Who should read this: Directors of maintenance, quality assurance managers, compliance
officers, and auditors who need to verify that maintenance records have not been tampered
with since creation.Required permission:
maintenance_ops — read to run verification checks.Regulatory basis: 14 CFR 43.9 defines the content and form of maintenance records.
14 CFR 91.417 requires maintenance records to be retained and available for inspection.
While the FAA does not currently mandate cryptographic record integrity, tamper-evident
records strengthen your compliance posture and provide verifiable evidence during audits
and legal proceedings.How Record Integrity Works
PlaneConnection protects maintenance records using a multi-layer integrity system. Every critical record — work orders, inspections, AD compliance actions, part installations, part removals, discrepancies, MEL deferrals, and technician attestations — is cryptographically fingerprinted when created and chained to previous records. If any record is modified after creation, the chain breaks and verification fails. Record hashes are periodically anchored to independent external authorities, providing cryptographic proof that records existed at a specific point in time — independent of PlaneConnection’s infrastructure. For the full architecture, see Record Integrity Architecture.Record integrity is gated behind the record integrity feature flag. Contact your administrator if
this feature is not visible in your workspace.
Record Types Covered
The integrity system covers all critical regulatory record types:| Category | Record Types |
|---|---|
| Maintenance | Work orders, inspections, AD compliance, SB compliance |
| Parts | Part installations, part removals |
| Safety (SMS) | Safety reports, investigations, corrective actions |
| Flight Ops | Flight logs, eAPIS filings, weight & balance, dispatch releases |
| Crew | Training records, currency checks |
| Discrepancies | Squawks, MEL deferrals, Form 337 records |
| SmartScore | Pilot, SMS, operator, and maintenance score snapshots |
Verify an Aircraft’s Record Chain
Go to Maintenance > Record Integrity. The page lists all aircraft in your workspace with
their chain status.
previousHash matches the prior record’s hashView Record Details
From the verification page, click any record in the chain to see:- Record Type — What kind of record (work order, part install, etc.)
- Record ID — Link to the source record
- Record Hash — The SHA-384 hash of this record
- Previous Hash — Hash of the preceding record in the chain
- Chain Sequence — Position in the aircraft’s chain
- Hash Algorithm — Algorithm used (SHA-384)
- Anchored — Whether this record has been included in an anchored Merkle tree
- Anchor Details — RFC 3161 TSA URL and timestamp, or OpenTimestamps proof
Anchoring Details
RFC 3161 Timestamps
For records anchored via RFC 3161:- TSA URL — The Time-Stamp Authority URL used
- Timestamp — The RFC 3161 timestamp token
- Token — The cryptographic token for independent verification
OpenTimestamps (Bitcoin)
For records anchored via OpenTimestamps:- OTS Proof — The OpenTimestamps proof file
- OTS Status — Pending (waiting for Bitcoin confirmation) or Confirmed
- Bitcoin Block — The Bitcoin block number containing the anchor
Export Verification Report
To generate a verification report for audit purposes:- Run verification on the target aircraft
- Click Export Report
- The system generates a PDF or JSON report containing the full chain verification results, anchor proofs, and a summary suitable for regulatory submissions
Part Passports
Part lifecycle events are individually hash-chained for traceability.
Technician Attestations
Attestation records are included in the integrity chain.
Manage Work Orders
Work order records are hashed at creation and at return-to-service.
Compliance Dashboard
Compliance documents are managed alongside integrity verification.