EP3788754A1 - Geschützte mehrfachoperatoren-nutzlastoperationen - Google Patents

Geschützte mehrfachoperatoren-nutzlastoperationen

Info

Publication number
EP3788754A1
EP3788754A1 EP18729003.6A EP18729003A EP3788754A1 EP 3788754 A1 EP3788754 A1 EP 3788754A1 EP 18729003 A EP18729003 A EP 18729003A EP 3788754 A1 EP3788754 A1 EP 3788754A1
Authority
EP
European Patent Office
Prior art keywords
host
encrypted
commands
hosted
telemetry
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP18729003.6A
Other languages
English (en)
French (fr)
Inventor
Yi-Feng James Chen
Haig F. Krikorian
Robert J. Winig
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Boeing Co
Original Assignee
Boeing Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Boeing Co filed Critical Boeing Co
Publication of EP3788754A1 publication Critical patent/EP3788754A1/de
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/18502Airborne stations
    • H04B7/18506Communications with or from aircraft, i.e. aeronautical mobile service
    • H04B7/18508Communications with or from aircraft, i.e. aeronautical mobile service with satellite system used as relay, i.e. aeronautical mobile satellite service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/18578Satellite systems for providing broadband data service to individual earth stations
    • H04B7/18593Arrangements for preventing unauthorised access or for providing user protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/204Multiple access
    • H04B7/2041Spot beam multiple access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/06Airborne or Satellite Networks

Definitions

  • the present disclosure relates to payload operations.
  • it relates to protected multi-operators payload operations.
  • transponders on a vehicle e.g., a satellite
  • vehicle e.g., a satellite
  • a single satellite controller with no resource allocation privacy.
  • the channel is then set up, used, and then disconnected.
  • a method for protected multi operators payload operations comprises transmitting, by a hosted payload (HoP) operation center (HOC), encrypted hosted commands to a host spacecraft operations center (SOC). Also, the method comprises transmitting, by the host SOC, encrypted host commands and the encrypted hosted commands to a vehicle.
  • the encrypted host commands are encrypted utilizing a first communication security (COMSEC) variety and the encrypted hosted commands are encrypted utilizing a second COMSEC variety.
  • the method comprises decrypting, by a first communication security module on the vehicle, the encrypted host commands utilizing the first COMSEC variety to generate unencrypted host commands. Additionally, decrypting, by a second communication security module on the vehicle, the encrypted hosted commands utilizing the second COMSEC variety to generate unencrypted hosted commands. Also, the method comprises reconfiguring a payload on the vehicle according to the unencrypted host commands and the unencrypted hosted commands. In addition, transmitting, by a payload antenna on the vehicle, payload data to a host receiving antenna and a hosted receiving antenna.
  • the method comprises transmitting, by a telemetry transmitter on the vehicle, the encrypted host telemetry and the encrypted hosted telemetry to the host SOC. Further, the method comprises transmitting, by the host SOC, the encrypted hosted telemetry to the HOC.
  • the reconfiguring of the payload according to the unencrypted host commands and the unencrypted hosted commands comprises adjusting transponder power, transponder spectrum monitoring, transponder connectivity, transponder gain settings, transponder limiter settings, transponder automatic level control settings, transponder phase settings, internal gain generation, bandwidth for at least one beam, at least one frequency band for at least one beam, transponder beamforming settings, effective isotropic radiation power (EIRP) for at least one beam, transponder channels, and/or beam steering.
  • EIRP effective isotropic radiation power
  • the reconfiguring of the payload according to the unencrypted host commands and the unencrypted hosted commands comprises reconfiguring at least one antenna, at least one analog-to-digital converter, at least one digital-to-analog converter, at least one beamformer, at least one digital channelizer, at least one demodulator, at least one modulator, at least one digital switch matrix, and/or at least one digital combiner.
  • the vehicle is an airborne vehicle.
  • the airborne vehicle is a satellite, aircraft, unmanned aerial vehicle (UAV), or space plane.
  • UAV unmanned aerial vehicle
  • the method further comprises encrypting, by the HOC, the unencrypted hosted commands by utilizing the second COMSEC variety to produce the encrypted hosted commands. Further, the method comprises encrypting, by the host SOC, the unencrypted host commands by utilizing the first COMSEC variety to produce the encrypted host commands.
  • the method further comprises receiving, by a host command receiver on the vehicle, the encrypted host commands. Also, the method comprises receiving, by a hosted command receiver on the vehicle, the encrypted hosted commands. In addition, the method comprises transmitting, by the host command receiver, the encrypted host commands to the first communication security module. Further, the method comprises transmitting, by the hosted command receiver, the encrypted hosted commands to the second communication security module.
  • the method further comprises transmitting, by the first communication security module, the unencrypted host commands to the payload. Also, the method comprises transmitting, by the second communication security module, the unencrypted hosted commands to the payload.
  • the method further comprises transmitting, by the payload, to the first communication security module the unencrypted host telemetry and the unencrypted hosted telemetry. [0012] In one or more embodiments, the method further comprises transmitting, by the first communication security module, the encrypted host telemetry and the encrypted hosted telemetry to the telemetry transmitter.
  • the method further comprises decrypting, by the host SOC, the encrypted host telemetry utilizing the first COMSEC variety and utilizing a database without hosted decommutated information to generate the unencrypted host telemetry. Also, the method comprises decrypting, by the HOC, the encrypted hosted telemetry utilizing the first COMSEC variety and utilizing a database without host decommutated information to generate the unencrypted hosted telemetry.
  • a method for protected multi-operators payload operations comprises transmitting, by the HOC, the encrypted hosted commands to a host spacecraft operations center (SOC). The method further comprises transmitting, by the host SOC, the encrypted host commands and the encrypted hosted commands to a vehicle. Also, the method comprises decrypting, by the first communication security module, the encrypted host commands utilizing the first COMSEC variety to generate the unencrypted host commands. In addition, the method comprises decrypting, by the second communication security module, the encrypted hosted commands utilizing the second COMSEC variety to generate the unencrypted hosted commands. Additionally, the method comprises reconfiguring the payload according to the unencrypted host commands and the unencrypted hosted commands.
  • the method comprises transmitting, by a payload antenna on the vehicle, payload data to a host receiving antenna and a hosted receiving antenna.
  • the method comprises encrypting, by the first communication security module, the unencrypted host telemetry utilizing the first COMSEC variety to generate encrypted host telemetry.
  • the method comprises transmitting, by the host telemetry transmitter, the encrypted host telemetry to the host SOC.
  • the method comprises encrypting, by the second communication security module, the unencrypted hosted telemetry utilizing the second COMSEC variety to generate encrypted hosted telemetry.
  • the method comprises transmitting, by the hosted telemetry transmitter, the encrypted hosted telemetry to the host SOC.
  • the method comprises transmitting, by the host SOC, the encrypted hosted telemetry to the HOC.
  • a method for protected multi-operators payload operations comprises transmitting, by a hosted payload (HoP) operation center (HOC), encrypted hosted commands to a vehicle.
  • the method further comprises transmitting, by the host SOC, encrypted host commands to the vehicle.
  • the method comprises decrypting, by a first communication security module on the vehicle, the encrypted host commands utilizing a first COMSEC variety to generate unencrypted host commands.
  • the method comprises decrypting, by a second communication security module on the vehicle, the encrypted hosted commands utilizing a second COMSEC variety to generate unencrypted hosted commands.
  • the method comprises reconfiguring the payload according to the unencrypted host commands and the unencrypted hosted commands.
  • the method comprises transmitting, by a payload antenna on the vehicle, payload data to a host receiving antenna and a hosted receiving antenna.
  • the method comprises encrypting, by the first communication security module, unencrypted host telemetry utilizing the first COMSEC variety to generate encrypted host telemetry.
  • the method comprises transmitting, by a host telemetry transmitter on the vehicle, the encrypted host telemetry to the host SOC.
  • the method comprises encrypting, by the second communication security module, unencrypted hosted telemetry utilizing the second COMSEC variety to generate encrypted hosted telemetry.
  • the method comprises transmitting, by the hosted telemetry transmitter, the encrypted hosted telemetry to the HOC.
  • a system for protected multi -operators payload operations comprises a hosted payload (HoP) operation center (HOC) to transmit encrypted hosted commands to a host spacecraft operations center (SOC).
  • the system further comprises the host SOC to transmit encrypted host commands and the encrypted hosted commands to a vehicle.
  • the encrypted host commands are encrypted utilizing a first communication security (COMSEC) variety and the encrypted hosted commands are encrypted utilizing a second COMSEC variety.
  • the system comprises a first communication security module on the vehicle to decrypt the encrypted host commands utilizing the first COMSEC variety to generate unencrypted host commands.
  • HoP hosted payload
  • HOC host spacecraft operations center
  • the system further comprises the host SOC to transmit encrypted host commands and the encrypted hosted commands to a vehicle.
  • the encrypted host commands are encrypted utilizing a first communication security (COMSEC) variety and the encrypted hosted commands are encrypted utilizing a second COMSEC variety.
  • the system comprises a first communication security module on the vehicle to decrypt the encrypted host commands utilizing the
  • the system comprises a second communication security module on the vehicle to decrypt the encrypted hosted commands utilizing the second COMSEC variety to generate unencrypted hosted commands.
  • the system comprises a payload on the vehicle reconfigured according to the unencrypted host commands and the unencrypted hosted commands.
  • the system comprises a payload antenna on the vehicle to transmit payload data to a host receiving antenna and a hosted receiving antenna.
  • the system comprises the first communication security module to encrypt unencrypted host telemetry and unencrypted hosted telemetry from the payload by utilizing the first COMSEC variety to generate encrypted host telemetry and encrypted hosted telemetry.
  • the system comprises a telemetry transmitter on the vehicle to transmit the encrypted host telemetry and the encrypted hosted telemetry to the host SOC. Further, the system comprises the host SOC to transmit the encrypted hosted telemetry to the HOC.
  • a system for protected multi-operators payload operations comprises a hosted payload (HoP) operation center (HOC) to transmit encrypted hosted commands to a host spacecraft operations center (SOC).
  • the system further comprises the host SOC to transmit encrypted host commands and the encrypted hosted commands to a vehicle.
  • the encrypted host commands are encrypted utilizing a first COMSEC variety and the encrypted hosted commands are encrypted utilizing a second COMSEC variety.
  • the system comprises a first communication security module to decrypt the encrypted host commands utilizing the first COMSEC variety to generate unencrypted host commands.
  • the system comprises a second communication security module to decrypt the encrypted hosted commands utilizing the second COMSEC variety to generate the unencrypted hosted commands.
  • the system comprises a payload reconfigured according to the unencrypted host commands and the unencrypted hosted commands.
  • the system comprises a payload antenna on the vehicle to transmit payload data to a host receiving antenna and a hosted receiving antenna.
  • the system comprises the first communication security module to encrypt unencrypted host telemetry utilizing the first COMSEC variety to generate encrypted host telemetry.
  • the system comprises a host telemetry transmitter to transmit the encrypted host telemetry to the host SOC.
  • system comprises the second communication security module to encrypt unencrypted hosted telemetry utilizing the second COMSEC variety to generate encrypted hosted telemetry.
  • system comprises a hosted telemetry transmitter to transmit the encrypted hosted telemetry to the host SOC.
  • the system comprises the host SOC to transmit the encrypted hosted telemetry to the HOC.
  • a system for protected multi -operators payload operations comprises a hosted payload (HoP) operation center (HOC) to transmit encrypted hosted commands to a vehicle.
  • the system further comprises a host spacecraft operations center (SOC) to transmit encrypted host commands to the vehicle.
  • the encrypted host commands are encrypted utilizing a first communication security (COMSEC) variety and the encrypted hosted commands are encrypted utilizing a second COMSEC variety.
  • the system comprises a first communication security module on the vehicle to decrypt the encrypted host commands utilizing the first COMSEC variety to generate unencrypted host commands.
  • the system comprises a second communication security module on the vehicle to decrypt the encrypted hosted commands utilizing the second COMSEC variety to generate unencrypted hosted commands.
  • the system comprises a payload reconfigured according to the unencrypted host commands and the unencrypted hosted commands.
  • the system comprises a payload antenna on the vehicle to transmit payload data to a host receiving antenna and a hosted receiving antenna.
  • the system comprises the first communication security module to encrypt unencrypted host telemetry utilizing the first COMSEC variety to generate encrypted host telemetry.
  • the system comprises a host telemetry transmitter on the vehicle to transmit the encrypted host telemetry to the host SOC.
  • system comprises the second communication security module to encrypt unencrypted hosted telemetry utilizing the second COMSEC variety to generate encrypted hosted telemetry. Further, the system comprises a hosted telemetry transmitter to transmit the encrypted hosted telemetry to the HOC.
  • FIG. 1 is a diagram showing simplified architecture for the disclosed system for protected multi-operators payload operations, in accordance with at least one embodiment of the present disclosure.
  • FIG. 2 is a diagram showing the disclosed system for protected multi-operators payload operations where the host user transmits encrypted host commands (encrypted utilizing a first COMSEC variety) and encrypted hosted commands (encrypted utilizing the second COMSEC variety) to a vehicle, and where the host telemetry and the hosted telemetry are both encrypted using the first COMSEC variety, in accordance with at least one embodiment of the present disclosure.
  • FIGS. 3 A, 3B, and 3C together show a flow chart for the disclosed method for protected multi-operators payload operations where the host user transmits encrypted host commands (encrypted utilizing a first COMSEC variety) and encrypted hosted commands (encrypted utilizing the second COMSEC variety) to a vehicle, and where the host telemetry and the hosted telemetry are both encrypted using the first COMSEC variety, in accordance with at least one embodiment of the present disclosure.
  • FIG. 4 is a diagram showing the disclosed system for protected multi-operators payload operations where the host user transmits encrypted host commands (encrypted utilizing a first COMSEC variety) and encrypted hosted commands (encrypted utilizing a second COMSEC variety) to a vehicle, and where the host telemetry is encrypted using the first COMSEC variety and the hosted telemetry is encrypted using the second COMSEC variety, in accordance with at least one embodiment of the present disclosure.
  • FIGS. 5A, 5B, 5C, and 5D together show a flow chart for the disclosed method for protected multi-operators payload operations where the host user transmits encrypted host commands (encrypted utilizing a first COMSEC variety) and encrypted hosted commands (encrypted utilizing a second COMSEC variety) to a vehicle, and where the host telemetry is encrypted using the first COMSEC variety and the hosted telemetry is encrypted using the second COMSEC variety, in accordance with at least one embodiment of the present disclosure.
  • FIG. 6 is a diagram showing the disclosed system for protected multi-operators payload operations where the host user transmits encrypted host commands (encrypted utilizing a first COMSEC variety) to a vehicle and the hosted user transmits encrypted hosted commands (encrypted utilizing a second COMSEC variety) to the vehicle, and where the host telemetry is encrypted using the first COMSEC variety and the hosted telemetry is encrypted using the second COMSEC variety, in accordance with at least one embodiment of the present disclosure.
  • FIGS. 7A, 7B, and 7C together show a flow chart for the disclosed method for protected multi-operators payload operations where the host user transmits encrypted host commands (encrypted utilizing a first COMSEC variety) to a vehicle and the hosted user transmits encrypted hosted commands (encrypted utilizing a second COMSEC variety) to the vehicle, and where the host telemetry is encrypted using the first COMSEC variety and the hosted telemetry is encrypted using the second COMSEC variety, in accordance with at least one embodiment of the present disclosure.
  • FIG. 8 is a diagram showing components of an exemplary virtual transponder that may be employed by the disclosed system for protected multi-operators payload operations, in accordance with at least one embodiment of the present disclosure.
  • the methods and apparatus disclosed herein provide an operative system for protected multi-operators payload operations.
  • the system of the present disclosure allows for vehicle operators to privately share vehicle resources.
  • typical transponders on a vehicle e.g., a satellite
  • vehicle e.g., a satellite
  • all of this switching on the payload is commanded and controlled by a single satellite controller with no resource allocation privacy.
  • a single satellite controller with no resource allocation privacy. For example, in a digital transponder, when a user request for a channel with specific bandwidth and antenna characteristics is made, the channel is then set up, used, and then disconnected.
  • the disclosed system allows for private vehicle resource allocation and control that provides vehicle users the ability to privately, dynamically, allocate resources on demand.
  • the disclosed system employs a virtual transponder, which is a transponder partitioned into multiple transponders with independent command and control.
  • an exemplary virtual transponder includes a digital transponder with a digital channelizer, a digital switch matrix, and a digital combiner that is configured to partition a digital transponder into multiple transponders with independent command and control. Command and control of the virtual transponder is achieved via ground software that provides dynamic allocation and privatization of the digital switch matrix for bandwidth on demand.
  • the disclosed system for private vehicle resource allocation and control may employ various different types of transponders for the virtual transponder other than the specific disclosed embodiments (e.g., depicted FIG. 8) for the virtual transponder.
  • various different types of transponders may be employed for the virtual transponder including, but not limited to, various different types of digital transponders, various different types of analog transponders (e.g., conventional repeater-type transponders), and various different types of combination analog/digital transponders.
  • Embodiments of the present disclosure may be described herein in terms of functional and/or logical components and various processing steps. It should be appreciated that such components may be realized by any number of hardware, software, and/or firmware components configured to perform the specified functions. For example, an embodiment of the present disclosure may employ various integrated circuit components (e.g., memory elements, digital signal processing elements, logic elements, look-up tables, or the like), which may carry out a variety of functions under the control of one or more processors, microprocessors, or other control devices. In addition, those skilled in the art will appreciate that embodiments of the present disclosure may be practiced in conjunction with other components, and that the system described herein is merely one example embodiment of the present disclosure.
  • integrated circuit components e.g., memory elements, digital signal processing elements, logic elements, look-up tables, or the like
  • FIG. 1 is a diagram 100 showing simplified architecture for the disclosed system for protected multi-operators payload operations, in accordance with at least one embodiment of the present disclosure.
  • a simplified view of multiple possible hosted payload configurations is illustrated.
  • this figure shows a space segment 110 and a ground segment 120.
  • the space segment 110 represents a vehicle.
  • Various different types of vehicles may be employed for the vehicle including, but not limited to, an airborne vehicle.
  • various different types of airborne vehicles may be employed for the vehicle including, but not limited to, a satellite, an aircraft, an unmanned aerial vehicle (UAV), and a space plane.
  • UAV unmanned aerial vehicle
  • a satellite typically includes computer-controlled systems.
  • a satellite generally includes a bus 130 and a payload 140.
  • the bus 130 may include systems (which include components) that control the satellite. These systems perform tasks, such as power generation and control, thermal control, telemetry, attitude control, orbit control, and other suitable operations.
  • the payload 140 of the satellite provides functions to users of the satellite.
  • the payload 140 may include antennas, transponders, and other suitable devices.
  • the payload 140 in a satellite may be used to provide Internet access, telephone communications, radio, television, and other types of communications.
  • the payload 140 of the satellite may be used by different entities.
  • the payload 140 may be used by the owner of the satellite (i.e. the host user), one or more customers (i.e. the hosted user(s)), or some combination thereof.
  • the owner of a satellite may lease different portions of the payload 140 to different customers.
  • one group of antenna beams generated by the payload 140 of the satellite may be leased to one customer, while a second group of antenna beams may be leased to a second customer.
  • one group of antenna beams generated by the payload 140 of the satellite may be utilized by the owner of the satellite, while a second group of antenna beams may be leased to a customer.
  • some or all of the antenna beams generated by the payload 140 of the satellite may be shared by one customer and a second customer.
  • some or all of the antenna beams generated by the payload 140 of the satellite may be shared by the owner of the satellite and a customer.
  • users may have a shared communications link (e.g., Interface A) to the satellite, or each user may have a separate communications link (e.g., Interfaces A and D) to the satellite.
  • Leasing a satellite to multiple customers may increase the revenues that an owner of a satellite can obtain. Further, a customer may use a subset of the total resources in a satellite for a cost that is less than the cost for the customer to purchase and operate a satellite, to build and operate a satellite, or to lease an entire satellite.
  • the ground segment 120 comprises a host spacecraft operations center (SOC) (e.g., a ground station associated with the owner of the satellite) 150, and a hosted payload (HoP) operation center(s) (HOC(s)) (e.g., a ground station(s) associated with a customer(s) that is leasing at least a portion of the payload of the satellite from the owner) 160.
  • SOC spacecraft operations center
  • HOC hosted payload
  • HEC hosted payload
  • FIG. 1 shows a number of different possible communication links (i.e. Interfaces A - E). It should be noted that the disclosed system may employ some or all of these illustrated communication links.
  • Interface A which may comprise multiple links, is an out-of-band command and telemetry link from the host SOC 150 to command the satellite.
  • Interface B which may comprise multiple links, is a communication link, between the bus 130 and the payload 140. Interface B may be used to control essential items, such as power.
  • Information that may be communicated from the bus 130 to the payload 140 via Interface B may include, but is not limited to, time, ephemeris, and payload commands.
  • Information that may be communicated from the payload 140 to the bus 130 via Interface B may include, but is not limited to, payload telemetry.
  • Interface C which may comprise multiple links, is an inband command and telemetry link for bus and/or payload.
  • Interface D which may comprise multiple links, is a command and telemetry link from the HOC(s) 160 to command the satellite.
  • Interface E which may comprise multiple links, between the host SOC 150 and the HOCs 160 allows for requests from the HOCs for resource sharing of the payload 140.
  • FIGS. 2 - 7C show exemplary systems and methods for protected multi-operators payload operations, in accordance with at least one embodiment of the present disclosure.
  • FIG. 2 is a diagram 200 showing the disclosed system for protected multi-operators payload operations where the host user (i.e. the host SOC) 250 transmits encrypted host commands (encrypted utilizing a first COMSEC variety) and encrypted hosted commands (encrypted utilizing the second COMSEC variety) to a vehicle, and where the host telemetry and the hosted telemetry are both encrypted using the first COMSEC variety, in accordance with at least one embodiment of the present disclosure.
  • a vehicle 210, a host SOC 250, and a HOC 260 are shown.
  • the HOC 260 has leased at least a portion (e.g., a virtual transponder(s)) of the payload 205 of the vehicle 210 from the owner of a satellite (i.e. the host SOC) 250. It should be noted that in some embodiments, the HOC 260 may lease all of the payload 205 of the vehicle 210 from the owner of a satellite (i.e. the host SOC) 250. Also, it should be noted that is some embodiments, the HOC 260 may own the payload 205 (e.g., a steerable antenna) of the vehicle 210, and contract the host SOC 250 to transmit encrypted hosted commands to the vehicle 210.
  • a portion e.g., a virtual transponder(s) of the payload 205 of the vehicle 210 from the owner of a satellite (i.e. the host SOC) 250.
  • the HOC 260 may own the payload 205 (e.g., a steerable antenna) of the vehicle 210, and contract the host S
  • the HOC 260 encrypts unencrypted hosted commands (i.e. unencrypted HoP CMD), by utilizing a second COMSEC variety, to produce encrypted hosted commands (i.e. encrypted HoP CMD).
  • the hosted commands are commands that are used to configure the portion (e.g., a virtual transponder(s)) of the payload 205 that the HOC 260 is leasing from the host SOC 250.
  • the host SOC 250 encrypts unencrypted host commands (i.e. unencrypted host CMD), by utilizing a first COMSEC variety, to produce encrypted host commands (i.e. encrypted host CMD).
  • the host commands are commands that are used to configure the portion (e.g., a transponder(s)) of the payload 205 that host SOC 250 is utilizing for itself.
  • the host SOC 250 is depicted to have its ground antenna located right next to its operations building; in other embodiments, the host SOC 250 may have its ground antenna located very far away from the its operations building (e.g., the ground antenna may be located in another country than the operations building).
  • the first COMSEC variety may include at least one encryption key and/or at least one algorithm (e.g., a Type 1 encryption algorithm or a Type 2 encryption algorithm).
  • the second COMSEC variety may include at least one encryption key and/or at least one encryption algorithm (e.g., a Type 1 encryption algorithm or a Type 2 encryption algorithm).
  • the HOC 260 then transmits 215 the encrypted hosted commands to the host SOC 250.
  • the host SOC 250 transmits 220 the encrypted host commands and transmits 225 the encrypted hosted commands to the vehicle 210.
  • the host SOC 250 transmits 220, 225 the encrypted host commands and the encrypted hosted commands utilizing an out-of-band frequency band(s) (i.e. a frequency band(s) that is not the same frequency band(s) utilized to transmit payload data).
  • the host command receiver 235 on the vehicle 210 receives the encrypted host commands.
  • the hosted command receiver 245 on the vehicle 210 receives the encrypted hosted commands.
  • the host command receiver 235 then transmits 252 the encrypted host commands to a first communication security module 262.
  • the first communication security module 262 decrypts the encrypted host commands utilizing the first COMSEC variety (i.e. COMSEC Variety 1) to generate unencrypted host commands.
  • first communication security module 262 may comprise one or more modules.
  • first communication security module 262 may comprise one or more processors.
  • the hosted command receiver 245 then transmits 255 the encrypted hosted commands to a second communication security module 265.
  • the second communication security module 265 decrypts the encrypted hosted commands utilizing the second COMSEC variety (i.e. COMSEC Variety 2) to generate unencrypted hosted commands.
  • the second communication security module 265 may comprise one or more modules.
  • the second communication security module 265 may comprise one or more processors.
  • the first communication security module 262 then transmits 270 the unencrypted host commands to the payload (i.e. the shared host/hosted payload) 205.
  • the second communication security module 265 transmits 275 the unencrypted hosted commands to the payload (i.e. the shared host/hosted payload) 205.
  • the payload 205 is reconfigured according to the unencrypted host commands and the unencrypted hosted commands.
  • a payload antenna 280 then transmits (e.g., in one or more antenna beams 281) payload data to a host receiving antenna 285 and a hosted receiving antenna 290 on the ground.
  • antenna beams 281 is shown to include a plurality of circular spot beams; in other embodiments, antenna beams 281 may include more or less number of beams than is shown in FIG. 2 (e.g., antenna beams 281 may only include a single beam), and antenna beams 281 may include beams of different shapes than circular spot beams as is shown in FIG. 2 (e.g., antenna beams 281 may include elliptical beams and/or shaped beams of various different shapes).
  • the payload antenna 280 may comprise one or more reflector dishes including, but not limited to, parabolic reflectors and/or shaped reflectors. In some embodiments, the payload antenna 280 may comprise one or more multifeed antenna arrays.
  • the payload 205 transmits 291 unencrypted host telemetry (i.e. unencrypted host TLM, which is telemetry data related to the portion of the payload 205 that is utilized by the host SOC 250) and unencrypted hosted telemetry (i.e. unencrypted HoP TLM, which is telemetry data related to the portion of the payload 205 that is leased by the HOC 260) to the first communication security module 262.
  • the first communication security module 262 then encrypts the unencrypted host telemetry and unencrypted hosted telemetry utilizing the first COMSEC variety to generate encrypted telemetry (i.e. encrypted TLM) (i.e. encrypted host telemetry and encrypted hosted telemetry).
  • the first communication security module 262 then transmits 293 the encrypted telemetry to a telemetry transmitter 294.
  • the telemetry transmitter 294 then transmits 295 the encrypted telemetry to the host SOC 250.
  • the telemetry transmitter 294 transmits 295 the encrypted telemetry utilizing an out-of-band frequency band(s).
  • the host SOC 250 then decrypts the encrypted telemetry utilizing the first COMSEC variety to generate the unencrypted telemetry.
  • the host SOC 250 then utilizes a database that comprises host payload decommutated information and does not comprise hosted payload decommutated information (i.e. a database without hosted payload decommutated information) to read to unencrypted telemetry to determine the telemetry data related to the portion of the payload 205 that is utilized by the host SOC 250.
  • the host SOC 250 then transmits 299 the encrypted telemetry to the HOC 260.
  • the HOC 260 then decrypts the encrypted telemetry utilizing the first COMSEC variety to generate the unencrypted telemetry.
  • the HOC 260 then utilizes a database that comprises hosted payload decommutated information and does not comprise host payload decommutated information (i.e. a database without host payload decommutated information) to read to unencrypted telemetry to determine the telemetry data related to the portion of the payload 205 that is utilized by the HOC 260.
  • FIGS. 3 A, 3B, and 3C together show a flow chart for the disclosed method for protected multi-operators payload operations where the host user transmits encrypted host commands (encrypted utilizing a first COMSEC variety) and encrypted hosted commands (encrypted utilizing the second COMSEC variety) to a vehicle, and where the host telemetry and the hosted telemetry are both encrypted using the first COMSEC variety, in accordance with at least one embodiment of the present disclosure.
  • a hosted payload (HoP) operation center (HOC) encrypts unencrypted hosted commands by utilizing a second COMSEC variety to produce encrypted hosted commands 305.
  • HoP hosted payload
  • HOC operation center
  • the HOC transmits the encrypted hosted commands to a host spacecraft operations center (SOC) 310.
  • the host SOC encrypts unencrypted host commands by utilizing a first COMSEC variety to produce encrypted host commands 315.
  • the host SOC transmits (out-of-band) the encrypted host commands and the encrypted hosted commands to a vehicle 320.
  • a host command receiver on the vehicle receives the encrypted host commands 325.
  • a hosted command receiver on the vehicle receives the encrypted hosted commands 330.
  • the host command receiver transmits the encrypted host commands to a first communication security module 335.
  • the hosted command receiver transmits the encrypted hosted commands to a second communication security module 340.
  • the first communication security module then decrypts the encrypted host commands utilizing the first COMSEC variety to generate the unencrypted host commands 345.
  • the second communication security module then decrypts the encrypted hosted commands utilizing the second COMSEC variety to generate the unencrypted hosted commands 350.
  • the first communication security module then transmits the unencrypted host commands to the payload 355.
  • the second communication security module then transmits the unencrypted hosted commands to the payload 360.
  • the payload is reconfigured according to the unencrypted host commands and the unencrypted hosted commands 365.
  • a payload antenna on the vehicle then transmits payload data to a host receiving antenna and a hosted receiving antenna 370.
  • the payload transmits to the first communication security module unencrypted host telemetry and unencrypted hosted telemetry 375.
  • the first communication security module encrypts the unencrypted host telemetry and the unencrypted hosted telemetry utilizing the first COMSEC variety to generate encrypted host telemetry and encrypted hosted telemetry 380.
  • the first communication security module then transmits the encrypted host telemetry and the encrypted hosted telemetry to a telemetry transmitter 385.
  • the telemetry transmitter transmits the encrypted host telemetry and the encrypted hosted telemetry to the host SOC 390.
  • the host SOC then decrypts the encrypted host telemetry utilizing the first COMSEC variety to generate the unencrypted host telemetry 395.
  • the host SOC transmits the encrypted hosted telemetry to the HOC 396. Then, the HOC decrypts the encrypted hosted telemetry utilizing the first COMSEC variety to generate the unencrypted hosted telemetry 397. Then, the method ends 398.
  • FIG. 4 is a diagram 400 showing the disclosed system for protected multi-operators payload operations where the host user (i.e. the host SOC) 450 transmits encrypted host commands (encrypted utilizing a first COMSEC variety) and encrypted hosted commands (encrypted utilizing a second COMSEC variety) to a vehicle, and where the host telemetry is encrypted using the first COMSEC variety and the hosted telemetry is encrypted using the second COMSEC variety, in accordance with at least one embodiment of the present disclosure.
  • a vehicle 410, a host SOC 450, and a HOC 460 are shown.
  • the HOC 460 has leased at least a portion (e.g., a virtual transponders )) of the payload 405 of the vehicle 410 from the owner of a satellite (i.e. the host SOC) 450. It should be noted that in some embodiments, the HOC 460 may lease all of the payload 405 of the vehicle 410 from the owner of a satellite (i.e. the host SOC) 450. Also, it should be noted that is some embodiments, the HOC 460 may own the payload 405 (e.g., a steerable antenna) of the vehicle 410, and contract the host SOC 450 to transmit encrypted hosted commands to the vehicle 410.
  • the payload 405 e.g., a steerable antenna
  • the HOC 460 encrypts unencrypted hosted commands (i.e. unencrypted HoP CMD), by utilizing a second COMSEC variety, to produce encrypted hosted commands (i.e. encrypted HoP CMD).
  • the hosted commands are commands that are used to configure the portion (e.g., a virtual transponder(s)) of the payload 405 that the HOC 460 is leasing from the host SOC 450.
  • the host SOC 450 encrypts unencrypted host commands (i.e. unencrypted host CMD), by utilizing a first COMSEC variety, to produce encrypted host commands (i.e. encrypted host CMD).
  • the host commands are commands that are used to configure the portion (e.g., a transponder(s)) of the payload 405 that host SOC 450 is utilizing for itself.
  • the host SOC 450 is depicted to have its ground antenna located right next to its operations building; in other embodiments, the host SOC 450 may have its ground antenna located very far away from the its operations building (e.g., the ground antenna may be located in another country than the operations building).
  • the first COMSEC variety may include at least one encryption key and/or at least one algorithm (e.g., a Type 1 encryption algorithm or a Type 2 encryption algorithm).
  • the second COMSEC variety may include at least one encryption key and/or at least one encryption algorithm (e.g., a Type 1 encryption algorithm or a Type 2 encryption algorithm).
  • the HOC 460 then transmits 415 the encrypted hosted commands to the host SOC 450.
  • the host SOC 450 transmits 420 the encrypted host commands and transmits 425 the encrypted hosted commands to the vehicle 410.
  • the host SOC 450 transmits 420, 425 the encrypted host commands and the encrypted hosted commands utilizing an out-of-band frequency band(s) (i.e. a frequency band(s) that is not the same frequency band(s) utilized to transmit payload data).
  • the host command receiver 435 on the vehicle 410 receives the encrypted host commands.
  • the hosted command receiver 445 on the vehicle 410 receives the encrypted hosted commands.
  • the host command receiver 435 then transmits 452 the encrypted host commands to a first communication security module 462.
  • the first communication security module 462 decrypts the encrypted host commands utilizing the first COMSEC variety (i.e. COMSEC Variety 1) to generate unencrypted host commands.
  • the first communication security module 462 may comprise one or more modules.
  • the first communication security module 462 may comprise one or more processors.
  • the hosted command receiver 445 then transmits 455 the encrypted hosted commands to a second communication security module 465.
  • the second communication security module 465 decrypts the encrypted hosted commands utilizing the second COMSEC variety (i.e. COMSEC Variety 2) to generate unencrypted hosted commands.
  • the second communication security module 465 may comprise one or more modules.
  • the second communication security module 465 may comprise one or more processors.
  • the first communication security module 462 then transmits 470 the unencrypted host commands to the payload (i.e. the shared host/hosted payload) 405.
  • the second communication security module 465 transmits 475 the unencrypted hosted commands to the payload (i.e. the shared host/hosted payload) 405.
  • the payload 405 is reconfigured according to the unencrypted host commands and the unencrypted hosted commands.
  • a payload antenna 480 then transmits (e.g., in one or more antenna beams 481) payload data to a host receiving antenna 485 and a hosted receiving antenna 490 on the ground.
  • antenna beams 481 is shown to include a plurality of circular spot beams; in other embodiments, antenna beams 481 may include more or less number of beams than is shown in FIG. 4 (e.g., antenna beams 481 may only include a single beam), and antenna beams 481 may include beams of different shapes than circular spot beams as is shown in FIG. 4 (e.g., antenna beams 481 may include elliptical beams and/or shaped beams of various different shapes).
  • the payload antenna 480 may comprise one or more reflector dishes including, but not limited to, parabolic reflectors and/or shaped reflectors. In some embodiments, the payload antenna 480 may comprise one or more multifeed antenna arrays.
  • the payload 405 transmits 491 unencrypted host telemetry (i.e. unencrypted host TLM, which is telemetry data related to the portion of the payload 405 that is utilized by the host SOC 450) to the first communication security module 462.
  • the first communication security module 462 then encrypts the unencrypted host telemetry utilizing the first COMSEC variety to generate encrypted host telemetry (i.e. encrypted host TLM).
  • the payload 405 transmits 492 unencrypted hosted telemetry (i.e. unencrypted HoP TLM, which is telemetry data related to the portion of the payload 405 that is leased by the HOC 460) to the second communication security module 465.
  • the second communication security module 465 then encrypts the unencrypted hosted telemetry utilizing the second COMSEC variety to generate encrypted hosted telemetry (i.e. encrypted HoP TLM).
  • the first communication security module 462 then transmits 493 the encrypted host telemetry to a host telemetry transmitter 494.
  • the host telemetry transmitter 494 then transmits 495 the encrypted host telemetry to the host SOC 450.
  • the telemetry transmitter 494 transmits 495 the encrypted host telemetry utilizing an out-of-band frequency band(s).
  • the host SOC 450 then decrypts the encrypted host telemetry utilizing the first COMSEC variety to generate the unencrypted host telemetry.
  • the second communication security module 465 then transmits 496 the encrypted hosted telemetry to a hosted telemetry transmitter 498.
  • the hosted telemetry transmitter 498 then transmits 497 the encrypted hosted telemetry to the host SOC 450.
  • the telemetry transmitter 498 transmits 497 the encrypted hosted telemetry utilizing an out-of-band frequency band(s).
  • the host SOC 450 then transmits 499 the encrypted hosted telemetry to the HOC 460.
  • the HOC 460 then decrypts the encrypted hosted telemetry utilizing the second COMSEC variety to generate the unencrypted hosted telemetry.
  • FIGS. 5A, 5B, 5C, and 5D together show a flow chart for the disclosed method for protected multi-operators payload operations where the host user transmits encrypted host commands (encrypted utilizing a first COMSEC variety) and encrypted hosted commands (encrypted utilizing a second COMSEC variety) to a vehicle, and where the host telemetry is encrypted using the first COMSEC variety and the hosted telemetry is encrypted using the second COMSEC variety, in accordance with at least one embodiment of the present disclosure.
  • a hosted payload (HoP) operation center (HOC) encrypts unencrypted hosted commands by utilizing a second COMSEC variety to produce encrypted hosted commands 505.
  • HoP hosted payload
  • HOC operation center
  • the HOC transmits the encrypted hosted commands to a host spacecraft operations center (SOC) 510.
  • the host SOC encrypts unencrypted host commands by utilizing a first COMSEC variety to produce encrypted host commands 515. Then, the host SOC transmits (out-of-band) the encrypted host commands and the encrypted hosted commands to a vehicle 520.
  • a host command receiver on the vehicle receives the encrypted host commands 525.
  • a hosted command receiver on the vehicle receives the encrypted hosted commands 530.
  • the host command receiver transmits the encrypted host commands to a first communication security module 535.
  • the hosted command receiver transmits the encrypted hosted commands to a second communication security module 540.
  • the first communication security module then decrypts the encrypted host commands utilizing the first COMSEC variety to generate the unencrypted host commands 545.
  • the second communication security module then decrypts the encrypted hosted commands utilizing the second COMSEC variety to generate the unencrypted hosted commands 550.
  • the first communication security module then transmits the unencrypted host commands to the payload 555.
  • the second communication security module then transmits the unencrypted hosted commands to the payload 560.
  • the payload is reconfigured according to the unencrypted host commands and the unencrypted hosted commands 565.
  • a payload antenna on the vehicle then transmits payload data to a host receiving antenna and a hosted receiving antenna 570.
  • the payload transmits to the first communication security module unencrypted host telemetry 575.
  • the first communication security module then encrypts the unencrypted host telemetry utilizing the first COMSEC variety to generate encrypted host telemetry 580.
  • the first communication security module transmits the encrypted host telemetry to a host telemetry transmitter 585.
  • the host telemetry transmitter then transmits the encrypted host telemetry to the host SOC 590.
  • the host SOC decrypts the encrypted host telemetry utilizing the first COMSEC variety to generate the unencrypted host telemetry 591.
  • the payload transmits to the second communication security module unencrypted hosted telemetry 592. Then, the second communication security module encrypts the unencrypted hosted telemetry utilizing the second COMSEC variety to generate encrypted hosted telemetry 593. The second communication security module then transmits the encrypted hosted telemetry to a hosted telemetry transmitter 594. Then, the hosted telemetry transmitter transmits the encrypted hosted telemetry to the host SOC 595. The host SOC then transmits the encrypted hosted telemetry to the HOC 596. Then the HOC decrypts the encrypted hosted telemetry utilizing the second COMSEC variety to generate the unencrypted hosted telemetry 597. Then, the method ends 598.
  • FIG. 6 is a diagram 600 showing the disclosed system for protected multi-operators payload operations where the host user (i.e. the host SOC) 650 transmits encrypted host commands (encrypted utilizing a first COMSEC variety) to a vehicle and the hosted user (i.e. the HOC) 660 transmits encrypted hosted commands (encrypted utilizing a second COMSEC variety) to the vehicle, and where the host telemetry is encrypted using the first COMSEC variety and the hosted telemetry is encrypted using the second COMSEC variety, in accordance with at least one embodiment of the present disclosure.
  • a vehicle 610, a host SOC 650, and a HOC 660 are shown.
  • the HOC 660 has leased at least a portion (e.g., a virtual transponder(s)) of the payload 605 of the vehicle 610 from the owner of a satellite (i.e. the host SOC) 650. It should be noted that in some embodiments, the HOC 660 may lease all of the payload 605 of the vehicle 610 from the owner of a satellite (i.e. the host SOC) 650. Also, it should be noted that is some embodiments, the HOC 660 may own the payload 605 (e.g., a steerable antenna) of the vehicle 610.
  • a portion e.g., a virtual transponder(s) of the payload 605 of the vehicle 610 from the owner of a satellite (i.e. the host SOC) 650.
  • the HOC 660 may own the payload 605 (e.g., a steerable antenna) of the vehicle 610.
  • the HOC 660 encrypts unencrypted hosted commands (i.e. unencrypted HoP CMD), by utilizing a second COMSEC variety, to produce encrypted hosted commands (i.e. encrypted HoP CMD).
  • the hosted commands are commands that are used to configure the portion (e.g., a virtual transponder(s)) of the payload 605 that the HOC 660 is leasing from the host SOC 650.
  • the host SOC 650 encrypts unencrypted host commands (i.e. unencrypted host CMD), by utilizing a first COMSEC variety, to produce encrypted host commands (i.e. encrypted host CMD).
  • the host commands are commands that are used to configure the portion (e.g., a transponder(s)) of the payload 605 that host SOC 650 is utilizing for itself.
  • the host SOC 650 is depicted to have its ground antenna located right next to its operations building; in other embodiments, the host SOC 650 may have its ground antenna located very far away from the its operations building (e.g., the ground antenna may be located in another country than the operations building).
  • the first COMSEC variety may include at least one encryption key and/or at least one algorithm (e.g., a Type 1 encryption algorithm or a Type 2 encryption algorithm).
  • the second COMSEC variety may include at least one encryption key and/or at least one encryption algorithm (e.g., a Type 1 encryption algorithm or a Type 2 encryption algorithm).
  • the host SOC 650 transmits 620 the encrypted host commands to the vehicle 610.
  • the host SOC 650 transmits 620 the encrypted host commands utilizing an out-of-band frequency band(s) (i.e. a frequency band(s) that is not the same frequency band(s) utilized to transmit payload data).
  • an out-of-band frequency band(s) i.e. a frequency band(s) that is not the same frequency band(s) utilized to transmit payload data.
  • the HOC 660 transmits 625 the encrypted hosted commands to the vehicle 610.
  • the HOC 660 transmits 625 the encrypted hosted commands utilizing an out-of-band frequency band(s).
  • the host command receiver 635 on the vehicle 610 receives the encrypted host commands.
  • the hosted command receiver 645 on the vehicle 610 receives the encrypted hosted commands.
  • the host command receiver 635 then transmits 652 the encrypted host commands to a first communication security module 662.
  • the first communication security module 662 decrypts the encrypted host commands utilizing the first COMSEC variety (i.e. COMSEC Variety 1) to generate unencrypted host commands.
  • the first communication security module 662 may comprise one or more modules.
  • the first communication security module 662 may comprise one or more processors.
  • the hosted command receiver 645 then transmits 655 the encrypted hosted commands to a second communication security module 665.
  • the second communication security module 665 decrypts the encrypted hosted commands utilizing the second COMSEC variety (i.e. COMSEC Variety 2) to generate unencrypted hosted commands.
  • the second communication security module 665 may comprise one or more modules.
  • the second communication security module 665 may comprise one or more processors.
  • the first communication security module 662 then transmits 670 the unencrypted host commands to the payload (i.e. the shared host/hosted payload) 605.
  • the second communication security module 665 transmits 675 the unencrypted hosted commands to the payload (i.e. the shared host/hosted payload) 605.
  • the payload 605 is reconfigured according to the unencrypted host commands and the unencrypted hosted commands.
  • a payload antenna 680 then transmits (e.g., in one or more antenna beams 681) payload data to a host receiving antenna 685 and a hosted receiving antenna 690 on the ground.
  • antenna beams 681 is shown to include a plurality of circular spot beams; in other embodiments, antenna beams 681 may include more or less number of beams than is shown in FIG. 6 (e.g., antenna beams 681 may only include a single beam), and antenna beams 681 may include beams of different shapes than circular spot beams as is shown in FIG. 6 (e.g., antenna beams 681 may include elliptical beams and/or shaped beams of various different shapes).
  • the payload antenna 680 may comprise one or more reflector dishes including, but not limited to, parabolic reflectors and/or shaped reflectors. In some embodiments, the payload antenna 680 may comprise one or more multifeed antenna arrays.
  • the payload 605 transmits 691 unencrypted host telemetry (i.e. unencrypted host TLM, which is telemetry data related to the portion of the payload 605 that is utilized by the host SOC 650) to the first communication security module 662.
  • the first communication security module 662 then encrypts the unencrypted host telemetry utilizing the first COMSEC variety to generate encrypted host telemetry (i.e. encrypted host TLM).
  • the payload 605 transmits 692 unencrypted hosted telemetry (i.e. unencrypted HoP TLM, which is telemetry data related to the portion of the payload 605 that is leased by the HOC 660) to the second communication security module 665.
  • the second communication security module 665 then encrypts the unencrypted hosted telemetry utilizing the second COMSEC variety to generate encrypted hosted telemetry (i.e. encrypted HoP TLM).
  • the first communication security module 662 then transmits 693 the encrypted host telemetry to a host telemetry transmitter 694.
  • the host telemetry transmitter 694 then transmits 695 the encrypted host telemetry to the host SOC 650.
  • the telemetry transmitter 694 transmits 695 the encrypted host telemetry utilizing an out-of-band frequency band(s).
  • the host SOC 650 then decrypts the encrypted host telemetry utilizing the first COMSEC variety to generate the unencrypted host telemetry.
  • the second communication security module 665 then transmits 696 the encrypted hosted telemetry to a hosted telemetry transmitter 698.
  • the hosted telemetry transmitter 698 then transmits 697 the encrypted hosted telemetry to the HOC 660.
  • the telemetry transmitter 698 transmits 697 the encrypted hosted telemetry utilizing an out-of-band frequency band(s).
  • the HOC 660 then decrypts the encrypted hosted telemetry utilizing the second COMSEC variety to generate the unencrypted hosted telemetry.
  • FIGS. 7A, 7B, and 7C together show a flow chart for the disclosed method for protected multi-operators payload operations where the host user transmits encrypted host commands (encrypted utilizing a first COMSEC variety) to a vehicle and the hosted user transmits encrypted hosted commands (encrypted utilizing a second COMSEC variety) to the vehicle, and where the host telemetry is encrypted using the first COMSEC variety and the hosted telemetry is encrypted using the second COMSEC variety, in accordance with at least one embodiment of the present disclosure.
  • a hosted payload (HoP) operation center (HOC) encrypts unencrypted hosted commands by utilizing a second COMSEC variety to produce encrypted hosted commands 705.
  • HoP hosted payload
  • HOC operation center
  • the HOC transmits (out-of-band) the encrypted hosted commands to a vehicle 710.
  • the host spacecraft operations center (SOC) encrypts unencrypted host commands by utilizing a first COMSEC variety to produce encrypted host commands 715. Then, the host SOC transmits (out-of-band) the encrypted host commands to the vehicle 720.
  • a host command receiver on the vehicle receives the encrypted host commands 725.
  • a hosted command receiver on the vehicle receives the encrypted hosted commands 730.
  • the host command receiver transmits the encrypted host commands to a first communication security module 735.
  • the hosted command receiver transmits the encrypted hosted commands to a second communication security module 740.
  • the first communication security module then decrypts the encrypted host commands utilizing the first COMSEC variety to generate the unencrypted host commands 745.
  • the second communication security module then decrypts the encrypted hosted commands utilizing the second COMSEC variety to generate the unencrypted hosted commands 750.
  • the first communication security module then transmits the unencrypted host commands to the payload 755.
  • the second communication security module then transmits the unencrypted hosted commands to the payload 760.
  • the payload is reconfigured according to the unencrypted host commands and the unencrypted hosted commands 765.
  • a payload antenna on the vehicle then transmits payload data to a host receiving antenna and a hosted receiving antenna 770.
  • the payload transmits to the first communication security module unencrypted host telemetry 775.
  • the first communication security module encrypts the unencrypted host telemetry utilizing the first COMSEC variety to generate encrypted host telemetry 780.
  • the first communication security module then transmits the encrypted host telemetry to a host telemetry transmitter 785.
  • the host telemetry transmitter transmits the encrypted host telemetry to the host SOC 790.
  • the host SOC decrypts the encrypted host telemetry utilizing the first COMSEC variety to generate the unencrypted host telemetry 791.
  • the payload transmits to the second communication security module unencrypted hosted telemetry 792. Then, the second communication security module encrypts the unencrypted hosted telemetry utilizing the second COMSEC variety to generate encrypted hosted telemetry 793. The second communication security module then transmits the encrypted hosted telemetry to a hosted telemetry transmitter 794. Then, the hosted telemetry transmitter transmits the encrypted hosted telemetry to the HOC 795. The HOC then decrypts the encrypted hosted telemetry utilizing the second COMSEC variety to generate the unencrypted hosted telemetry 796. Then, the method ends 797.
  • FIG. 8 is a diagram 800 showing components of an exemplary virtual transponder that may be employed by the disclosed system for protected multi-operators payload operations, in accordance with at least one embodiment of the present disclosure.
  • various components are shown that may be configured according to the unencrypted host commands (e.g., the host channel 830) and unencrypted hosted commands (e.g., the hosted channel 820).
  • the uplink antenna 840, the downlink antenna 850, and various components of an all-digital payload 860 are shown that may be configured according to the unencrypted host commands (e.g., the host channel 830) and unencrypted hosted commands (e.g., the hosted channel 820).
  • unencrypted host commands e.g., the host channel 830
  • unencrypted hosted commands e.g., the hosted channel 820
  • some other components of the all-digital payload 860 may optionally be configured according to the unencrypted host commands (e.g., the host channel 830) and unencrypted hosted commands (e.g., the hosted channel 820).
  • unencrypted host commands e.g., the host channel 830
  • unencrypted hosted commands e.g., the hosted channel 820

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Astronomy & Astrophysics (AREA)
  • Radio Relay Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
EP18729003.6A 2018-05-04 2018-05-04 Geschützte mehrfachoperatoren-nutzlastoperationen Pending EP3788754A1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2018/031222 WO2019212573A1 (en) 2018-05-04 2018-05-04 Protected multi-operators payload operations

Publications (1)

Publication Number Publication Date
EP3788754A1 true EP3788754A1 (de) 2021-03-10

Family

ID=62495857

Family Applications (1)

Application Number Title Priority Date Filing Date
EP18729003.6A Pending EP3788754A1 (de) 2018-05-04 2018-05-04 Geschützte mehrfachoperatoren-nutzlastoperationen

Country Status (6)

Country Link
EP (1) EP3788754A1 (de)
JP (1) JP7122062B2 (de)
CN (1) CN112313917B (de)
AU (1) AU2018421734B2 (de)
CA (1) CA3096587A1 (de)
WO (1) WO2019212573A1 (de)

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8160575B2 (en) * 2001-07-23 2012-04-17 Space Systems/Loral, Inc. Methods for testing multibeam satellite systems using input power telemetry and output noise power
CN100566219C (zh) * 2003-01-28 2009-12-02 波音公司 卫星通信数据数字处理的系统和方法
US7751779B2 (en) * 2006-12-21 2010-07-06 Northrop Grumman Space & Mission Systems Corp. Satellite communication system
US8633831B2 (en) * 2007-07-06 2014-01-21 The Boeing Company Single-wire telemetry and command
US8355359B2 (en) * 2008-08-04 2013-01-15 Orbital Sciences Corporation Secondary payload interface
US8873456B2 (en) * 2011-09-23 2014-10-28 The Boeing Company Multi-operator system for accessing satellite resources
US9001642B2 (en) * 2011-09-23 2015-04-07 The Boeing Company Selective downlink data encryption system for satellites
US9042295B1 (en) 2012-03-01 2015-05-26 The Boeing Company Transponded anti-jam satellite communications
CN102932261A (zh) * 2012-11-20 2013-02-13 航天东方红卫星有限公司 一种基于智能型高速路由器的星上载荷信息流管理系统
CN105245364B (zh) * 2015-09-29 2018-07-24 中国运载火箭技术研究院 一种卫星有效载荷任务管理系统
CN105978664B (zh) * 2016-06-24 2019-01-25 中国科学院国家空间科学中心 一种用于遥感卫星的有效载荷数据传输系统

Also Published As

Publication number Publication date
CN112313917A (zh) 2021-02-02
CA3096587A1 (en) 2019-11-07
JP2021530882A (ja) 2021-11-11
JP7122062B2 (ja) 2022-08-19
AU2018421734B2 (en) 2024-03-14
CN112313917B (zh) 2023-06-27
WO2019212573A1 (en) 2019-11-07
AU2018421734A1 (en) 2020-11-12

Similar Documents

Publication Publication Date Title
US11595360B2 (en) Hosted payload operations with private telemetry and command
US11388151B2 (en) Protected multi-operators payload operations with private telemetry and command
US11201707B2 (en) Secured independent hosted payload operations
US11290176B2 (en) Facilitating satellite operations with secure enclave for hosted payload operations
US12021848B2 (en) Satellite operations with secure enclave for secure hosted payload operations
AU2018236880B2 (en) Secured independent hosted payload operations
EP3468066B1 (de) Kommerzieller satellitenbetrieb mit sicherer enklave für den nutzlastbetrieb
AU2018421734B2 (en) Protected multi-operators payload operations
AU2018421732B2 (en) Hosted payload operations
NZ746846B2 (en) Secured independent hosted payload operations

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20201015

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20220706

RAP3 Party data changed (applicant data changed or rights of an application transferred)

Owner name: THE BOEING COMPANY