical signature database 512 may include a battery system data table 712, which may list samples acquired from an electric vehicle associated with electric aircraft 108A-D that has allowed system 100 to retrieve the battery pack datum of electric aircraft 108A-D and/or the like. Tables presented above are presented for exemplary purposes only; persons skilled in the art will be aware of various ways in which data may be organized in physical signature database 512 consistently with this disclosure.

Referring now to FIG. 8 , an embodiment of sensor suite 800 is presented. The herein disclosed system and method may comprise a plurality of sensors in the form of individual sensors or a sensor suite working in tandem or individually. In some cases, sensor suite 800 may communicate by way of at least a conductor, such as within limitation a control signal conductor. Alternatively and/or additionally, in some cases, sensor suite 800 may be communicative by at least a network, for example any network described in this disclosure including wireless (Wi-Fi), controller area network (CAN), the Internet, and the like. A sensor suite may include a plurality of independent sensors, as described herein, where any number of the described sensors may be used to detect any number of physical or electrical quantities associated with a vehicle battery or an electrical energy storage system, such as without limitation charging battery. Independent sensors may include separate sensors measuring physical or electrical quantities that may be powered by and/or in communication with circuits independently, where each may signal sensor output to a control circuit such as a user graphical interface. In a non-limiting example, there may be four independent sensors housed in and/or on battery pack measuring temperature, electrical characteristic such as voltage, amperage, resistance, or impedance, or any other parameters and/or quantities as described in this disclosure. In an embodiment, use of a plurality of independent sensors may result in redundancy configured to employ more than one sensor that measures the same phenomenon, those sensors being of the same type, a combination of, or another type of sensor not disclosed, so that in the event one sensor fails, the ability of controller 104 and/or user to detect phenomenon is maintained.

With continued reference to FIG. 8 , sensor suite 800 may include a humidity sensor 804. Humidity, as used in this disclosure, is the property of a gaseous medium (almost always air) to hold water in the form of vapor. An amount of water vapor contained within a parcel of air can vary significantly. Water vapor is generally invisible to the human eye and may be damaging to electrical components. There are three primary measurements of humidity, absolute, relative, specific humidity. “Absolute humidity,” for the purposes of this disclosure, describes the water content of air and is expressed in either grams per cubic meters or grams per kilogram. “Relative humidity,” for the purposes of this disclosure, is expressed as a percentage, indicating a present stat of absolute humidity relative to a maximum humidity given the same temperature. “Specific humidity,” for the purposes of this disclosure, is the ratio of water vapor mass to total moist air parcel mass, where parcel is a given portion of a gaseous medium. Humidity sensor 804 may be psychrometer. Humidity sensor 804 may be a hygrometer. Humidity sensor 804 may be configured to act as or include a humidistat. A “humidistat,” for the purposes of this disclosure, is a humidity-triggered switch, often used to control another electronic device. Humidity sensor 804 may use capacitance to measure relative humidity and include in itself, or as an external component, include a device to convert relative humidity measurements to absolute humidity measurements. “Capacitance,” for the purposes of this disclosure, is the ability of a system to store an electric charge, in this case the system is a parcel of air which may be near, adjacent to, or above a battery cell.

With continued reference to FIG. 8 , sensor suite 800 may include multimeter 808. Multimeter 808 may be configured to measure voltage across a component, electrical current through a component, and resistance of a component. Multimeter 808 may include separate sensors to measure each of the previously disclosed electrical characteristics such as voltmeter, ammeter, and ohmmeter, respectively. Alternatively or additionally, and with continued reference to FIG. 8 , sensor suite 800 may include a sensor or plurality thereof that may detect voltage and direct charging of individual battery cells according to charge level; detection may be performed using any suitable component, set of components, and/or mechanism for direct or indirect measurement and/or detection of voltage levels, including without limitation comparators, analog to digital converters, any form of voltmeter, or the like. Sensor suite 800 and/or a control circuit incorporated therein and/or communicatively connected thereto may be configured to adjust charge to one or more battery cells as a function of a charge level and/or a detected parameter. For instance, and without limitation, sensor suite 800 may be configured to determine that a charge level of a battery cell is high based on a detected voltage level of that battery cell or portion of the battery pack. Sensor suite 800 may alternatively or additionally detect a charge reduction event, defined for purposes of this disclosure as any temporary or permanent state of a battery cell requiring reduction or cessation of charging; a charge reduction event may include a cell being fully charged and/or a cell undergoing a physical and/or electrical process that makes continued charging at a current voltage and/or current level inadvisable due to a risk that the cell will be damaged, will overheat, or the like. Detection of a charge reduction event may include detection of a temperature, of the cell above a threshold level, detection of a voltage and/or resistance level above or below a threshold, or the like. Sensor suite 800 may include digital sensors, analog sensors, or a combination thereof. Sensor suite 800 may include digital-to-analog converters (DAC), analog-to-digital converters (ADC, A/D, A-to-D), a combination thereof, or other signal conditioning components used in transmission of a battery sensor signal to a destination over wireless or wired connection.

With continued reference to FIG. 8 , sensor suite 800 may include thermocouples, thermistors, thermometers, passive infrared sensors, resistance temperature sensors (RTD's), semiconductor based integrated circuits (IC), a combination thereof or another undisclosed sensor type, alone or in combination. Temperature, for the purposes of this disclosure, and as would be appreciated by someone of ordinary skill in the art, is a measure of the heat energy of a system. Temperature, as measured by any number or combinations of sensors present within sensor suite 800, may be measured in Fahrenheit (° F.), Celsius (° C.), Kelvin (° K), or another scale alone or in combination. The temperature measured by sensors may comprise electrical signals which are transmitted to their appropriate destination wireless or through a wired connection.

With continued reference to FIG. 8 , sensor suite 800 may include a sensor configured to detect gas that may be emitted during or after a catastrophic cell failure. “Catastrophic cell failure,” for the purposes of this disclosure, refers to a malfunction of a battery cell, which may be an electrochemical cell, which renders the cell inoperable for its designed function, namely providing electrical energy to at least a portion of an electric aircraft. Byproducts of catastrophic cell failure 812 may include gaseous discharge including oxygen, hydrogen, carbon dioxide, methane, carbon monoxide, a combination thereof, or another undisclosed gas, alone or in combination. Further the sensor configured to detect vent gas from electrochemical cells may comprise a gas detector. For the purposes of this disclosure, a “gas detector” is a device used to detect a gas is present in an area. Gas detectors, and more specifically, the gas sensor that may be used in sensor suite 800, may be configured to detect combustible, flammable, toxic, oxygen depleted, a combination thereof, or another type of gas alone or in combination. The gas sensor that may be present in sensor suite 800 may include a combustible gas, photoionization detectors, electrochemical gas sensors, ultrasonic sensors, metal-oxide-semiconductor (MOS) sensors, infrared imaging sensors, a combination thereof, or another undisclosed type of gas sensor alone or in combination. Sensor suite 800 may include sensors that are configured to detect non-gaseous byproducts of catastrophic cell failure 812 including, in non-limiting examples, liquid chemical leaks including aqueous alkaline solution, ionomer, molten phosphoric acid, liquid electrolytes with redox shuttle and ionomer, and salt water, among others. Sensor suite 800 may include sensors that are configured to detect non-gaseous byproducts of catastrophic cell failure 812 including, in non-limiting examples, electrical anomalies as detected by any of the previous disclosed sensors or components.

With continued reference to FIG. 8 , sensor suite 800 may be configured to detect events where voltage nears an upper voltage threshold or lower voltage threshold. The upper voltage threshold may be stored in data storage system for comparison with an instant measurement taken by any combination of sensors present within sensor suite 800. The upper voltage threshold may be calculated and calibrated based on factors relating to battery cell health, maintenance history, location within battery pack, designed application, and type, among others. Sensor suite 800 may measure voltage at an instant, over a period of time, or periodically. Sensor suite 800 may be configured to operate at any of these detection modes, switch between modes, or simultaneous measure in more than one mode. Controller 104 may detect through sensor suite 800 events where voltage nears the lower voltage threshold. The lower voltage threshold may indicate power loss to or from an individual battery cell or portion of the battery pack. Controller 104 may detect through sensor suite 800 events where voltage exceeds the upper and lower voltage threshold. Events where voltage exceeds the upper and lower voltage threshold may indicate battery cell failure or electrical anomalies that could lead to potentially dangerous situations for aircraft and personnel that may be present in or near its operation.

With continued reference to FIG. 8 , in some cases, sensor suite 800 may include a swell sensor configured to sense swell, pressure, or strain of at least a battery cell. In some cases, battery cell swell, pressure, and/or strain may be indicative of an amount of gases and/or gas expansion within a battery cell. Battery swell sensor may include one or more of a pressure sensor, a load cell, and a strain gauge. In some cases, battery swell sensor may output a battery swell signal that is analog and requires signal processing techniques. For example, in some cases, wherein battery swell sensor includes at least a strain gauge, battery swell signal may be processed and digitized by one or more of a Wheatstone bridge, an amplifier, a filter, and an analog to digital converter. In some cases, battery sensor signal may include battery swell signal.

Now referring to FIG. 9 , an exemplary embodiment 900 of a flight controller 904 is illustrated. As used in this disclosure a “flight controller” is a computing device of a plurality of computing devices dedicated to data storage, security, distribution of traffic for load balancing, and flight instruction. Flight controller 904 may include and/or communicate with any computing device as described in this disclosure, including without limitation a microcontroller, microprocessor, digital signal processor (DSP) and/or system on a chip (SoC) as described in this disclosure. Further, flight controller 904 may include a single computing device operating independently, or may include two or more computing device operating in concert, in parallel, sequentially or the like; two or more computing devices may be included together in a single computing device or in two or more computing devices. In embodiments, flight controller 904 may be installed in an aircraft, may control the aircraft remotely, and/or may include an element installed in the aircraft and a remote element in communication therewith.

In an embodiment, and still referring to FIG. 9 , flight controller 904 may include a signal transformation component 908. As used in this disclosure a “signal transformation component” is a component that transforms and/or converts a first signal to a second signal, wherein a signal may include one or more digital and/or analog signals. For example, and without limitation, signal transformation component 908 may be configured to perform one or more operations such as preprocessing, lexical analysis, parsing, semantic analysis, and the like thereof. In an embodiment, and without limitation, signal transformation component 908 may include one or more analog-to-digital convertors that transform a first signal of an analog signal to a second signal of a digital signal. For example, and without limitation, an analog-to-digital converter may convert an analog input signal to a 10-bit binary digital representation of that signal. In another embodiment, signal transformation component 908 may include transforming one or more low-level languages such as, but not limited to, machine languages and/or assembly languages. For example, and without limitation, signal transformation component 908 may include transforming a binary language signal to an assembly language signal. In an embodiment, and without limitation, signal transformation component 908 may include transforming one or more high-level languages and/or formal languages such as but not limited to alphabets, strings, and/or languages. For example, and without limitation, high-level languages may include one or more system languages, scripting languages, domain-specific languages, visual languages, esoteric languages, and the like thereof. As a further non-limiting example, high-level languages may include one or more algebraic formula languages, business data languages, string and list languages, object-oriented languages, and the like thereof.

Still referring to FIG. 9 , signal transformation component 908 may be configured to optimize an intermediate representation 912. As used in this disclosure an “intermediate representation” is a data structure and/or code that represents the input signal. Signal transformation component 908 may optimize intermediate representation as a function of a data-flow analysis, dependence analysis, alias analysis, pointer analysis, escape analysis, and the like thereof. In an embodiment, and without limitation, signal transformation component 908 may optimize intermediate representation 912 as a function of one or more inline expansions, dead code eliminations, constant propagation, loop transformations, and/or automatic parallelization functions. In another embodiment, signal transformation component 908 may optimize intermediate representation as a function of a machine dependent optimization such as a peephole optimization, wherein a peephole optimization may rewrite short sequences of code into more efficient sequences of code. Signal transformation component 908 may optimize intermediate representation to generate an output language, wherein an “output language,” as used herein, is the native machine language of flight controller 904. For example, and without limitation, native machine language may include one or more binary and/or numerical languages.

In an embodiment, and without limitation, signal transformation component 908 may include transform one or more inputs and outputs as a function of an error correction code. An error correction code, also known as error correcting code (ECC), is an encoding of a message or lot of data using redundant information, permitting recovery of corrupted data. An ECC may include a block code, in which information is encoded on fixed-size packets and/or blocks of data elements such as symbols of predetermined size, bits, or the like. Reed-Solomon coding, in which message symbols within a symbol set having q symbols are encoded as coefficients of a polynomial of degree less than or equal to a natural number k, over a finite field F with q elements; strings so encoded have a minimum hamming distance of k+1, and permit correction of (q-k-1)/2 erroneous symbols. Block code may alternatively or additionally be implemented using Golay coding, also known as binary Golay coding, Bose-Chaudhuri, Hocquenghuem (BCH) coding, multidimensional parity-check coding, and/or Hamming codes. An ECC may alternatively or additionally be based on a convolutional code.

In an embodiment, and still referring to FIG. 9 , flight controller 904 may include a reconfigurable hardware platform 916. A “reconfigurable hardware platform,” as used herein, is a component and/or unit of hardware that may be reprogrammed, such that, for instance, a data path between elements such as logic gates or other digital circuit elements may be modified to change an algorithm, state, logical sequence, or the like of the component and/or unit. This may be accomplished with such flexible high-speed computing fabrics as field-programmable gate arrays (FPGAs), which may include a grid of interconnected logic gates, connections between which may be severed and/or restored to program in modified logic. Reconfigurable hardware platform 916 may be reconfigured to enact any algorithm and/or algorithm selection process received from another computing device and/or created using machine-learning processes.

Still referring to FIG. 9 , reconfigurable hardware platform 916 may include a logic component 920. As used in this disclosure a “logic component” is a component that executes instructions on output language. For example, and without limitation, logic component may perform basic arithmetic, logic, controlling, input/output operations, and the like thereof. Logic component 920 may include any suitable processor, such as without limitation a component incorporating logical circuitry for performing arithmetic and logical operations, such as an arithmetic and logic unit (ALU), which may be regulated with a state machine and directed by operational inputs from memory and/or sensors; logic component 920 may be organized according to Von Neumann and/or Harvard architecture as a non-limiting example. Logic component 920 may include, incorporate, and/or be incorporated in, without limitation, a microcontroller, microprocessor, digital signal processor (DSP), Field Programmable Gate Array (FPGA), Complex Programmable Logic Device (CPLD), Graphical Processing Unit (GPU), general purpose GPU, Tensor Processing Unit (TPU), analog or mixed signal processor, Trusted Platform Module (TPM), a floating-point unit (FPU), and/or system on a chip (SoC). In an embodiment, logic component 920 may include one or more integrated circuit microprocessors, which may contain one or more central processing units, central processors, and/or main processors, on a single metal-oxide-semiconductor chip. Logic component 920 may be configured to execute a sequence of stored instructions to be performed on the output language and/or intermediate representation 912. Logic component 920 may be configured to fetch and/or retrieve the instruction from a memory cache, wherein a “memory cache,” as used in this disclosure, is a stored instruction set on flight controller 904. Logic component 920 may be configured to decode the instruction retrieved from the memory cache to opcodes and/or operands. Logic component 920 may be configured to execute the instruction on intermediate representation 912 and/or output language. For example, and without limitation, logic component 920 may be configured to execute an addition operation on intermediate representation 912 and/or output language.

In an embodiment, and without limitation, logic component 920 may be configured to calculate a flight element 924. As used in this disclosure a “flight element” is an element of datum denoting a relative status of aircraft. For example, and without limitation, flight element 924 may denote one or more torques, thrusts, airspeed velocities, forces, altitudes, groundspeed velocities, directions during flight, directions facing, forces, orientations, and the like thereof. For example, and without limitation, flight element 924 may denote that aircraft is cruising at an altitude and/or with a sufficient magnitude of forward thrust. As a further non-limiting example, flight status may denote that is building thrust and/or groundspeed velocity in preparation for a takeoff. As a further non-limiting example, flight element 924 may denote that aircraft is following a flight path accurately and/or sufficiently.

Still referring to FIG. 9 , flight controller 904 may include a chipset component 928. As used in this disclosure a “chipset component” is a component that manages data flow. In an embodiment, and without limitation, chipset component 928 may include a northbridge data flow path, wherein the northbridge dataflow path may manage data flow from logic component 920 to a high-speed device and/or component, such as a RAM, graphics controller, and the like thereof. In another embodiment, and without limitation, chipset component 928 may include a southbridge data flow path, wherein the southbridge dataflow path may manage data flow from logic component 920 to lower-speed peripheral buses, such as a peripheral component interconnect (PCI), industry standard architecture (ICA), and the like thereof. In an embodiment, and without limitation, southbridge data flow path may include managing data flow between peripheral connections such as ethernet, USB, audio devices, and the like thereof. Additionally or alternatively, chipset component 928 may manage data flow between logic component 920, memory cache, and a flight component 208. As used in this disclosure (and with particular reference to FIG. 9 ) a “flight component” is a portion of an aircraft that can be moved or adjusted to affect one or more flight elements. For example, flight component 208 may include a component used to affect the aircrafts' roll and pitch which may comprise one or more ailerons. As a further example, flight component 208 may include a rudder to control yaw of an aircraft. In an embodiment, chipset component 928 may be configured to communicate with a plurality of flight components as a function of flight element 924. For example, and without limitation, chipset component 928 may transmit to an aircraft rotor to reduce torque of a first lift propulsor and increase the forward thrust produced by a pusher component to perform a flight maneuver.

In an embodiment, and still referring to FIG. 9 , flight controller 904 may be configured generate an autonomous function. As used in this disclosure an “autonomous function” is a mode and/or function of flight controller 904 that controls aircraft automatically. For example, and without limitation, autonomous function may perform one or more aircraft maneuvers, take offs, landings, altitude adjustments, flight leveling adjustments, turns, climbs, and/or descents. As a further non-limiting example, autonomous function may adjust one or more airspeed velocities, thrusts, torques, and/or groundspeed velocities. As a further non-limiting example, autonomous function may perform one or more flight path corrections and/or flight path modifications as a function of flight element 924. In an embodiment, autonomous function may include one or more modes of autonomy such as, but not limited to, autonomous mode, semi-autonomous mode, and/or non-autonomous mode. As used in this disclosure “autonomous mode” is a mode that automatically adjusts and/or controls aircraft and/or the maneuvers of aircraft in its entirety. For example, autonomous mode may denote that flight controller 904 will adjust the aircraft. As used in this disclosure a “semi-autonomous mode” is a mode that automatically adjusts and/or controls a portion and/or section of aircraft. For example, and without limitation, semi-autonomous mode may denote that a pilot will control the propulsors, wherein flight controller 904 will control the ailerons and/or rudders. As used in this disclosure “non-autonomous mode” is a mode that denotes a pilot will control aircraft and/or maneuvers of aircraft in its entirety.

In an embodiment, and still referring to FIG. 9 , flight controller 904 may generate autonomous function as a function of an autonomous machine-learning model. As used in this disclosure an “autonomous machine-learning model” is a machine-learning model to produce an autonomous function output given flight element 924 and a pilot signal 936 as inputs; this is in contrast to a non-machine learning software program where the commands to be executed are determined in advance by a user and written in a programming language. As used in this disclosure a “pilot signal” is an element of datum representing one or more functions a pilot is controlling and/or adjusting. For example, pilot signal 936 may denote that a pilot is controlling and/or maneuvering ailerons, wherein the pilot is not in control of the rudders and/or propulsors. In an embodiment, pilot signal 936 may include an implicit signal and/or an explicit signal. For example, and without limitation, pilot signal 936 may include an explicit signal, wherein the pilot explicitly states there is a lack of control and/or desire for autonomous function. As a further non-limiting example, pilot signal 936 may include an explicit signal directing flight controller 904 to control and/or maintain a portion of aircraft, a portion of the flight plan, the entire aircraft, and/or the entire flight plan. As a further non-limiting example, pilot signal 936 may include an implicit signal, wherein flight controller 904 detects a lack of control such as by a malfunction, torque alteration, flight path deviation, and the like thereof. In an embodiment, and without limitation, pilot signal 936 may include one or more explicit signals to reduce torque, and/or one or more implicit signals that torque may be reduced due to reduction of airspeed velocity. In an embodiment, and without limitation, pilot signal 936 may include one or more local and/or global signals. For example, and without limitation, pilot signal 936 may include a local signal that is transmitted by a pilot and/or crew member. As a further non-limiting example, pilot signal 936 may include a global signal that is transmitted by air traffic control and/or one or more remote users that are in communication with the pilot of aircraft. In an embodiment, pilot signal 936 may be received as a function of a tri-state bus and/or multiplexor that denotes an explicit pilot signal should be transmitted prior to any implicit or global pilot signal.

Still referring to FIG. 9 , autonomous machine-learning model may include one or more autonomous machine-learning processes such as supervised, unsupervised, or reinforcement machine-learning processes that flight controller 904 and/or a remote device may or may not use in the generation of autonomous function. As used in this disclosure “remote device” is an external device to flight controller 904. Additionally or alternatively, autonomous machine-learning model may include one or more autonomous machine-learning processes that a field-programmable gate array (FPGA) may or may not use in the generation of autonomous function. Autonomous machine-learning process may include, without limitation machine learning processes such as simple linear regression, multiple linear regression, polynomial regression, support vector regression, ridge regression, lasso regression, elasticnet regression, decision tree regression, random forest regression, logistic regression, logistic classification, K-nearest neighbors, support vector machines, kernel support vector machines, naïve bayes, decision tree classification, random forest classification, K-means clustering, hierarchical clustering, dimensionality reduction, principal component analysis, linear discriminant analysis, kernel principal component analysis, Q-learning, State Action Reward State Action (SARSA), Deep-Q network, Markov decision processes, Deep Deterministic Policy Gradient (DDPG), or the like thereof.

In an embodiment, and still referring to FIG. 9 , autonomous machine learning model may be trained as a function of autonomous training data, wherein autonomous training data may correlate a flight element, pilot signal, and/or simulation data to an autonomous function. For example, and without limitation, a flight element of an airspeed velocity, a pilot signal of limited and/or no control of propulsors, and a simulation data of required airspeed velocity to reach the destination may result in an autonomous function that includes a semi-autonomous mode to increase thrust of the propulsors. Autonomous training data may be received as a function of user-entered valuations of flight elements, pilot signals, simulation data, and/or autonomous functions. Flight controller 904 may receive autonomous training data by receiving correlations of flight element, pilot signal, and/or simulation data to an autonomous function that were previously received and/or determined during a previous iteration of generation of autonomous function. Autonomous training data may be received by one or more remote devices and/or FPGAs that at least correlate a flight element, pilot signal, and/or simulation data to an autonomous function. Autonomous training data may be received in the form of one or more user-entered correlations of a flight element, pilot signal, and/or simulation data to an autonomous function.

Still referring to FIG. 9 , flight controller 904 may receive autonomous machine-learning model from a remote device and/or FPGA that utilizes one or more autonomous machine learning processes, wherein a remote device and an FPGA is described above in detail. For example, and without limitation, a remote device may include a computing device, external device, processor, FPGA, microprocessor, and the like thereof. Remote device and/or FPGA may perform the autonomous machine-learning process using autonomous training data to generate autonomous function and transmit the output to flight controller 904. Remote device and/or FPGA may transmit a signal, bit, datum, or parameter to flight controller 904 that at least relates to autonomous function. Additionally or alternatively, the remote device and/or FPGA may provide an updated machine-learning model. For example, and without limitation, an updated machine-learning model may be comprised of a firmware update, a software update, an autonomous machine-learning process correction, and the like thereof. As a non-limiting example a software update may incorporate a new simulation data that relates to a modified flight element. Additionally or alternatively, the updated machine learning model may be transmitted to the remote device and/or FPGA, wherein the remote device and/or FPGA may replace the autonomous machine-learning model with the updated machine-learning model and generate the autonomous function as a function of the flight element, pilot signal, and/or simulation data using the updated machine-learning model. The updated machine-learning model may be transmitted by the remote device and/or FPGA and received by flight controller 904 as a software update, firmware update, or corrected autonomous machine-learning model. For example, and without limitation autonomous machine learning model may utilize a neural net machine-learning process, wherein the updated machine-learning model may incorporate a gradient boosting machine-learning process.

Still referring to FIG. 9 , flight controller 904 may include, be included in, and/or communicate with a mobile device such as a mobile telephone or smartphone. Further, flight controller may communicate with one or more additional devices as described below in further detail via a network interface device. The network interface device may be utilized for commutatively connecting a flight controller to one or more of a variety of networks, and one or more devices. Examples of a network interface device include, but are not limited to, a network interface card (e.g., a mobile network interface card, a LAN card), a modem, and any combination thereof. Examples of a network include, but are not limited to, a wide area network (e.g., the Internet, an enterprise network), a local area network (e.g., a network associated with an office, a building, a campus, or other relatively small geographic space), a telephone network, a data network associated with a telephone/voice provider (e.g., a mobile communications provider data and/or voice network), a direct connection between two computing devices, and any combinations thereof. The network may include any network topology and can may employ a wired and/or a wireless mode of communication.

In an embodiment, and still referring to FIG. 9 , flight controller 904 may include, but is not limited to, for example, a cluster of flight controllers in a first location and a second flight controller or cluster of flight controllers in a second location. Flight controller 904 may include one or more flight controllers dedicated to data storage, security, distribution of traffic for load balancing, and the like. Flight controller 904 may be configured to distribute one or more computing tasks as described below across a plurality of flight controllers, which may operate in parallel, in series, redundantly, or in any other manner used for distribution of tasks or memory between computing devices. For example, and without limitation, flight controller 904 may implement a control algorithm to distribute and/or command the plurality of flight controllers. As used in this disclosure a “control algorithm” is a finite sequence of well-defined computer implementable instructions that may determine the flight component of the plurality of flight components to be adjusted. For example, and without limitation, control algorithm may include one or more algorithms that reduce and/or prevent aviation asymmetry. As a further non-limiting example, control algorithms may include one or more models generated as a function of a software including, but not limited to Simulink by MathWorks, Natick, Massachusetts, USA. In an embodiment, and without limitation, control algorithm may be configured to generate an auto-code, wherein an “auto-code,” is used herein, is a code and/or algorithm that is generated as a function of the one or more models and/or software's. In another embodiment, control algorithm may be configured to produce a segmented control algorithm. As used in this disclosure a “segmented control algorithm” is control algorithm that has been separated and/or parsed into discrete sections. For example, and without limitation, segmented control algorithm may parse control algorithm into two or more segments, wherein each segment of control algorithm may be performed by one or more flight controllers operating on distinct flight components.

In an embodiment, and still referring to FIG. 9 , control algorithm may be configured to determine a segmentation boundary as a function of segmented control algorithm. As used in this disclosure a “segmentation boundary” is a limit and/or delineation associated with the segments of the segmented control algorithm. For example, and without limitation, segmentation boundary may denote that a segment in the control algorithm has a first starting section and/or a first ending section. As a further non-limiting example, segmentation boundary may include one or more boundaries associated with an ability of flight component 208. In an embodiment, control algorithm may be configured to create an optimized signal communication as a function of segmentation boundary. For example, and without limitation, optimized signal communication may include identifying the discrete timing required to transmit and/or receive the one or more segmentation boundaries. In an embodiment, and without limitation, creating optimized signal communication further comprises separating a plurality of signal codes across the plurality of flight controllers. For example, and without limitation the plurality of flight controllers may include one or more formal networks, wherein formal networks transmit data along an authority chain and/or are limited to task-related communications. As a further non-limiting example, communication network may include informal networks, wherein informal networks transmit data in any direction. In an embodiment, and without limitation, the plurality of flight controllers may include a chain path, wherein a “chain path,” as used herein, is a linear communication path comprising a hierarchy that data may flow through. In an embodiment, and without limitation, the plurality of flight controllers may include an all-channel path, wherein an “all-channel path,” as used herein, is a communication path that is not restricted to a particular direction. For example, and without limitation, data may be transmitted upward, downward, laterally, and the like thereof. In an embodiment, and without limitation, the plurality of flight controllers may include one or more neural networks that assign a weighted value to a transmitted datum. For example, and without limitation, a weighted value may be assigned as a function of one or more signals denoting that a flight component is malfunctioning and/or in a failure state.

Still referring to FIG. 9 , the plurality of flight controllers may include a master bus controller. As used in this disclosure a “master bus controller” is one or more devices and/or components that are connected to a bus to initiate a direct memory access transaction, wherein a bus is one or more terminals in a bus architecture. Master bus controller may communicate using synchronous and/or asynchronous bus control protocols. In an embodiment, master bus controller may include flight controller 904. In another embodiment, master bus controller may include one or more universal asynchronous receiver-transmitters (UART). For example, and without limitation, master bus controller may include one or more bus architectures that allow a bus to initiate a direct memory access transaction from one or more buses in the bus architectures. As a further non-limiting example, master bus controller may include one or more peripheral devices and/or components to communicate with another peripheral device and/or component and/or the master bus controller. In an embodiment, master bus controller may be configured to perform bus arbitration. As used in this disclosure “bus arbitration” is method and/or scheme to prevent multiple buses from attempting to communicate with and/or connect to master bus controller. For example and without limitation, bus arbitration may include one or more schemes such as a small computer interface system, wherein a small computer interface system is a set of standards for physical connecting and transferring data between peripheral devices and master bus controller by defining commands, protocols, electrical, optical, and/or logical interfaces. In an embodiment, master bus controller may receive intermediate representation 912 and/or output language from logic component 920, wherein output language may include one or more analog-to-digital conversions, low bit rate transmissions, message encryptions, digital signals, binary signals, logic signals, analog signals, and the like thereof described above in detail.

Still referring to FIG. 9 , master bus controller may communicate with a slave bus. As used in this disclosure a “slave bus” is one or more peripheral devices and/or components that initiate a bus transfer. For example, and without limitation, slave bus may receive one or more controls and/or asymmetric communications from master bus controller, wherein slave bus transfers data stored to master bus controller. In an embodiment, and without limitation, slave bus may include one or more internal buses, such as but not limited to a/an internal data bus, memory bus, system bus, front-side bus, and the like thereof. In another embodiment, and without limitation, slave bus may include one or more external buses such as external flight controllers, external computers, remote devices, printers, aircraft computer systems, flight control systems, and the like thereof.

In an embodiment, and still referring to FIG. 9 , control algorithm may optimize signal communication as a function of determining one or more discrete timings. For example, and without limitation master bus controller may synchronize timing of the segmented control algorithm by injecting high priority timing signals on a bus of the master bus control. As used in this disclosure a “high priority timing signal” is information denoting that the information is important. For example, and without limitation, high priority timing signal may denote that a section of control algorithm is of high priority and should be analyzed and/or transmitted prior to any other sections being analyzed and/or transmitted. In an embodiment, high priority timing signal may include one or more priority packets. As used in this disclosure a “priority packet” is a formatted unit of data that is communicated between the plurality of flight controllers. For example, and without limitation, priority packet may denote that a section of control algorithm should be used and/or is of greater priority than other sections.

Still referring to FIG. 9 , flight controller 904 may also be implemented using a “shared nothing” architecture in which data is cached at the worker, in an embodiment, this may enable scalability of aircraft and/or computing device. Flight controller 904 may include a distributer flight controller. As used in this disclosure a “distributer flight controller” is a component that adjusts and/or controls a plurality of flight components as a function of a plurality of flight controllers. For example, distributer flight controller may include a flight controller that communicates with a plurality of additional flight controllers and/or clusters of flight controllers. In an embodiment, distributed flight control may include one or more neural networks. For example, neural network also known as an artificial neural network, is a network of “nodes,” or data structures having one or more inputs, one or more outputs, and a function determining outputs based on inputs. Such nodes may be organized in a network, such as without limitation a convolutional neural network, including an input layer of nodes, one or more intermediate layers, and an output layer of nodes. Connections between nodes may be created via the process of “training” the network, in which elements from a training dataset are applied to the input nodes, a suitable training algorithm (such as Levenberg-Marquardt, conjugate gradient, simulated annealing, or other algorithms) is then used to adjust the connections and weights between nodes in adjacent layers of the neural network to produce the desired values at the output nodes. This process is sometimes referred to as deep learning.

Still referring to FIG. 9 , a node may include, without limitation a plurality of inputs x_(i) that may receive numerical values from inputs to a neural network containing the node and/or from other nodes. Node may perform a weighted sum of inputs using weights w_(i) that are multiplied by respective inputs x_(i). Additionally or alternatively, a bias b may be added to the weighted sum of the inputs such that an offset is added to each unit in the neural network layer that is independent of the input to the layer. The weighted sum may then be input into a function φ, which may generate one or more outputs y. Weight w_(i) applied to an input x_(i) may indicate whether the input is “excitatory,” indicating that it has strong influence on the one or more outputs y, for instance by the corresponding weight having a large numerical value, and/or a “inhibitory,” indicating it has a weak effect influence on the one more inputs y, for instance by the corresponding weight having a small numerical value. The values of weights w_(i) may be determined by training a neural network using training data, which may be performed using any suitable process as described above. In an embodiment, and without limitation, a neural network may receive semantic units as inputs and output vectors representing such semantic units according to weights w_(i) that are derived using machine-learning processes as described in this disclosure.

Still referring to FIG. 9 , flight controller may include a sub-controller 940. As used in this disclosure a “sub-controller” is a controller and/or component that is part of a distributed controller as described above; for instance, flight controller 904 may be and/or include a distributed flight controller made up of one or more sub-controllers. For example, and without limitation, sub-controller 940 may include any controllers and/or components thereof that are similar to distributed flight controller and/or flight controller as described above. Sub-controller 940 may include any component of any flight controller as described above. Sub-controller 940 may be implemented in any manner suitable for implementation of a flight controller as described above. As a further non-limiting example, sub-controller 940 may include one or more processors, logic components and/or computing devices capable of receiving, processing, and/or transmitting data across the distributed flight controller as described above. As a further non-limiting example, sub-controller 940 may include a controller that receives a signal from a first flight controller and/or first distributed flight controller component and transmits the signal to a plurality of additional sub-controllers and/or flight components.

Still referring to FIG. 9 , flight controller may include a co-controller 944. As used in this disclosure a “co-controller” is a controller and/or component that joins flight controller 904 as components and/or nodes of a distributer flight controller as described above. For example, and without limitation, co-controller 944 may include one or more controllers and/or components that are similar to flight controller 904. As a further non-limiting example, co-controller 944 may include any controller and/or component that joins flight controller 904 to distributer flight controller. As a further non-limiting example, co-controller 944 may include one or more processors, logic components and/or computing devices capable of receiving, processing, and/or transmitting data to and/or from flight controller 904 to distributed flight control system. Co-controller 944 may include any component of any flight controller as described above. Co-controller 944 may be implemented in any manner suitable for implementation of a flight controller as described above.

In an embodiment, and with continued reference to FIG. 9 , flight controller 904 may be designed and/or configured to perform any method, method step, or sequence of method steps in any embodiment described in this disclosure, in any order and with any degree of repetition. For instance, flight controller 904 may be configured to perform a single step or sequence repeatedly until a desired or commanded outcome is achieved; repetition of a step or a sequence of steps may be performed iteratively and/or recursively using outputs of previous repetitions as inputs to subsequent repetitions, aggregating inputs and/or outputs of repetitions to produce an aggregate result, reduction or decrement of one or more variables such as global variables, and/or division of a larger processing task into a set of iteratively addressed smaller processing tasks. Flight controller may perform any step or sequence of steps as described in this disclosure in parallel, such as simultaneously and/or substantially simultaneously performing a step two or more times using two or more parallel threads, processor cores, or the like; division of tasks between parallel threads and/or processes may be performed according to any protocol suitable for division of tasks between iterations. Persons skilled in the art, upon reviewing the entirety of this disclosure, will be aware of various ways in which steps, sequences of steps, processing tasks, and/or data may be subdivided, shared, or otherwise dealt with using iteration, recursion, and/or parallel processing.

Referring to FIG. 10 , an avionic mesh network 1000 is schematically illustrated. According to some embodiments, an avionic mesh network may include a single network. Alternatively or additionally, an avionic mesh network may include more than a single network. A single networks may be differentiated according to address, for example Internet Protocol address, gateway, or name server used. For example, in some cases, multiple networks may use different gateways, even though the multiple networks may still be within communicative connection with one another.

With continued reference to FIG. 10 , in some embodiments, an avionic mesh network 1000 may include inter-aircraft network nodes, intra-aircraft network nodes, as well as non-aircraft network nodes. As used in this disclosure, a “network node” is any component communicatively coupled to at least a network. For example, a network node may include an endpoint, for example a computing device on network, a switch, a router, a bridge, and the like. A network node may include a redistribution point, for example a switch, or an endpoint, for example a component communicatively connected to network. As used in this disclosure, “inter-aircraft network nodes” are two or more network nodes that are physically located in two or more aircraft and communicatively connected. As used in this disclosure, “intra-aircraft network nodes” are two or more network nodes that are each physically located within a single aircraft and communicatively connected. As used in this disclosure, a “non-aircraft network node” is a network node that is not located on an aircraft and is communicatively connected to a network.

With continued reference to FIG. 10 , in some embodiments, avionic mesh network 1000 may include a wireless mesh network organized in a mesh topology. A mesh topology may include a networked infrastructure in which network nodes may be connected directly, dynamically, and/or non-hierarchically to many other nodes (e.g., as many other nodes as possible). In some cases, a mesh topology may facilitate cooperation between network nodes, for example redistributive network nodes, in routing of communication between network participants (e.g., other network nodes). A mesh topology may facilitate a lack of dependency on any given node, thereby allowing other nodes to participate in relaying communication. In some cases, mesh networks may dynamically self-organize and self-configure. Self-configuration enables dynamic distribution of workloads, particularly in event a network node failure, thereby contributing to fault-tolerance and reduced maintenance requirements. In some embodiments, mesh networks can relay messages using either a flooding technique or a routing technique. A flooding technique sends a message to every network node, flooding network with the message. A routing technique allows a mesh network to communicate a message is propagated along a determined nodal path to the message's intended destination. Message routing may be performed by mesh networks in part by ensuring that all nodal paths are available. Nodal path availability may be ensured by maintaining continuous nodal network connections and reconfiguring nodal paths with an occurrence of broken nodal paths. Reconfiguration of nodal paths, in some cases, may be performed by utilizing self-healing algorithms, such as without limitation Shortest Path Bridging. Self-healing allows a routing-based network to operate when a node fails or when a connection becomes unreliable. In some embodiments, a mesh network having all network nodes connected to each other may be termed a fully connected network. Fully connected wired networks have advantages of security and reliability. For example, an unreliable wired connection between two wired network nodes will only affect only two nodes attached to the unreliable wired connection.

With continued reference to FIG. 10 , an exemplary avionic mesh network 1000 is shown providing communicative connection between a computing device 1004 and aircraft 1008A-C. Computing device 1004 may include any computing device described in this disclosure. In some embodiments, computing device 1004 may be connected to a terrestrial network 1012. Terrestrial networks 1012 may include any network described in this disclosure and may include, without limitation, wireless networks, local area networks (LANs), wide area networks (WANs), ethernet, Internet, mobile broadband, fiber optic communication, and the like. In some cases, a grounded aircraft 1008C may be connected to an avionic mesh network 1000 by way of a terrestrial network 1012. In some cases, avionic mesh network 1000 may include a wireless communication node 1016. A wireless communication node 1016 may provide communicative connection by way of wireless networking. Wireless networking may include any wireless network method described in this disclosure, including without limitation Wi-Fi, mobile broadband, optical communication, radio communication, and the like. In some cases, wireless communication node 1016 may be configured to connect with a first airborne aircraft in flight 1008A. First airborne aircraft in some embodiments may include at least a first intra-aircraft network node 1020A. As described above, first intra-aircraft network node 1020A may be configured to connect to other nodes within first airborne aircraft 1008A. In some cases, avionic mesh network 1000 may be configured to provide inter-aircraft communication, for instance by using a first inter-aircraft network node 1024A. In some cases, first inter-aircraft network node may be configured to communicate with a second inter-aircraft network node 1024B. Inter-aircraft nodes 1020A-B may include radio communication and/or optical wireless communication, for example free space optical communication.

With continued reference to FIG. 10 , avionic mesh network 1000 may be additionally configured to provide for encrypted and/or secured communication between components, i.e., nodes, communicative on the network. In some cases, encrypted communication on network 1000 may be provided for by way of end-to-end encryption. Exemplary non-limited end-to-end encryption methods include symmetric key encryption, asymmetric key encryption, public key encryption methods, private key encryption methods and the like. In some cases, avionic mesh network 1000 and/or another network may be configured to provide secure key exchange for encryption methods. Exemplary non-limiting key exchange methods include Diffie-Hellman key exchange, Supersingular isogeny key exchange, use of at least a trusted key authority, password authenticated key agreement, forward secrecy, quantum key exchange, and the like. In some cases, an avionic mesh network 1000 may include at least an optical network component, for example fiber optic cables, wireless optical networks, and/or free space optical network. In some cases, encrypted communication between network nodes may be implemented by way of optical network components. For example, quantum key exchange in some embodiments, may defeat man-in-the-middle attacks. This is generally because, observation of a quantum system disturbs the quantum system. Quantum key exchange in some cases, uses this general characteristic of quantum physics to communicate sensitive information, such as an encryption key, by encoding the sensitive information in polarization state of quantum of radiation. At least a polarization sensitive detector may be used to decode sensitive information.

Still referring to FIG. 10 , in an embodiment, methods and systems described herein may perform or implement one or more aspects of a cryptographic system. In one embodiment, a cryptographic system is a system that converts data from a first form, known as “plaintext,” which is intelligible when viewed in its intended format, into a second form, known as “ciphertext,” which is not intelligible when viewed in the same way. Ciphertext may be unintelligible in any format unless first converted back to plaintext. In one embodiment, a process of converting plaintext into ciphertext is known as “encryption.” Encryption process may involve the use of a datum, known as an “encryption key,” to alter plaintext. Cryptographic system may also convert ciphertext back into plaintext, which is a process known as “decryption.” Decryption process may involve the use of a datum, known as a “decryption key,” to return the ciphertext to its original plaintext form. In embodiments of cryptographic systems that are “symmetric,” decryption key is essentially the same as encryption key: possession of either key makes it possible to deduce the other key quickly without further secret knowledge. Encryption and decryption keys in symmetric cryptographic systems may be kept secret and shared only with persons or entities that the user of the cryptographic system wishes to be able to decrypt the ciphertext. One example of a symmetric cryptographic system is the Advanced Encryption Standard (“AES”), which arranges plaintext into matrices and then modifies the matrices through repeated permutations and arithmetic operations with an encryption key.

Still referring to FIG. 10 , in embodiments of cryptographic systems that are “asymmetric,” either encryption or decryption key cannot be readily deduced without additional secret knowledge, even given the possession of a corresponding decryption or encryption key, respectively; a common example is a “public key cryptographic system,” in which possession of the encryption key does not make it practically feasible to deduce the decryption key, so that the encryption key may safely be made available to the public. An example of a public key cryptographic system is RSA, in which an encryption key involves the use of numbers that are products of very large prime numbers, but a decryption key involves the use of those very large prime numbers, such that deducing the decryption key from the encryption key requires the practically infeasible task of computing the prime factors of a number which is the product of two very large prime numbers. Another example is elliptic curve cryptography, which relies on the fact that given two points P and Q on an elliptic curve over a finite field, and a definition for addition where A+B=−R, the point where a line connecting point A and point B intersects the elliptic curve, where “0,” the identity, is a point at infinity in a projective plane containing the elliptic curve, finding a number k such that adding P to itself k times results in Q is computationally impractical, given correctly selected elliptic curve, finite field, and P and Q.

With continued reference to FIG. 10 , in some cases, avionic mesh network 1000 may be configured to allow message authentication between network nodes. In some cases, message authentication may include a property that a message has not been modified while in transit and that receiving party can verify source of the message. In some embodiments, message authentication may include us of message authentication codes (MACs), authenticated encryption (AE), and/or digital signature. Message authentication code, also known as digital authenticator, may be used as an integrity check based on a secret key shared by two parties to authenticate information transmitted between them. In some cases, a digital authenticator may use a cryptographic hash and/or an encryption algorithm.

Still referring to FIG. 10 , in some embodiments, systems and methods described herein produce cryptographic hashes, also referred to by the equivalent shorthand term “hashes.” A cryptographic hash, as used herein, is a mathematical representation of a lot of data, such as files or blocks in a block chain as described in further detail below; the mathematical representation is produced by a lossy “one-way” algorithm known as a “hashing algorithm.” Hashing algorithm may be a repeatable process; that is, identical lots of data may produce identical hashes each time they are subjected to a particular hashing algorithm. Because hashing algorithm is a one-way function, it may be impossible to reconstruct a lot of data from a hash produced from the lot of data using the hashing algorithm. In the case of some hashing algorithms, reconstructing the full lot of data from the corresponding hash using a partial set of data from the full lot of data may be possible only by repeatedly guessing at the remaining data and repeating the hashing algorithm; it is thus computationally difficult if not infeasible for a single computer to produce the lot of data, as the statistical likelihood of correctly guessing the missing data may be extremely low. However, the statistical likelihood of a computer of a set of computers simultaneously attempting to guess the missing data within a useful timeframe may be higher, permitting mining protocols as described in further detail below.

Still referring to FIG. 10 , in an embodiment, hashing algorithm may demonstrate an “avalanche effect,” whereby even extremely small changes to lot of data produce drastically different hashes. This may thwart attempts to avoid the computational work necessary to recreate a hash by simply inserting a fraudulent datum in data lot, enabling the use of hashing algorithms for “tamper-proofing” data such as data contained in an immutable ledger as described in further detail below. This avalanche or “cascade” effect may be evinced by various hashing processes; persons skilled in the art, upon reading the entirety of this disclosure, will be aware of various suitable hashing algorithms for purposes described herein. Verification of a hash corresponding to a lot of data may be performed by running the lot of data through a hashing algorithm used to produce the hash. Such verification may be computationally expensive, albeit feasible, potentially adding up to significant processing delays where repeated hashing, or hashing of large quantities of data, is required, for instance as described in further detail below. Examples of hashing programs include, without limitation, SHA256, a NIST standard; further current and past hashing algorithms include Winternitz hashing algorithms, various generations of Secure Hash Algorithm (including “SHA-1,” “SHA-2,” and “SHA-3”), “Message Digest” family hashes such as “MD4,” “MD5,” “MD6,” and “RIPEMD,” Keccak, “BLAKE” hashes and progeny (e.g., “BLAKE2,” “BLAKE-256,” “BLAKE-512,” and the like), Message Authentication Code (“MAC”)-family hash functions such as PMAC, OMAC, VMAC, HMAC, and UMAC, Polyl305-AES, Elliptic Curve Only Hash (“ECOH”) and similar hash functions, Fast-Syndrome-based (FSB) hash functions, GOST hash functions, the Grøstl hash function, the HAS-160 hash function, the JH hash function, the RadioGatún hash function, the Skein hash function, the Streebog hash function, the SWIFFT hash function, the Tiger hash function, the Whirlpool hash function, or any hash function that satisfies, at the time of implementation, the requirements that a cryptographic hash be deterministic, infeasible to reverse-hash, infeasible to find collisions, and have the property that small changes to an original message to be hashed will change the resulting hash so extensively that the original hash and the new hash appear uncorrelated to each other. A degree of security of a hash function in practice may depend both on the hash function itself and on characteristics of the message and/or digest used in the hash function. For example, where a message is random, for a hash function that fulfills collision-resistance requirements, a brute-force or “birthday attack” may to detect collision may be on the order of O(2n/2) for n output bits; thus, it may take on the order of 2256 operations to locate a collision in a 512 bit output “Dictionary” attacks on hashes likely to have been generated from a non-random original text can have a lower computational complexity, because the space of entries they are guessing is far smaller than the space containing all random permutations of bits. However, the space of possible messages may be augmented by increasing the length or potential length of a possible message, or by implementing a protocol whereby one or more randomly selected strings or sets of data are added to the message, rendering a dictionary attack significantly less effective.

Continuing to refer to FIG. 10 , a “secure proof,” as used in this disclosure, is a protocol whereby an output is generated that demonstrates possession of a secret, such as device-specific secret, without demonstrating the entirety of the device-specific secret; in other words, a secure proof by itself, is insufficient to reconstruct the entire device-specific secret, enabling the production of at least another secure proof using at least a device-specific secret. A secure proof may be referred to as a “proof of possession” or “proof of knowledge” of a secret. Where at least a device-specific secret is a plurality of secrets, such as a plurality of challenge-response pairs, a secure proof may include an output that reveals the entirety of one of the plurality of secrets, but not all of the plurality of secrets; for instance, secure proof may be a response contained in one challenge-response pair. In an embodiment, proof may not be secure; in other words, proof may include a one-time revelation of at least a device-specific secret, for instance as used in a single challenge-response exchange.

Still referring to FIG. 10 , secure proof may include a zero-knowledge proof, which may provide an output demonstrating possession of a secret while revealing none of the secret to a recipient of the output; zero-knowledge proof may be information-theoretically secure, meaning that an entity with infinite computing power would be unable to determine secret from output. Alternatively, zero-knowledge proof may be computationally secure, meaning that determination of secret from output is computationally infeasible, for instance to the same extent that determination of a private key from a public key in a public key cryptographic system is computationally infeasible. Zero-knowledge proof algorithms may generally include a set of two algorithms, a prover algorithm, or “P,” which is used to prove computational integrity and/or possession of a secret, and a verifier algorithm, or “V” whereby a party may check the validity of P. Zero-knowledge proof may include an interactive zero-knowledge proof, wherein a party verifying the proof must directly interact with the proving party; for instance, the verifying and proving parties may be required to be online, or connected to the same network as each other, at the same time. Interactive zero-knowledge proof may include a “proof of knowledge” proof, such as a Schnorr algorithm for proof on knowledge of a discrete logarithm. in a Schnorr algorithm, a prover commits to a randomness r, generates a message based on r, and generates a message adding r to a challenge c multiplied by a discrete logarithm that the prover is able to calculate; verification is performed by the verifier who produced c by exponentiation, thus checking the validity of the discrete logarithm. Interactive zero-knowledge proofs may alternatively or additionally include sigma protocols. Persons skilled in the art, upon reviewing the entirety of this disclosure, will be aware of various alternative interactive zero-knowledge proofs that may be implemented consistently with this disclosure.

Still referring to FIG. 10 , alternatively, zero-knowledge proof may include a non-interactive zero-knowledge, proof, or a proof wherein neither party to the proof interacts with the other party to the proof; for instance, each of a party receiving the proof and a party providing the proof may receive a reference datum which the party providing the proof may modify or otherwise use to perform the proof. As a non-limiting example, zero-knowledge proof may include a succinct non-interactive arguments of knowledge (ZK-SNARKS) proof, wherein a “trusted setup” process creates proof and verification keys using secret (and subsequently discarded) information encoded using a public key cryptographic system, a prover runs a proving algorithm using the proving key and secret information available to the prover, and a verifier checks the proof using the verification key; public key cryptographic system may include RSA, elliptic curve cryptography, ElGamal, or any other suitable public key cryptographic system. Generation of trusted setup may be performed using a secure multiparty computation so that no one party has control of the totality of the secret information used in the trusted setup; as a result, if any one party generating the trusted setup is trustworthy, the secret information may be unrecoverable by malicious parties. As another non-limiting example, non-interactive zero-knowledge proof may include a Succinct Transparent Arguments of Knowledge (ZK-STARKS) zero-knowledge proof. In an embodiment, a ZK-STARKS proof includes a Merkle root of a Merkle tree representing evaluation of a secret computation at some number of points, which may be 1 billion points, plus Merkle branches representing evaluations at a set of randomly selected points of the number of points; verification may include determining that Merkle branches provided match the Merkle root, and that point verifications at those branches represent valid values, where validity is shown by demonstrating that all values belong to the same polynomial created by transforming the secret computation. In an embodiment, ZK-STARKS does not require a trusted setup.

Still referring to FIG. 10 , zero-knowledge proof may include any other suitable zero-knowledge proof. Zero-knowledge proof may include, without limitation bulletproofs. Zero-knowledge proof may include a homomorphic public-key cryptography (hPKC)-based proof. Zero-knowledge proof may include a discrete logarithmic problem (DLP) proof. Zero-knowledge proof may include a secure multi-party computation (MPC) proof. Zero-knowledge proof may include, without limitation, an incrementally verifiable computation (IVC). Zero-knowledge proof may include an interactive oracle proof (IOP). Zero-knowledge proof may include a proof based on the probabilistically checkable proof (PCP) theorem, including a linear PCP (LPCP) proof. Persons skilled in the art, upon reviewing the entirety of this disclosure, will be aware of various forms of zero-knowledge proofs that may be used, singly or in combination, consistently with this disclosure.

Still referring to FIG. 10 , in an embodiment, secure proof is implemented using a challenge-response protocol. In an embodiment, this may function as a one-time pad implementation; for instance, a manufacturer or other trusted party may record a series of outputs (“responses”) produced by a device possessing secret information, given a series of corresponding inputs (“challenges”), and store them securely. In an embodiment, a challenge-response protocol may be combined with key generation. A single key may be used in one or more digital signatures as described in further detail below, such as signatures used to receive and/or transfer possession of crypto-currency assets; the key may be discarded for future use after a set period of time. In an embodiment, varied inputs include variations in local physical parameters, such as fluctuations in local electromagnetic fields, radiation, temperature, and the like, such that an almost limitless variety of private keys may be so generated. Secure proof may include encryption of a challenge to produce the response, indicating possession of a secret key. Encryption may be performed using a private key of a public key cryptographic system, or using a private key of a symmetric cryptographic system; for instance, trusted party may verify response by decrypting an encryption of challenge or of another datum using either a symmetric or public-key cryptographic system, verifying that a stored key matches the key used for encryption as a function of at least a device-specific secret. Keys may be generated by random variation in selection of prime numbers, for instance for the purposes of a cryptographic system such as RSA that relies prime factoring difficulty. Keys may be generated by randomized selection of parameters for a seed in a cryptographic system, such as elliptic curve cryptography, which is generated from a seed. Keys may be used to generate exponents for a cryptographic system such as Diffie-Helman or ElGamal that are based on the discrete logarithm problem.

Still referring to FIG. 10 , as described above in some embodiments an avionic mesh network 1000 may provide secure and/or encrypted communication at least in part by employing digital signatures. A “digital signature,” as used herein, includes a secure proof of possession of a secret by a signing device, as performed on provided element of data, known as a “message.” A message may include an encrypted mathematical representation of a file or other set of data using the private key of a public key cryptographic system. Secure proof may include any form of secure proof as described above, including without limitation encryption using a private key of a public key cryptographic system as described above. Signature may be verified using a verification datum suitable for verification of a secure proof; for instance, where secure proof is enacted by encrypting message using a private key of a public key cryptographic system, verification may include decrypting the encrypted message using the corresponding public key and comparing the decrypted representation to a purported match that was not encrypted; if the signature protocol is well-designed and implemented correctly, this means the ability to create the digital signature is equivalent to possession of the private decryption key and/or device-specific secret. Likewise, if a message making up a mathematical representation of file is well-designed and implemented correctly, any alteration of the file may result in a mismatch with the digital signature; the mathematical representation may be produced using an alteration-sensitive, reliably reproducible algorithm, such as a hashing algorithm as described above. A mathematical representation to which the signature may be compared may be included with signature, for verification purposes; in other embodiments, the algorithm used to produce the mathematical representation may be publicly available, permitting the easy reproduction of the mathematical representation corresponding to any file.

Still viewing FIG. 10 , in some embodiments, digital signatures may be combined with or incorporated in digital certificates. In one embodiment, a digital certificate is a file that conveys information and links the conveyed information to a “certificate authority” that is the issuer of a public key in a public key cryptographic system. Certificate authority in some embodiments contains data conveying the certificate authority's authorization for the recipient to perform a task. The authorization may be the authorization to access a given datum. The authorization may be the authorization to access a given process. In some embodiments, the certificate may identify the certificate authority. The digital certificate may include a digital signature.

With continued reference to FIG. 10 , in some embodiments, a third party such as a certificate authority (CA) is available to verify that the possessor of the private key is a particular entity; thus, if the certificate authority may be trusted, and the private key has not been stolen, the ability of an entity to produce a digital signature confirms the identity of the entity and links the file to the entity in a verifiable way. Digital signature may be incorporated in a digital certificate, which is a document authenticating the entity possessing the private key by authority of the issuing certificate authority and signed with a digital signature created with that private key and a mathematical representation of the remainder of the certificate. In other embodiments, digital signature is verified by comparing the digital signature to one known to have been created by the entity that purportedly signed the digital signature; for instance, if the public key that decrypts the known signature also decrypts the digital signature, the digital signature may be considered verified. Digital signature may also be used to verify that the file has not been altered since the formation of the digital signature.

Referring now to FIG. 11 , an exemplary method 1100 for of use for encrypting external communications for an electric aircraft. An electric aircraft may include any electric vehicle described in this disclosure, for example with reference to FIGS. 1-11 . At step 1105, method 1100 may include communicating, using a communication module configured to communicate with a network node. A communication module may include any communication module described in this disclosure, for example with reference to FIGS. 1-11 . A network node may include any node described in this disclosure, for example with reference to FIGS. 1-11 .

Referring now to FIG. 11 , At step 1110, method 1100 may include powering, using a battery pack configured to power the electric aircraft. A battery pack may include any battery described in this disclosure, for example with reference to FIGS. 1-11 .

Referring now to FIG. 11 , At step 1115, method 1100 may include sensing, using a battery sensor, configured to generate battery datum. A battery sensor may include any sensor described in this disclosure, for example with reference to FIGS. 1-11 . A battery datum may include any datum described in this disclosure, for example with reference to FIGS. 1-11 .

Referring now to FIG. 11 , At step 1120, method 1100 may include computing, using a computing device that is communicatively connected to the communication module and the battery sensor. A computing device may include any computing device described in this disclosure, for example with reference to FIGS. 1-11 .

Referring now to FIG. 11 , At step 1125, method 1100 may include receiving, using a computing device the battery datum.

Referring now to FIG. 11 , At step 1130, method 1100 may include encrypting, using the computing device the battery datum using an encryption process. Encryption process may include any encryption process described in this disclosure, for example with reference to FIGS. 1-11 .

Referring now to FIG. 11 , At step 1135, method 1100 may include identifying using a computing device the network node.

Referring now to FIG. 11 , At step 1140, method 1100 may include transmitting, the encrypted battery datum to a network node using a communication module.

It is to be noted that any one or more of the aspects and embodiments described herein may be conveniently implemented using one or more machines (e.g., one or more computing devices that are utilized as a user computing device for an electronic document, one or more server devices, such as a document server, etc.) programmed according to the teachings of the present specification, as will be apparent to those of ordinary skill in the computer art. Appropriate software coding can readily be prepared by skilled programmers based on the teachings of the present disclosure, as will be apparent to those of ordinary skill in the software art. Aspects and implementations discussed above employing software and/or software modules may also include appropriate hardware for assisting in the implementation of the machine executable instructions of the software and/or software module.

Such software may be a computer program product that employs a machine-readable storage medium. A machine-readable storage medium may be any medium that is capable of storing and/or encoding a sequence of instructions for execution by a machine (e.g., a computing device) and that causes the machine to perform any one of the methodologies and/or embodiments described herein. Examples of a machine-readable storage medium include, but are not limited to, a magnetic disk, an optical disc (e.g., CD, CD-R, DVD, DVD-R, etc.), a magneto-optical disk, a read-only memory “ROM” device, a random access memory “RAM” device, a magnetic card, an optical card, a solid-state memory device, an EPROM, an EEPROM, and any combinations thereof. A machine-readable medium, as used herein, is intended to include a single medium as well as a collection of physically separate media, such as, for example, a collection of compact discs or one or more hard disk drives in combination with a computer memory. As used herein, a machine-readable storage medium does not include transitory forms of signal transmission.

Such software may also include information (e.g., data) carried as a data signal on a data carrier, such as a carrier wave. For example, machine-executable information may be included as a data-carrying signal embodied in a data carrier in which the signal encodes a sequence of instruction, or portion thereof, for execution by a machine (e.g., a computing device) and any related information (e.g., data structures and data) that causes the machine to perform any one of the methodologies and/or embodiments described herein.

Examples of a computing device include, but are not limited to, an electronic book reading device, a computer workstation, a terminal computer, a server computer, a handheld device (e.g., a tablet computer, a smartphone, etc.), a web appliance, a network router, a network switch, a network bridge, any machine capable of executing a sequence of instructions that specify an action to be taken by that machine, and any combinations thereof. In one example, a computing device may include and/or be included in a kiosk.

FIG. 12 shows a diagrammatic representation of one embodiment of a computing device in the exemplary form of a computer system 1200 within which a set of instructions for causing a control system to perform any one or more of the aspects and/or methodologies of the present disclosure may be executed. It is also contemplated that multiple computing devices may be utilized to implement a specially configured set of instructions for causing one or more of the devices to perform any one or more of the aspects and/or methodologies of the present disclosure. Computer system 1200 includes a processor 1204 and a memory 1208 that communicate with each other, and with other components, via a bus 1212. Bus 1212 may include any of several types of bus structures including, but not limited to, a memory bus, a memory controller, a peripheral bus, a local bus, and any combinations thereof, using any of a variety of bus architectures.

Processor 1204 may include any suitable processor, such as without limitation a processor incorporating logical circuitry for performing arithmetic and logical operations, such as an arithmetic and logic unit (ALU), which may be regulated with a state machine and directed by operational inputs from memory and/or sensors; processor 1204 may be organized according to Von Neumann and/or Harvard architecture as a non-limiting example. Processor 1204 may include, incorporate, and/or be incorporated in, without limitation, a microcontroller, microprocessor, digital signal processor (DSP), Field Programmable Gate Array (FPGA), Complex Programmable Logic Device (CPLD), Graphical Processing Unit (GPU), general purpose GPU, Tensor Processing Unit (TPU), analog or mixed signal processor, Trusted Platform Module (TPM), a floating point unit (FPU), and/or system on a chip (SoC).

Memory 1208 may include various components (e.g., machine-readable media) including, but not limited to, a random-access memory component, a read only component, and any combinations thereof. In one example, a basic input/output system 1216 (BIOS), including basic routines that help to transfer information between elements within computer system 1200, such as during start-up, may be stored in memory 1208. Memory 1208 may also include (e.g., stored on one or more machine-readable media) instructions (e.g., software) 1220 embodying any one or more of the aspects and/or methodologies of the present disclosure. In another example, memory 1208 may further include any number of program modules including, but not limited to, an operating system, one or more application programs, other program modules, program data, and any combinations thereof.

Computer system 1200 may also include a storage device 1224. Examples of a storage device (e.g., storage device 1224) include, but are not limited to, a hard disk drive, a magnetic disk drive, an optical disc drive in combination with an optical medium, a solid-state memory device, and any combinations thereof. Storage device 1224 may be connected to bus 1212 by an appropriate interface (not shown). Example interfaces include, but are not limited to, SCSI, advanced technology attachment (ATA), serial ATA, universal serial bus (USB), IEEE 1394 (FIREWIRE), and any combinations thereof. In one example, storage device 1224 (or one or more components thereof) may be removably interfaced with computer system 1200 (e.g., via an external port connector (not shown)). Particularly, storage device 1224 and an associated machine-readable medium 1228 may provide nonvolatile and/or volatile storage of machine-readable instructions, data structures, program modules, and/or other data for computer system 1200. In one example, software 1220 may reside, completely or partially, within machine-readable medium 1228. In another example, software 1220 may reside, completely or partially, within processor 1204.

Computer system 1200 may also include an input device 1232. In one example, a user of computer system 1200 may enter commands and/or other information into computer system 1200 via input device 1232. Examples of an input device 1232 include, but are not limited to, an alpha-numeric input device (e.g., a keyboard), a pointing device, a joystick, a gamepad, an audio input device (e.g., a microphone, a voice response system, etc.), a cursor control device (e.g., a mouse), a touchpad, an optical scanner, a video capture device (e.g., a still camera, a video camera), a touchscreen, and any combinations thereof. Input device 1232 may be interfaced to bus 1212 via any of a variety of interfaces (not shown) including, but not limited to, a serial interface, a parallel interface, a game port, a USB interface, a FIREWIRE interface, a direct interface to bus 1212, and any combinations thereof. Input device 1232 may include a touch screen interface that may be a part of or separate from display 1236, discussed further below. Input device 1232 may be utilized as a user selection device for selecting one or more graphical representations in a graphical interface as described above.

A user may also input commands and/or other information to computer system 1200 via storage device 1224 (e.g., a removable disk drive, a flash drive, etc.) and/or network interface device 1240. A network interface device, such as network interface device 1240, may be utilized for connecting computer system 1200 to one or more of a variety of networks, such as network 1244, and one or more remote devices 1248 connected thereto. Examples of a network interface device include, but are not limited to, a network interface card (e.g., a mobile network interface card, a LAN card), a modem, and any combination thereof. Examples of a network include, but are not limited to, a wide area network (e.g., the Internet, an enterprise network), a local area network (e.g., a network associated with an office, a building, a campus or other relatively small geographic space), a telephone network, a data network associated with a telephone/voice provider (e.g., a mobile communications provider data and/or voice network), a direct connection between two computing devices, and any combinations thereof. A network, such as network 1244, may employ a wired and/or a wireless mode of communication. In general, any network topology may be used. Information (e.g., data, software 1220, etc.) may be communicated to and/or from computer system 1200 via network interface device 1240.

Computer system 1200 may further include a video display adapter 1252 for communicating a displayable image to a display device, such as display device 1236. Examples of a display device include, but are not limited to, a liquid crystal display (LCD), a cathode ray tube (CRT), a plasma display, a light emitting diode (LED) display, and any combinations thereof. Display adapter 1252 and display device 1236 may be utilized in combination with processor 1204 to provide graphical representations of aspects of the present disclosure. In addition to a display device, computer system 1200 may include one or more other peripheral output devices including, but not limited to, an audio speaker, a printer, and any combinations thereof. Such peripheral output devices may be connected to bus 1212 via a peripheral interface 1256. Examples of a peripheral interface include, but are not limited to, a serial port, a USB connection, a FIREWIRE connection, a parallel connection, and any combinations thereof.

The foregoing has been a detailed description of illustrative embodiments of the invention. Various modifications and additions can be made without departing from the spirit and scope of this invention. Features of each of the various embodiments described above may be combined with features of other described embodiments as appropriate in order to provide a multiplicity of feature combinations in associated new embodiments. Furthermore, while the foregoing describes a number of separate embodiments, what has been described herein is merely illustrative of the application of the principles of the present invention. Additionally, although particular methods herein may be illustrated and/or described as being performed in a specific order, the ordering is highly variable within ordinary skill to achieve methods, systems, and software according to the present disclosure. Accordingly, this description is meant to be taken only by way of example, and not to otherwise limit the scope of this invention.

Exemplary embodiments have been disclosed above and illustrated in the accompanying drawings. It will be understood by those skilled in the art that various changes, omissions, and additions may be made to that which is specifically disclosed herein without departing from the spirit and scope of the present invention. 

What is claimed is:
 1. An apparatus for encrypting external communication for an electric aircraft, wherein the apparatus comprises: a communication component configured to communicate with an electric aircraft; a computing device communicatively connected to the communication component wherein the computing device is configured to: receive a battery datum associated with the electric aircraft; and transmit the battery datum associated with the electric aircraft; and a ground support associated with the communication component, wherein the ground support comprises a charging station configured to charge the electric aircraft.
 2. The apparatus of claim 1 wherein the battery datum includes information on a state of charge associated with the electric aircraft.
 3. The apparatus of claim 1, wherein the communication component is configured to communicate with the electric aircraft through a wired connection between the ground support and the electric aircraft.
 4. The apparatus of claim 1, wherein the computing device is further configured to: identify a network node; and transmit the battery datum to the network node.
 5. The apparatus of claim 3, the computing device further configured to encrypt the battery datum using an encryption process.
 6. The apparatus of claim 1, wherein the ground support equipment is further configured to provide electrical energy to the electric aircraft.
 7. The apparatus of claim 1, wherein the computing device is further configured to receive data associated with a health of a flight component on the electric aircraft.
 8. The apparatus of claim 1, wherein the computing device is further configured to receive component state data of a component of the electric aircraft.
 9. The apparatus of claim 8, wherein the component comprises a motor and wherein the component state data comprises information on thresholds exceeded by the electric aircraft.
 10. The apparatus of claim 5, wherein the computing device is configured to provide encrypted communication at least in part by employing digital signatures.
 11. A method of use for encrypting external communication for an electric aircraft, wherein the method comprises: communicating, using a communication component, with an electric aircraft; receiving, by a computing device communicatively connected to the communication component, a battery datum associated with the electric aircraft; transmitting, by the computing device, the battery datum associated with the electric aircraft; and charging the electric aircraft using a charging station of a ground support, wherein the ground support is associated with the communication component.
 12. The method of claim 11, wherein the battery datum includes information on a state of charge associated with the electric aircraft.
 13. The method of claim 11, further comprising communicating, using the communication component, with the electric aircraft through a wired connection between the ground support and the electric aircraft.
 14. The method of claim 11, further comprising: identifying, using the computing device, a network node; and transmitting, using the computing device, the battery datum to the network node.
 15. The method of claim 13, further comprising: encrypting, using the computing device, the battery datum through an encryption process.
 16. The method of claim 11, wherein charging, using ground support equipment comprising the charging station, further comprises charging, using the ground support equipment, the electric aircraft with electrical energy.
 17. The method of claim 11, further comprising receiving, using the computing device, data associated with a health of a flight component on the electric aircraft.
 18. The method of claim 11, further comprising, receiving using the computing device, component state data of a component of the electric aircraft.
 19. The method of claim 18, wherein the component of the electric aircraft comprises a motor and the component state data comprises information on thresholds exceeded by the electric aircraft.
 20. The method of claim 15, further comprising providing, by the computing device, encrypted communication at least in part by employing digital signatures. 