CN112313917A - Protected multi-operator payload operation - Google Patents

Protected multi-operator payload operation Download PDF

Info

Publication number
CN112313917A
CN112313917A CN201880094837.3A CN201880094837A CN112313917A CN 112313917 A CN112313917 A CN 112313917A CN 201880094837 A CN201880094837 A CN 201880094837A CN 112313917 A CN112313917 A CN 112313917A
Authority
CN
China
Prior art keywords
encrypted
host
command
hosted
payload
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201880094837.3A
Other languages
Chinese (zh)
Other versions
CN112313917B (en
Inventor
Y-F·J·陈
H·F·克里科里安
R·J·威尼格
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Boeing Co
Original Assignee
Boeing Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Boeing Co filed Critical Boeing Co
Publication of CN112313917A publication Critical patent/CN112313917A/en
Application granted granted Critical
Publication of CN112313917B publication Critical patent/CN112313917B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/18502Airborne stations
    • H04B7/18506Communications with or from aircraft, i.e. aeronautical mobile service
    • H04B7/18508Communications with or from aircraft, i.e. aeronautical mobile service with satellite system used as relay, i.e. aeronautical mobile satellite service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/18578Satellite systems for providing broadband data service to individual earth stations
    • H04B7/18593Arrangements for preventing unauthorised access or for providing user protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/204Multiple access
    • H04B7/2041Spot beam multiple access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/06Airborne or Satellite Networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Astronomy & Astrophysics (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Bioethics (AREA)
  • Radio Relay Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Systems, methods, and apparatus for protected multi-operator payload operations are disclosed. In one or more embodiments, a disclosed method for protected multi-operator payload operation includes: the encrypted hosted command is transmitted by a hosted payload (HoP) operations center (HOC) to a host Spacecraft Operations Center (SOC). Moreover, the method includes transmitting, by the host SOC, the encrypted host command and the encrypted hosted command to the vehicle. Further, the method includes reconfiguring a payload on the vehicle in accordance with the unencrypted host command and the unencrypted hosted command. In addition, the method includes transmitting, by a payload antenna on the vehicle, the payload data to the host receive antenna and the hosted receive antenna. Further, the method includes transmitting, by the telemetry value transmitter on the vehicle, the encrypted host telemetry value and the encrypted hosted telemetry value to the host SOC. Further, the method includes transmitting, by the host SOC, the encrypted hosted telemetry value to the HOC.

Description

Protected multi-operator payload operation
Technical Field
The present disclosure relates to payload operations. In particular, it relates to protected multi-operator payload operation.
Background
Currently, typical transponders on vehicles (e.g., satellites) have the ability to perform input-to-output switching of payloads. All this switching on the payload is commanded and controlled by a single satellite controller, with no privacy of resource allocation. For example, in a digital transponder, when a user requests a channel with a particular bandwidth and antenna characteristics, then the channel will be set, used, and then disconnected.
Thus, there is a need for an improved transponder design that allows for maintaining privacy in the allocation of resources on the payload.
Disclosure of Invention
The present disclosure relates to a method, system, and apparatus for protected multi-operator payload operation. In one or more embodiments, a method for protected multi-operator payload operation includes transmitting, by a hosted payload (HoP) operations center (HOC), encrypted hosted commands to a host Spacecraft Operations Center (SOC). Also, the method includes transmitting, by the host SOC, the encrypted host command and the encrypted hosted command to a vehicle. In one or more embodiments, the encrypted host command is encrypted using a first communication security (COMSEC) category and the encrypted hosted command is encrypted using a second COMSEC category. Further, the method includes decrypting, by a first communications security module on the vehicle, the encrypted host command with the first COMSEC species to generate an unencrypted host command. Additionally, decrypting, by a second communications security module on the vehicle, the encrypted hosted command with the second COMSEC category to generate an unencrypted hosted command. Also, the method includes reconfiguring a payload on the vehicle in accordance with the unencrypted host command and the unencrypted hosted command. Further, payload data is transmitted by a payload antenna on the vehicle to the host receive antenna and the hosted receive antenna. Additionally, generating, by the first communication security module, an encrypted host telemetry value and an encrypted hosted telemetry value by encrypting the unencrypted host telemetry value and the unencrypted hosted telemetry value from the payload with the first COMSEC class. Also, the method includes transmitting, by a telemetry value transmitter on the vehicle, the encrypted host telemetry value and the encrypted hosted telemetry value to the host SOC. Additionally, the method includes transmitting, by the host SOC, the encrypted hosted telemetry value to the HOC.
In at least one embodiment, reconfiguring the payload in accordance with the unencrypted host command and the unencrypted hosted command includes adjusting at least one of: transponder power, transponder spectrum monitoring, transponder connectivity, transponder gain setting, transponder limiter setting, transponder automatic level control setting, transponder phase setting, internal gain generation, bandwidth of at least one beam, at least one frequency band of at least one beam, transponder beamforming setting, Effective Isotropic Radiated Power (EIRP) of at least one beam, transponder channel, and/or beam control.
In one or more embodiments, reconfiguring the payload in accordance with the unencrypted host command and the unencrypted hosted command includes reconfiguring at least one of: at least one antenna, at least one analog-to-digital converter, at least one digital-to-analog converter, at least one beamformer, at least one digital channelizer, at least one demodulator, at least one modulator, at least one digital switching matrix, and/or at least one digital combiner.
In at least one embodiment, the vehicle is an air vehicle. In one or more embodiments, the air vehicle is a satellite, an airplane, an Unmanned Aerial Vehicle (UAV), or a space vehicle.
In one or more embodiments, the method further comprises encrypting, by the HOC, the non-encrypted hosted command by utilizing the second COMSEC category to produce an encrypted hosted command. Further, the method includes encrypting, by the host SOC, the unencrypted host command by utilizing the first COMSEC category to produce an encrypted host command.
In at least one embodiment, the method further comprises receiving, by a host command receiver on the vehicle, the encrypted host command. Also, the method includes receiving, by a hosted command receiver on the vehicle, the encrypted hosted command. Further, the method includes transmitting, by the host command receiver, the encrypted host command to the first communication security module. Additionally, the method includes transmitting, by the hosted command receiver, the encrypted hosted command to the second communication security module.
In one or more embodiments, the method further comprises transmitting, by the first communications security module, an unencrypted host command to the payload. Also, the method includes transmitting, by the second communication security module, the unencrypted hosted command to the payload.
In at least one embodiment, the method further includes transmitting, by the payload, the unencrypted host telemetry value and the unencrypted hosted telemetry value to the first communication security module.
In one or more embodiments, the method further comprises transmitting, by the first communication security module, the encrypted host telemetry value and the encrypted hosted telemetry value to the telemetry value transmitter.
In at least one embodiment, the method further comprises decrypting, by the host SOC, the encrypted host telemetry value using the first COMSEC category and using a database without hosted inverse transform information to generate an unencrypted host telemetry value. Also, the method includes decrypting, by the HOC, the encrypted hosted telemetry value using the first COMSEC category and using a database without host inverse transform information to generate an unencrypted hosted telemetry value.
In one or more embodiments, a method for protected multi-operator payload operation includes transmitting, by an HOC, the encrypted hosted commands to a host Spacecraft Operations Center (SOC). The method also includes transmitting, by the host SOC, the encrypted host command and the encrypted hosted command to a vehicle. Also, the method includes decrypting, by the first communications security module, the encrypted host command with the first COMSEC species to generate an unencrypted host command. Further, the method includes decrypting, by the second communication security module, the encrypted hosted command with the second COMSEC category to unencrypted hosted command. Additionally, the method includes reconfiguring the payload in accordance with the unencrypted host command and unencrypted hosted command. Also, the method includes transmitting, by a payload antenna on the vehicle, payload data to a host receive antenna and a hosted receive antenna. Further, the method includes encrypting, by the first communications security module, the non-encrypted host telemetry value with the first COMSEC species to generate an encrypted host telemetry value. Additionally, the method includes transmitting, by the host telemetry value transmitter, the encrypted host telemetry value to the host SOC. Also, the method includes encrypting, by the second communication security module, the unencrypted hosted telemetry value with the second COMSEC category to generate an encrypted hosted telemetry value. Further, the method includes transmitting, by the hosted telemetry value transmitter, the encrypted hosted telemetry value to the host SOC. Additionally, the method includes transmitting, by the host SOC, the encrypted hosted telemetry value to the HOC.
In at least one embodiment, a method for protected multi-operator payload operation includes transmitting, by a hosted payload (HoP) operations center (HOC), an encrypted hosted command to a vehicle. The method also includes transmitting, by the host SOC, the encrypted host command to the vehicle. Also, the method includes decrypting, by a first communications security module on the vehicle, the encrypted host command with a first COMSEC species to generate an unencrypted host command. Further, the method includes decrypting, by a second communication security module on the vehicle, the encrypted hosted command with a second COMSEC category to generate an unencrypted hosted command. Additionally, the method includes reconfiguring a payload from the unencrypted host command and the unencrypted hosted command. Also, the method includes transmitting, by a payload antenna on the vehicle, payload data to a host receive antenna and a hosted receive antenna. Further, the method includes encrypting, by the first communications security module, the non-encrypted host telemetry value with the first COMSEC species to generate an encrypted host telemetry value. Additionally, the method includes transmitting, by a host telemetry value transmitter on the vehicle, the encrypted host telemetry value to the host SOC. Also, the method includes encrypting, by the second communication security module, the unencrypted hosted telemetry value with the second COMSEC category to generate an encrypted hosted telemetry value. Additionally, the method includes transmitting, by the hosted telemetry value transmitter, the encrypted hosted telemetry value to the HOC.
In one or more embodiments, a system for protected multi-operator payload operation includes a hosted payload (HoP) operations center (HOC) to transmit encrypted hosted commands to a host Spacecraft Operations Center (SOC). The system also includes the host SOC to transmit the encrypted host command and the encrypted hosted command to a vehicle. In one or more embodiments, the encrypted host command is encrypted using a first communication security (COMSEC) category and the encrypted hosted command is encrypted using a second COMSEC category. Also, the system includes a first communication security module on the vehicle to decrypt the encrypted host command using the first COMSEC species to generate an unencrypted host command. Further, the system includes a second communication security module on the vehicle to decrypt the encrypted hosted command utilizing the second COMSEC category to generate an unencrypted hosted command. Additionally, the system includes a payload on the vehicle that is reconfigured according to the unencrypted host command and unencrypted hosted command. Also, the system includes a payload antenna on the vehicle for transmitting payload data to the host receive antenna and the hosted receive antenna. Additionally, the system includes the first communication security module to encrypt the unencrypted host telemetry value and the unencrypted hosted telemetry value from the payload by utilizing the first COMSEC class to generate an encrypted host telemetry value and an encrypted hosted telemetry value. Further, the system includes an on-board telemetry value transmitter for transmitting the encrypted host telemetry value and the encrypted hosted telemetry value to the host SOC. Additionally, the system includes the host SOC to transmit the encrypted hosted telemetry value to the HOC.
In at least one embodiment, a system for protected multi-operator payload operation includes a hosted payload (HoP) operations center (HOC) to transmit encrypted hosted commands to a host Spacecraft Operations Center (SOC). The system also includes the host SOC to transmit the encrypted host command and the encrypted hosted command to a vehicle. In one or more embodiments, the encrypted host command is encrypted using a first COMSEC category and the encrypted hosted command is encrypted using a second COMSEC category. Further, the system includes a first communication security module to decrypt the encrypted host command using the first COMSEC class to generate an unencrypted host command. Further, the system includes a second communication security module to decrypt the encrypted hosted command utilizing the second COMSEC category to generate the unencrypted hosted command. Additionally, the system includes a payload that is reconfigured according to the unencrypted host command and unencrypted hosted command. Further, the system includes a payload antenna on the vehicle for transmitting payload data to the host receive antenna and the hosted receive antenna. Additionally, the system includes the first communication security module to encrypt a non-encrypted host telemetry value with the first COMSEC species to generate an encrypted host telemetry value. Also, the system includes a host telemetry value transmitter for transmitting the encrypted host telemetry value to the host SOC. Further, the system includes the second communication security module that encrypts the unencrypted hosted telemetry value with the second COMSEC category to generate an encrypted hosted telemetry value. Also, the system includes a hosted telemetry value transmitter to transmit the encrypted hosted telemetry value to the host SOC. Additionally, the system includes the host SOC to transmit the encrypted hosted telemetry value to the HOC.
In one or more embodiments, a system for protected multi-operator payload operations includes a hosted payload (HoP) operations center (HOC) to transmit encrypted hosted commands to a vehicle. The system also includes a host Spacecraft Operations Center (SOC) for transmitting encrypted host commands to the vehicle. In one or more embodiments, the encrypted host command is encrypted using a first communication security (COMSEC) category and the encrypted hosted command is encrypted using a second COMSEC category. Also, the system includes a first communication security module on the vehicle to decrypt the encrypted host command using the first COMSEC species to generate an unencrypted host command. Further, the system includes a second communication security module on the vehicle to decrypt the encrypted hosted command utilizing the second COMSEC category to generate an unencrypted hosted command. Moreover, the system includes a payload that is reconfigured according to the unencrypted host command and the unencrypted hosted command. Further, the system includes a payload antenna on the vehicle for transmitting payload data to the host receive antenna and the hosted receive antenna. Additionally, the system includes the first communication security module to encrypt a non-encrypted host telemetry value with the first COMSEC species to generate an encrypted host telemetry value. Also, the system includes a host telemetry value transmitter on the vehicle for transmitting the encrypted host telemetry value to the host SOC. Further, the system includes the second communication security module that encrypts the unencrypted hosted telemetry value with the second COMSEC category to generate an encrypted hosted telemetry value. Additionally, the system includes a hosted telemetry value transmitter for transmitting the encrypted hosted telemetry value to the HOC.
The features, functions, and advantages can be achieved independently in various embodiments of the present disclosure or may be combined in yet other embodiments.
Drawings
These and other features, aspects, and advantages of the present disclosure will become better understood with regard to the following description, appended claims, and accompanying drawings where:
fig. 1 is a diagram illustrating a simplified architecture of the disclosed system for protected multi-operator payload operation, in accordance with at least one embodiment of the present disclosure.
Fig. 2 is a diagram illustrating the disclosed system for protected multi-operator payload operation, in accordance with at least one embodiment of the present disclosure, wherein a host user transmits to a vehicle an encrypted host command (encrypted with a first COMSEC category) and an encrypted hosted command (encrypted with a second COMSEC category), and wherein both the host telemetry value and the hosted telemetry value are encrypted using the first COMSEC category.
Fig. 3A, 3B, and 3C together illustrate a flow chart of the disclosed method for protected multi-operator payload operation, wherein a host user transmits to a vehicle an encrypted host command (encrypted with a first COMSEC category) and an encrypted hosted command (encrypted with a second COMSEC category), and wherein both the host telemetry value and the hosted telemetry value are encrypted using the first COMSEC category, in accordance with at least one embodiment of the present disclosure.
Fig. 4 is a diagram illustrating the disclosed system for protected multi-operator payload operation in accordance with at least one embodiment of the present disclosure, wherein a host user transmits to a vehicle an encrypted host command (encrypted with a first COMSEC category) and an encrypted hosted command (encrypted with a second COMSEC category), and wherein a host telemetry value is encrypted using the first COMSEC category and a hosted telemetry value is encrypted using the second COMSEC category.
Fig. 5A, 5B, 5C, and 5D together illustrate a flow diagram of the disclosed method for protected multi-operator payload operation, wherein a host user transmits to a vehicle an encrypted host command (encrypted with a first COMSEC category) and an encrypted hosted command (encrypted with a second COMSEC category), and wherein a host telemetry value is encrypted using the first COMSEC category and a hosted telemetry value is encrypted using the second COMSEC category, in accordance with at least one embodiment of the present disclosure.
Fig. 6 is a diagram illustrating the disclosed system for protected multi-operator payload operation in accordance with at least one embodiment of the present disclosure, wherein a host user transmits an encrypted host command (encrypted using a first COMSEC category) to a vehicle and a hosted user transmits an encrypted hosted command (encrypted using a second COMSEC category) to the vehicle, and wherein a host telemetry value is encrypted using the first COMSEC category and a hosted telemetry value is encrypted using the second COMSEC category.
Fig. 7A, 7B, and 7C together illustrate a flow diagram of the disclosed method for protected multi-operator payload operation, wherein a host user transmits an encrypted host command (encrypted using a first COMSEC category) to a vehicle and a hosted user transmits an encrypted hosted command (encrypted using a second COMSEC category) to the vehicle, and wherein a host telemetry value is encrypted using the first COMSEC category and a hosted telemetry value is encrypted using the second COMSEC category, in accordance with at least one embodiment of the present disclosure.
Fig. 8 is a diagram illustrating components of an example virtual transponder that may be employed by the disclosed system for protected multi-operator payload operation in accordance with at least one embodiment of the present disclosure.
Detailed Description
The methods and apparatus disclosed herein provide an operating system for protected multi-operator payload operation. The system of the present disclosure allows vehicle operators to privately share vehicle resources.
As noted above, currently, typical transponders on vehicles (e.g., satellites) have the ability to perform input-to-output switching of payloads. All this switching on the payload is commanded and controlled by a single satellite controller, with no privacy of resource allocation. For example, in a digital transponder, when a user requests a channel with a particular bandwidth and antenna characteristics, then the channel will be set, used, and then disconnected.
The disclosed system allows private vehicle resource allocation and control that provides vehicle users with the ability to allocate resources privately and dynamically on demand. In particular, the disclosed system employs virtual transponders, which are transponders that are divided into multiple transponders with independent command and control. In one or more embodiments, an exemplary virtual transponder includes a digital transponder having a digital channelizer, a digital switch matrix, and a digital combiner configured to divide the digital transponder into multiple transponders having independent command and control. The command and control of the virtual transponder is implemented via ground software that provides dynamic allocation and privatization of the digital switch matrix for bandwidth on demand.
It should be noted that the disclosed system for private vehicle resource allocation and control may employ a variety of different types of transponders for virtual transponders, in addition to the specific disclosed embodiment for virtual transponders (e.g., depicted in fig. 8). For example, a variety of different types of transponders may be used for the virtual transponder, including, but not limited to, a variety of different types of digital transponders, a variety of different types of analog transponders (e.g., conventional transponder-type transponders), and a variety of different types of combined analog/digital transponders.
In the following description, numerous details are set forth in order to provide a more thorough description of the system. It will be apparent, however, to one skilled in the art that the disclosed system may be practiced without these specific details. In other instances, well known features have not been described in detail so as not to unnecessarily obscure the system.
Embodiments of the disclosure may be described herein in terms of functional and/or logical components and various processing steps. It should be appreciated that such components may be realized by any number of hardware, software, and/or firmware components configured to perform the specified functions. For example, embodiments of the present disclosure may employ various integrated circuit components (e.g., memory elements, digital signal processing elements, logic elements, look-up tables, or the like), which may carry out a variety of functions under the control of one or more processors, microprocessors, or other control devices. Moreover, those skilled in the art will appreciate that embodiments of the present disclosure may be practiced in conjunction with other components, and that the system described herein is merely one exemplary embodiment of the present disclosure.
For the sake of brevity, conventional techniques and components related to satellite communication systems, as well as other functional aspects of the systems (and the individual operating components of the systems) may not be described in detail herein. Furthermore, the connecting lines shown in the various figures contained herein are intended to represent example functional relationships and/or physical couplings between the various elements. It should be noted that many alternative or additional functional relationships or physical connections may be present in an embodiment of the disclosure.
Fig. 1 is a diagram 100 illustrating a simplified architecture of the disclosed system for protected multi-operator payload operation in accordance with at least one embodiment of the present disclosure. In this figure, a simplified view of a number of possible managed payload configurations is shown. Specifically, this figure shows a space section 110 and a ground section 120. Space segment 110 represents a vehicle. Various different types of vehicles may be employed for the vehicle, including but not limited to air vehicles. Also, a variety of different types of air vehicles may be employed for the vehicle, including, but not limited to, satellites, airplanes, Unmanned Aerial Vehicles (UAVs), and space vehicles.
Where satellites are employed for vehicles, it should be noted that satellites typically include computer controlled systems. The satellite generally includes a bus 130 and a payload 140. Bus 130 may include a system (which includes components) that controls the satellites. These systems perform tasks such as power generation and control, thermal control, telemetry, attitude control, orbit control, and other suitable operations.
The payload 140 of the satellite provides functionality to the user of the satellite. Payload 140 may include an antenna, transponder, and other suitable devices. For example, with respect to communications, the payload 140 in the satellite may be used to provide internet access, telephone communications, radio, television, and other types of communications.
The payload 140 of the satellite may be used by different entities. For example, payload 140 may be used by the owner of the satellite (i.e., the host user), one or more customers (i.e., one or more hosted users), or some combination thereof.
For example, the owner of the satellite may lease different portions of the payload 140 to different customers. In one example, one set of antenna beams generated by the payload 140 of the satellite may be leased to one customer, while a second set of antenna beams may be leased to a second customer. In another example, one set of antenna beams generated by the payload 140 of the satellite may be utilized by the owner of the satellite, while a second set of antenna beams may be leased to customers. In yet another example, some or all of the antenna beams generated by the payload 140 of the satellite may be shared by one customer and a second customer. In another example, some or all of the antenna beams generated by the payload 140 of the satellite may be shared by the owner and customers of the satellite. When the satellite is shared by different users, the users may have a shared communication link to the satellite (e.g., interface a), or each user may have separate communication links to the satellite (e.g., interfaces a and D).
Leasing a satellite to multiple customers may increase the revenue that a satellite owner may obtain. Further, the customer may use a subset of the total resources in the satellite at a cost that is less than the cost of the customer purchasing and operating the satellite, building and operating the satellite, or leasing the entire satellite.
Referring back to fig. 1, ground segment 120 includes a host Spacecraft Operations Center (SOC) (e.g., a ground station associated with an owner of the satellite) 150 and a hosted payload (HoP) operations center (HOC) (e.g., one or more ground stations associated with one or more customers that are leasing at least a portion of the payload of the satellite from the owner) 160.
Fig. 1 shows a number of different possible communication links (i.e., interfaces a-E). It should be noted that the disclosed system may employ some or all of these illustrated communication links. Interface a, which may include multiple links, is an out-of-band command and telemetry link from host SOC 150 for a command satellite. Interface B, which may include multiple links, is the communication link between bus 130 and payload 140. Interface B may be used to control basic items such as power supplies. Information that may be communicated from bus 130 to payload 140 via interface B may include, but is not limited to, time, ephemeris, and payload commands. Information that may be communicated from payload 140 to bus 130 via interface B may include, but is not limited to, payload telemetry values.
Interface C, which may include multiple links, is an in-band command and telemetry link for the bus and/or payload. Interface D, which may include multiple links, is a command and telemetry link from the HOC(s) 160 for commanding the satellite. Interface E, which may include multiple links between host SOC 150 and HOC 160, allows requests from the HOC for resource sharing of payload 140.
Fig. 2-7C illustrate exemplary systems and methods for protected multi-operator payload operation according to at least one embodiment of the present disclosure.
Fig. 2 is a diagram 200 illustrating the disclosed system for protected multi-operator payload operation in accordance with at least one embodiment of the present disclosure, wherein a host user (i.e., host SOC)250 transmits an encrypted host command (encrypted with a first COMSEC category) and an encrypted hosted command (encrypted with a second COMSEC category) to a vehicle, and wherein both the host telemetry value and the hosted telemetry value are encrypted using the first COMSEC category. In this figure, a vehicle 210, a host SOC 250, and a HOC260 are shown. The HOC260 has leased at least a portion of the payload 205 (e.g., one or more virtual transponders) of the vehicle 210 from the owner of the satellite (i.e., host SOC) 250. It should be noted that in some embodiments, the HOC260 may lease all of the payload 205 of the vehicle 210 from the owner (i.e., host SOC)250 of the satellite. Also, it should be noted that in some embodiments, the HOC260 may own the payload 205 (e.g., a steerable antenna) of the vehicle 210 and sign up with the host SOC 250 to transmit encrypted hosted commands to the vehicle 210.
During operation, the HOC260 encrypts the non-encrypted hosted command (i.e., non-encrypted HoP CMD) by utilizing the second COMSEC category to produce an encrypted hosted command (i.e., encrypted HoP CMD). The hosted commands are commands to configure the portion of payload 205 (e.g., one or more virtual transponders) that HOC260 leases from host SOC 250. The host SOC 250 encrypts the unencrypted host command (i.e., unencrypted host CMD) by utilizing the first COMSEC category to generate an encrypted host command (i.e., encrypted host CMD). The host command is a command to configure the host SOC 250 for a portion of the payload 205 (e.g., one or more transponders) that it utilizes.
It should be noted that although in fig. 2, the host SOC 250 is described as having its terrestrial antenna located in close proximity to its operating building, in other embodiments, the terrestrial antenna of the host SOC 250 may be located very far from its operating building (e.g., the terrestrial antenna may be located in another country outside of the operating building).
Additionally, it should be noted that the first COMSEC category may include at least one encryption key and/or at least one algorithm (e.g., a type 1 encryption algorithm or a type 2 encryption algorithm). Additionally, it should be noted that the second COMSEC category may include at least one encryption key and/or at least one encryption algorithm (e.g., a type 1 encryption algorithm or a type 2 encryption algorithm).
The HOC260 then transmits 215 the encrypted hosted command to the host SOC 250. After the host SOC 250 receives the encrypted hosted command, the host SOC 250 transmits 220 the encrypted host command and transmits 225 the encrypted hosted command to the vehicle 210. The host SOC 250 utilizes an out-of-band frequency band (i.e., a frequency band different from the frequency band used to transmit the payload data) to transmit 220, 225 the encrypted host commands and the encrypted hosted commands. The host command receiver 235 on the vehicle 210 receives the encrypted host command. In addition, a hosted command receiver 245 on the vehicle 210 receives encrypted hosted commands.
The host command receiver 235 then transmits 252 the encrypted host command to the first communication security module 262. The first communication security module 262 decrypts the encrypted host command using a first COMSEC class (i.e., COMSEC class 1) to generate an unencrypted host command.
It should be noted that the first communication security module 262 may include one or more modules. Further, the first communication security module 262 may include one or more processors.
The hosted command receiver 245 then transmits 255 the encrypted hosted command to the second communication security module 265. The second communication security module 265 decrypts the encrypted hosted command utilizing a second COMSEC category (i.e., COMSEC category 2) to generate an unencrypted hosted command.
It should be noted that the second communication security module 265 may include one or more modules. Further, the second communication security module 265 may include one or more processors.
The first communication security module 262 then transmits 270 the unencrypted host command to the payload (i.e., shared host/hosted payload) 205. The second communication security module 265 transmits 275 the unencrypted hosted command to the payload (i.e., shared host/hosted payload) 205. Payload 205 is reconfigured according to the unencrypted host command and the unencrypted managed command. Payload antenna 280 then transmits the payload data (e.g., in one or more antenna beams 281) to host receive antenna 285 and hosted receive antenna 290 on the surface.
Additionally, it should be noted that although in fig. 2, antenna beam 281 is shown as comprising a plurality of circular spot beams; in other embodiments, however, antenna beam 281 may include a greater or lesser number of beams than shown in fig. 2 (e.g., antenna beam 281 may include only a single beam) and antenna beam 281 may include a beam that is shaped differently than the shape of the circular spot beam shown in fig. 2 (e.g., antenna beam 281 may include an elliptical beam and/or various differently shaped beams).
It should be noted that in one or more embodiments, payload antenna 280 may include one or more reflector dishes, including but not limited to parabolic reflectors and/or shaped reflectors. In some embodiments, payload antenna 280 may include one or more multi-feed antenna arrays
The payload 205 transmits 291 to the first communication security module 262 an unencrypted host telemetry value (i.e., an unencrypted host TLM, which is telemetry data related to the portion of the payload 205 utilized by the host SOC 250) and an unencrypted hosted telemetry value (i.e., an unencrypted HoP TLM, which is telemetry data related to the portion of the payload 205 leased by the HOC 260). The first communication security module 262 then encrypts the non-encrypted host telemetry value and the non-encrypted hosted telemetry value using the first COMSEC category to generate an encrypted telemetry value (i.e., an encrypted TLM) (i.e., an encrypted host telemetry value and an encrypted hosted telemetry value).
The first communication security module 262 then transmits 293 the encrypted telemetry value to the telemetry value transmitter 294. The telemetry value transmitter 294 then transmits 295 the encrypted telemetry value to the host SOC 250. The telemetry transmitter 294 transmits 295 the encrypted telemetry using an out-of-band frequency band. The host SOC 250 then decrypts the encrypted telemetry value using the first COMSEC class to generate an unencrypted telemetry value. The host SOC 250 then reads the unencrypted telemetry value using a database that includes host payload inverse transform information and does not include hosted payload inverse transform information (i.e., a database of unmanaged payload inverse transform information) to determine telemetry data related to the portion of the payload 205 utilized by the host SOC 250.
The host SOC 250 then transmits 299 the encrypted telemetry value to the HOC 260. The HOC260 then decrypts the encrypted telemetry value using the first COMSEC category to generate an unencrypted telemetry value. The HOC260 then reads the unencrypted telemetry value using a database that includes the hosted inverse payload transform information and does not include the host inverse payload transform information (i.e., a database without host inverse payload transform information) to determine telemetry data related to the portion of the payload 205 utilized by the HOC 260.
Fig. 3A, 3B, and 3C together illustrate a flow chart of an disclosed method for protected multi-operator payload operation, wherein a host user transmits an encrypted host command (encrypted with a first COMSEC category) and an encrypted hosted command (encrypted with a second COMSEC category) to a vehicle, and wherein both a host telemetry value and a hosted telemetry value are encrypted using the first COMSEC category, in accordance with at least one embodiment of the present disclosure. At the start 300 of the method, a hosted payload (HoP) operations center (HOC) generates an encrypted hosted command 305 by encrypting an unencrypted hosted command with a second COMSEC category. The HOC then transmits the encrypted hosted command to a host Spacecraft Operations Center (SOC) 310. The host SOC encrypts the unencrypted host command by utilizing the first COMSEC class to produce an encrypted host command 315. The host SOC then transmits the encrypted host commands and the encrypted hosted commands (out-of-band) to the vehicle 320.
The host command receiver on the vehicle then receives the encrypted host command 325. And, the hosted command receiver on the vehicle receives the encrypted hosted command 330. The host command receiver transmits the encrypted host command to the first communication security module 335. The hosted command receiver transmits the encrypted hosted command to the second communication security module 340. The first communications security module then decrypts the encrypted host command using the first COMSEC category to generate an unencrypted host command 345. The second communications security module then decrypts the encrypted hosted command using the second COMSEC category to generate an unencrypted hosted command 350.
The first communication security module will then transmit the unencrypted host command to the payload 355. The second communication security module then transmits the unencrypted hosted command to payload 360. The payload is then reconfigured according to the unencrypted host command and the unencrypted managed command 365. The payload antenna on the vehicle then transmits the payload data to the host receive antenna and the hosted receive antenna 370.
The payload then transmits the unencrypted host telemetry value and unencrypted hosted telemetry value 375 to the first communications security module. The first communications security module then encrypts the unencrypted host telemetry value and the unencrypted hosted telemetry value using the first COMSEC category to generate encrypted host telemetry value and encrypted hosted telemetry value 380. The first communication security module then transmits the encrypted host telemetry value and the encrypted hosted telemetry value to the telemetry value transmitter 385. The telemetry value transmitter then transmits the encrypted host telemetry value and the encrypted hosted telemetry value to the host SOC 390. The host SOC then decrypts the encrypted host telemetry value using the first COMSEC category to generate unencrypted host telemetry value 395.
The host SOC transmits the encrypted hosted telemetry value to the HOC 396. The HOC then decrypts the encrypted hosted telemetry value using the first COMSEC category to generate an unencrypted hosted telemetry value 397. The method then ends 398.
Fig. 4 is a diagram 400 illustrating the disclosed system for protected multi-operator payload operation in accordance with at least one embodiment of the present disclosure, wherein a host user (i.e., host SOC)450 transmits to a vehicle an encrypted host command (encrypted with a first COMSEC category) and an encrypted hosted command (encrypted with a second COMSEC category), and wherein a host telemetry value is encrypted using the first COMSEC category and a hosted telemetry value is encrypted using the second COMSEC category. In this figure, a vehicle 410, a host SOC 450, and a HOC460 are shown. The HOC460 has leased at least a portion of the payload 405 (e.g., one or more virtual transponders) of the vehicle 410 from the owner of the satellite (i.e., host SOC) 450. It should be noted that in some embodiments, the HOC460 may lease all of the payload 405 of the vehicle 410 from the owner (i.e., host SOC)450 of the satellite. Also, it should be noted that in some embodiments, the HOC460 may own the payload 405 (e.g., a controllable antenna) of the vehicle 410 and sign up with the host SOC 450 to transmit encrypted hosted commands to the vehicle 410.
During operation, the HOC460 encrypts the non-encrypted hosted command (i.e., non-encrypted HoP CMD) by utilizing the second COMSEC category to produce an encrypted hosted command (i.e., encrypted HoP CMD). The hosted commands are commands for configuring portions of the payload 405 (e.g., one or more virtual transponders) leased by the HOC460 from the host SOC 450. The host SOC 450 encrypts the unencrypted host command (i.e., unencrypted host CMD) by utilizing the first COMSEC category to generate the encrypted host command (i.e., encrypted host CMD). The host commands are commands for configuring portions of the payload 405 (e.g., one or more transponders) that the host SOC 450 utilizes for itself.
It should be noted that although the host SOC 450 is depicted in fig. 4 with its terrestrial antenna located in close proximity to its operating building, in other embodiments, the terrestrial antenna of the host SOC 450 may be located very far from its operating building (e.g., the terrestrial antenna may be located in another country outside of the operating building).
Additionally, it should be noted that the first COMSEC category may include at least one encryption key and/or at least one algorithm (e.g., a type 1 encryption algorithm or a type 2 encryption algorithm). Additionally, it should be noted that the second COMSEC category may include at least one encryption key and/or at least one encryption algorithm (e.g., a type 1 encryption algorithm or a type 2 encryption algorithm).
The HOC460 then transmits 415 the encrypted hosted command to the host SOC 450. After the host SOC 450 receives the encrypted hosted command, the host SOC 450 transmits 420 the encrypted host command and transmits 425 the encrypted hosted command to the vehicle 410. The host SOC 450 transmits 420, 425 the encrypted host commands and the encrypted hosted commands using an out-of-band frequency band (i.e., a frequency band different from the frequency band used to transmit the payload data). The host command receiver 435 on the vehicle 410 receives the encrypted host command. In addition, the hosted command receiver 445 on the vehicle 410 receives encrypted hosted commands.
The host command receiver 435 then transmits 452 the encrypted host command to the first communication security module 462. The first communication security module 462 decrypts the encrypted host command using a first COMSEC class (i.e., COMSEC class 1) to generate an unencrypted host command.
It should be noted that the first communication security module 462 may include one or more modules. Further, the first communication security module 462 may include one or more processors.
The escrow command receiver 445 then transmits 455 the encrypted escrow command to the second communication security module 465. The second communication security module 465 decrypts the encrypted hosted command utilizing the second COMSEC category (i.e., COMSEC category 2) to generate an unencrypted hosted command.
It should be noted that the second communication security module 465 may include one or more modules. Further, the second communication security module 465 may include one or more processors.
The first communication security module 462 then transmits 470 the unencrypted host command to the payload (i.e., shared host/managed payload) 405. The second communication security module 465 transmits 475 the unencrypted hosted command to the payload (i.e., shared host/hosted payload) 405. The payload 405 is reconfigured according to the unencrypted host command and the unencrypted managed command. Payload antenna 480 then transmits the payload data (e.g., in one or more antenna beams 481) to host receive antenna 485 and managed receive antenna 490 on the ground.
Additionally, it should be noted that although in fig. 4, antenna beam 481 is shown as comprising a plurality of circular spot beams; in other embodiments, however, antenna beam 481 may include a greater or lesser number of beams than shown in fig. 4 (e.g., antenna beam 481 may include only a single beam), and antenna beam 481 may include a beam that is shaped differently than the shape of a circular spot beam as shown in fig. 4 (e.g., antenna beam 481 may include an elliptical beam and/or a variety of differently shaped beams).
It should be noted that in one or more embodiments, payload antenna 480 may include one or more reflector dishes including, but not limited to, parabolic reflectors and/or shaped reflectors. In some embodiments, payload antenna 480 may include one or more multi-feed antenna arrays.
The payload 405 transmits 491 the unencrypted host telemetry value (i.e., the unencrypted host TLM, which is telemetry data related to the portion of the payload 405 utilized by the host SOC 450) to the first communication security module 462. The first communication security module 462 then encrypts the non-encrypted host telemetry value using the first COMSEC category to generate an encrypted host telemetry value (i.e., encrypted host TLM).
The payload 405 transmits 492 to the second communication security module 465 an unencrypted hosted telemetry value (i.e., an unencrypted HoP TLM, which is telemetry data related to the portion of the payload 405 leased by the HOC 460). The second communication security module 465 then encrypts the unencrypted hosted telemetry value using the second COMSEC category to generate an encrypted hosted telemetry value (i.e., encrypted HoP TLM).
The first communication security module 462 then transmits 493 the encrypted host telemetry value to the host telemetry value transmitter 494. Host telemetry value transmitter 494 then transmits 495 the encrypted host telemetry value to host SOC 450. Telemetry value transmitter 494 transmits 495 the encrypted host telemetry value using an out-of-band frequency band. The host SOC 450 then decrypts the encrypted host telemetry value using the first COMSEC category to generate an unencrypted host telemetry value.
Second communication security module 465 then transmits 496 the encrypted hosted telemetry value to hosted telemetry value transmitter 498. The hosted telemetry transmitter 498 then transmits 497 the encrypted hosted telemetry to the host SOC 450. The telemetry transmitter 498 transmits 497 the encrypted hosted telemetry using an out-of-band frequency band. Host SOC 450 then transmits 499 the encrypted hosted telemetry value to HOC 460. HOC460 then decrypts the encrypted hosted telemetry value using the second COMSEC category to generate an unencrypted hosted telemetry value.
Fig. 5A, 5B, 5C, and 5D together illustrate a flow diagram of the disclosed method for protected multi-operator payload operation, wherein a host user transmits to a vehicle an encrypted host command (encrypted with a first COMSEC category) and an encrypted hosted command (encrypted with a second COMSEC category), and wherein a host telemetry value is encrypted using the first COMSEC category and a hosted telemetry value is encrypted using the second COMSEC category, in accordance with at least one embodiment of the present disclosure. At the start 500 of the method, a hosted payload (HoP) operations center (HOC) generates an encrypted hosted command 505 by encrypting an unencrypted hosted command with a second COMSEC category. The HOC then transmits the encrypted hosted command to a host Spacecraft Operations Center (SOC) 510. The host SOC encrypts the unencrypted host command by utilizing the first COMSEC class to produce encrypted host command 515. The host SOC then transmits the encrypted host commands and the encrypted hosted commands (out-of-band) to the vehicle 520.
The host command receiver on the vehicle then receives the encrypted host command 525. And, the hosted command receiver on the vehicle receives the encrypted hosted command 530. The host command receiver transmits the encrypted host command to the first communication security module 535. The hosted command receiver transmits the encrypted hosted command to the second communication security module 540. The first communications security module then decrypts the encrypted host command using the first COMSEC category to generate a non-encrypted host command 545. The second communications security module then decrypts the encrypted hosted command utilizing the second COMSEC category to generate unencrypted hosted command 550.
The first communications security module then transmits the unencrypted host command to the payload 555. The second communication security module then transmits the unencrypted hosted command to payload 560. The payload is then reconfigured according to the unencrypted host command and unencrypted managed command 565. The payload antenna on the vehicle then transmits the payload data to the host receive antenna and the hosted receive antenna 570.
The payload then transmits unencrypted host telemetry value 575 to the first communications security module. The first communications security module then encrypts the non-encrypted host telemetry value using the first COMSEC category to generate an encrypted host telemetry value 580. The first communication security module then transmits the encrypted host telemetry value to the host telemetry value transmitter 585. The host telemetry value transmitter then transmits the encrypted host telemetry value to the host SOC 590. The host SOC then decrypts the encrypted host telemetry value using the first COMSEC category to generate unencrypted host telemetry value 591.
The payload transmits the unencrypted hosted telemetry value 592 to the second communications security module. The second communication security module then encrypts the unencrypted hosted telemetry value using the second COMSEC category to generate encrypted hosted telemetry value 593. The second communication security module then transmits the encrypted hosted telemetry value to the hosted telemetry value transmitter 594. The hosted telemetry value transmitter then transmits the encrypted hosted telemetry value to the host SOC 595. The host SOC then transmits the encrypted hosted telemetry value to the HOC 596. The HOC then decrypts the encrypted hosted telemetry value using the second COMSEC category to generate unencrypted hosted telemetry value 597. The method then ends 598.
Fig. 6 is a diagram 600 illustrating the disclosed system for protected multi-operator payload operation, in accordance with at least one embodiment of the present disclosure, wherein a host user (i.e., host SOC)650 transmits an encrypted host command (encrypted using a first COMSEC category) to a vehicle and a hosted user (i.e., HOC)660 transmits an encrypted hosted command (encrypted using a second COMSEC category) to the vehicle, and wherein the host telemetry value is encrypted using the first COMSEC category and the hosted telemetry value is encrypted using the second COMSEC category. In this figure, a vehicle 610, a host SOC 650, and a HOC 660 are shown. The HOC 660 has leased at least a portion of the payload 605 (e.g., one or more virtual transponders) of the vehicle 610 from the owner of the satellite (i.e., host SOC) 650. It should be noted that in some embodiments, the HOC 660 may lease all of the payload 605 of the vehicle 610 from the owner of the satellite (i.e., the host SOC) 650. Further, it should be noted that in some embodiments, the HOC 660 may possess the payload 605 (e.g., steerable antenna) of the vehicle 610.
During operation, the HOC 660 encrypts the non-encrypted hosted command (i.e., non-encrypted HoP CMD) by utilizing the second COMSEC category to produce an encrypted hosted command (i.e., encrypted HoP CMD). The hosted commands are commands to configure the portion of the payload 605 (e.g., one or more virtual transponders) that the HOC 660 leases from the host SOC 650. The host SOC 650 encrypts the unencrypted host command (i.e., unencrypted host CMD) by utilizing the first COMSEC category to generate an encrypted host command (i.e., encrypted host CMD). The host commands are commands for configuring portions of the payload 605 (e.g., one or more transponders) that the host SOC 650 utilizes for itself.
It should be noted that although the host SOC 650 is described in fig. 6 as having its terrestrial antenna located in close proximity to its operating building, in other embodiments, the terrestrial antenna of the host SOC 650 may be located very far from its operating building (e.g., the terrestrial antenna may be located in another country outside of the operating building).
Additionally, it should be noted that the first COMSEC category may include at least one encryption key and/or at least one algorithm (e.g., a type 1 encryption algorithm or a type 2 encryption algorithm). Additionally, it should be noted that the second COMSEC category may include at least one encryption key and/or at least one encryption algorithm (e.g., a type 1 encryption algorithm or a type 2 encryption algorithm).
The host SOC 650 transmits 620 the encrypted host command to the vehicle 610. The host SOC 650 transmits 620 the encrypted host commands using an out-of-band frequency band (i.e., a frequency band different from the frequency band used to transmit the payload data).
The HOC 660 transmits 625 the encrypted hosted command to the vehicle 610. The HOC 660 utilizes the out-of-band frequency band to transmit 625 the encrypted hosted command.
A host command receiver 635 on the vehicle 610 receives the encrypted host commands. In addition, a hosted command receiver 645 on the vehicle 610 receives encrypted hosted commands.
The host command receiver 635 then transmits 652 the encrypted host command to the first communication security module 662. The first communication security module 662 decrypts the encrypted host command using a first COMSEC class (i.e., COMSEC class 1) to generate a non-encrypted host command.
It should be noted that the first communication security module 662 may include one or more modules. Further, the first communication security module 662 may include one or more processors.
The escrow command receiver 645 then transmits 655 the encrypted escrow command to the second communication security module 665. The second communication security module 665 decrypts the encrypted hosted command with a second COMSEC category (i.e., COMSEC category 2) to generate an unencrypted hosted command.
It should be noted that the second communication security module 665 can include one or more modules. Further, the second communication security module 665 can include one or more processors.
The first communication security module 662 then transmits 670 the unencrypted host command to the payload (i.e., shared host/managed payload) 605. The second communication security module 665 transmits 675 the unencrypted hosted command to the payload (i.e., shared host/hosted payload) 605. Payload 605 is reconfigured according to the unencrypted host command and the unencrypted managed command. Payload antenna 680 then transmits the payload data (e.g., in one or more antenna beams 681) to host receive antenna 685 and hosted receive antenna 690 on the ground.
Also, it should be noted that although in fig. 6, antenna beam 681 is shown as including a plurality of circular spot beams; in other embodiments, however, antenna beam 681 may include a greater or lesser number of beams than shown in fig. 6 (e.g., antenna beam 681 may include only a single beam), and antenna beam 681 may include a different shape of beam than the circular spot beam shown in fig. 6 (e.g., antenna beam 681 may include an elliptical beam and/or various differently shaped beams).
It should be noted that in one or more embodiments, payload antenna 680 may include one or more reflector dishes including, but not limited to, parabolic reflectors and/or shaped reflectors. In some embodiments, payload antenna 680 may include one or more multi-feed antenna arrays.
The payload 605 transmits 691 the unencrypted host telemetry value (i.e., the unencrypted host TLM, which is telemetry data related to the portion of the payload 605 utilized by the host SOC 650) to the first communication security module 662. The first communication security module 662 then encrypts the non-encrypted host telemetry value using the first COMSEC category to generate an encrypted host telemetry value (i.e., encrypted host TLM).
The payload 605 transmits 692 the unencrypted hosted telemetry value (i.e., the unencrypted HoP TLM, which is telemetry data related to the portion of the payload 605 leased by the HOC 660) to the second communication security module 665. The second communication security module 665 then encrypts the unencrypted hosted telemetry value using the second COMSEC category to generate an encrypted hosted telemetry value (i.e., an encrypted HoP TLM).
The first communications security module 662 then transmits 693 the encrypted host telemetry value to the host telemetry value transmitter 694. The host telemetry value transmitter 694 then transmits 695 the encrypted host telemetry value to the host SOC 650. Telemetry transmitter 694 uses an out-of-band to transmit 695 encrypted host telemetry values. The host SOC 650 then decrypts the encrypted host telemetry value using the first COMSEC category to generate an unencrypted host telemetry value.
The second communication security module 665 then transmits 696 the encrypted hosted telemetry value to the hosted telemetry value transmitter 698. The hosted telemetry value transmitter 698 then transmits 697 the encrypted hosted telemetry value to the HOC 660. Telemetry transmitter 698 utilizes an out-of-band frequency band to transmit 697 encrypted hosted telemetry. HOC 660 then decrypts the encrypted hosted telemetry value using a second COMSEC category to generate an unencrypted hosted telemetry value.
Fig. 7A, 7B, and 7C together illustrate a flow diagram of the disclosed method for protected multi-operator payload operation, wherein a host user transmits an encrypted host command (encrypted using a first COMSEC category) to a vehicle and a hosted user transmits an encrypted hosted command (encrypted using a second COMSEC category) to the vehicle, and wherein a host telemetry value is encrypted using the first COMSEC category and a hosted telemetry value is encrypted using the second COMSEC category, in accordance with at least one embodiment of the present disclosure. At the start 700 of the method, a hosted payload (HoP) operations center (HOC) generates an encrypted hosted command 705 by encrypting an unencrypted hosted command with a second COMSEC category. The HOC then transmits the encrypted hosted command (out-of-band) to the vehicle 710. A host Spacecraft Operations Center (SOC) encrypts the unencrypted host commands by utilizing a first COMSEC category to produce encrypted host commands 715. The host SOC then transmits the encrypted host commands (out-of-band) to the vehicle 720.
The host command receiver on the vehicle then receives the encrypted host command 725. And, the hosted command receiver on the vehicle receives the encrypted hosted command 730. The host command receiver transmits the encrypted host command to the first communication security module 735. The hosted command receiver transmits the encrypted hosted command to the second communication security module 740. The first communications security module then decrypts the encrypted host command using the first COMSEC category to generate an unencrypted host command 745. The second communications security module then decrypts the encrypted hosted command utilizing the second COMSEC category to generate an unencrypted hosted command 750.
The first communications security module then transmits the unencrypted host command to the payload 755. The second communication security module then transmits the unencrypted hosted command to payload 760. The payload is then reconfigured according to the unencrypted host command and the unencrypted hosted command 765. The payload antenna on the vehicle then transmits the payload data to the host receive antenna and the hosted receive antenna 770.
The payload then transmits the unencrypted host telemetry value 775 to the first communications security module. The first communications security module then encrypts the unencrypted host telemetry value using the first COMSEC category to generate encrypted host telemetry value 780. The first communications security module then transmits the encrypted host telemetry value to the host telemetry value transmitter 785. The host telemetry value transmitter then transmits the encrypted host telemetry value to the host SOC 790. The host SOC then decrypts the encrypted host telemetry value using the first COMSEC category to generate an unencrypted host telemetry value 791.
The payload transmits the unencrypted hosted telemetry value 792 to the second communications security module. The second communication security module then encrypts the unencrypted hosted telemetry value using the second COMSEC category to generate encrypted hosted telemetry value 793. The second communication security module then transmits the encrypted hosted telemetry value to the hosted telemetry value transmitter 794. The hosted telemetry value transmitter then transmits the encrypted hosted telemetry value to the HOC 795. The HOC then decrypts the encrypted hosted telemetry value using the second COMSEC category to generate unencrypted hosted telemetry value 796. The method then ends 797.
Fig. 8 is a diagram illustrating components of an example virtual transponder that may be employed by the disclosed system for protected multi-operator payload operation in accordance with at least one embodiment of the present disclosure. In this figure, various components are shown that may be configured according to an unencrypted host command (e.g., host channel 830) and an unencrypted hosted command (e.g., hosted channel 820).
In this figure, various components of uplink antenna 840, downlink antenna 850, and all-digital payload 860 are shown (including analog-to-digital (a/D) converter 865, digital channelizer 875, digital switch matrix 895, digital combiner 815, and analog-to-digital (D/a) converter 835), which may be configured according to non-encrypted host commands (e.g., host channel 830) and non-encrypted hosted commands (e.g., hosted channel 820). In addition, some other components of all-digital payload 860 (including uplink beamforming 870, demodulator 880, modulator 890, and downlink beamforming 825) may be optionally configured according to unencrypted host commands (e.g., host channel 830) and unencrypted hosted commands (e.g., hosted channel 820).
While particular embodiments have been illustrated and described, it should be understood that the above discussion is not intended to limit the scope of these embodiments. Although embodiments and variations of many aspects of the present disclosure have been disclosed and described herein, this disclosure is provided for purposes of illustration and description only. Accordingly, various changes and modifications may be made without departing from the scope of the claims.
Where the above methods indicate certain events occurring in a certain order, those of ordinary skill in the art having the benefit of this disclosure will recognize that modifications may be made to the ordering and such modifications are in accordance with the variations of this disclosure. Additionally, if possible, portions of the methods may be performed concurrently in a parallel process, or may be performed sequentially. Further, more or less parts of the method may be performed.
Accordingly, the embodiments are intended to illustrate alternatives, modifications, and equivalents, which may fall within the scope of the claims.
While certain illustrative embodiments and methods have been disclosed herein, it will be apparent to those skilled in the art from this disclosure that variations and modifications of such embodiments and methods may be made without departing from the true spirit and scope of the disclosed art. There are many other examples of the disclosed art, each differing from the others only in details. Accordingly, it is intended that the disclosed technology be limited only to the extent required by the appended claims and the rules and principles of applicable law.

Claims (23)

1. A method for protected multi-operator payload operation, the method comprising:
transmitting, by a hosted payload operations center, HOC, the encrypted hosted command to a host spacecraft operations center, SOC;
transmitting, by the host SOC, the encrypted host command and the encrypted hosted command to a vehicle,
wherein the encrypted host command is encrypted using a first communication security class, i.e., a first COMSEC class, and the encrypted hosted command is encrypted using a second COMSEC class;
decrypting, by a first communications security module on the vehicle, the encrypted host command with the first COMSEC species to generate an unencrypted host command;
decrypting, by a second communications security module on the vehicle, the encrypted hosted command with the second COMSEC species to generate an unencrypted hosted command;
reconfiguring a payload on the vehicle in accordance with the unencrypted host command and the unencrypted hosted command;
transmitting, by a payload antenna on the vehicle, payload data to a host receive antenna and a hosted receive antenna;
encrypting, by the first communication security module, the unencrypted host telemetry value and the unencrypted hosted telemetry value from the payload by utilizing the first COMSEC class to generate an encrypted host telemetry value and an encrypted hosted telemetry value;
transmitting, by a telemetry value transmitter on the vehicle, the encrypted host telemetry value and the encrypted hosted telemetry value to the host SOC; and
transmitting, by the host SOC, the encrypted hosted telemetry value to the HOC.
2. The method of claim 1, wherein reconfiguring the payload in accordance with the unencrypted host command and the unencrypted hosted command comprises adjusting at least one of: transponder power, transponder spectrum monitoring, transponder connectivity, transponder gain setting, transponder limiter setting, transponder automatic level control setting, transponder phase setting, internal gain generation, bandwidth of at least one beam, at least one frequency band of at least one of the at least one beam, transponder beamforming setting, effective isotropic radiated power, or EIRP, of at least one of the at least one beam, transponder channel, or beam steering.
3. The method of claim 1, wherein reconfiguring the payload in accordance with the unencrypted host command and the unencrypted hosted command comprises reconfiguring at least one of: at least one antenna, at least one analog-to-digital converter, at least one digital-to-analog converter, at least one beamformer, at least one digital channelizer, at least one demodulator, at least one modulator, at least one digital switching matrix, or at least one digital combiner.
4. The method of claim 1, wherein the vehicle is an air vehicle.
5. The method of claim 4, wherein the air vehicle is one of a satellite, an airplane, an Unmanned Aerial Vehicle (UAV), or a space plane.
6. The method of claim 1, wherein the method further comprises:
encrypting, by the HOC, the non-encrypted hosted command by utilizing the second COMSEC category to produce the encrypted hosted command; and
encrypting, by the host SOC, the non-encrypted host command by utilizing the first COMSEC class to generate the encrypted host command.
7. The method of claim 1, wherein the method further comprises:
receiving, by a host command receiver on the vehicle, the encrypted host command;
receiving, by a hosted command receiver on the vehicle, the encrypted hosted command;
transmitting, by the host command receiver, the encrypted host command to the first communication security module; and
transmitting, by the hosted command receiver, the encrypted hosted command to the second communication security module.
8. The method of claim 1, wherein the method further comprises:
transmitting, by the first communications security module, the unencrypted host command to the payload; and
transmitting, by the second communication security module, the unencrypted escrow command to the payload.
9. The method of claim 1, wherein the method further comprises transmitting, by the payload, the unencrypted host telemetry value and the unencrypted hosted telemetry value to the first communication security module.
10. The method of claim 1, wherein the method further comprises transmitting, by the first communication security module, the encrypted host telemetry value and the encrypted hosted telemetry value to the telemetry value transmitter.
11. The method of claim 1, wherein the method further comprises:
decrypting, by the host SOC, the encrypted host telemetry value using the first COMSEC class and using a database without hosted inverse transform information to generate the unencrypted host telemetry value; and
decrypting, by the HOC, the encrypted hosted telemetry value using the first COMSEC species and using a database without host inverse transform information to generate the unencrypted hosted telemetry value.
12. A method for protected multi-operator payload operation, the method comprising:
transmitting, by a managed payload operations center, i.e., HOC, the encrypted managed command to a host spacecraft operations center, i.e., SOC;
transmitting, by the host SOC, an encrypted host command and the encrypted hosted command to a vehicle, wherein the encrypted host command is encrypted with a first communication security class, i.e., a first COMSEC class, and the encrypted hosted command is encrypted with a second COMSEC class;
decrypting, by a first communications security module, the encrypted host command with the first COMSEC species to generate an unencrypted host command;
decrypting, by a second communications security module, the encrypted hosted command with the second COMSEC category to generate an unencrypted hosted command;
reconfiguring a payload from the unencrypted host command and the unencrypted escrow command;
transmitting, by a payload antenna on the vehicle, payload data to a host receive antenna and a hosted receive antenna;
encrypting, by the first communications security module, a non-encrypted host telemetry value using the first COMSEC species to generate an encrypted host telemetry value;
transmitting, by a host telemetry value transmitter, the encrypted host telemetry value to the host SOC;
encrypting, by the second communication security module, the unencrypted hosted telemetry value with the second COMSEC category to generate an encrypted hosted telemetry value;
transmitting, by a hosted telemetry value transmitter, the encrypted hosted telemetry value to the host SOC; and
transmitting, by the host SOC, the encrypted hosted telemetry value to the HOC.
13. The method of claim 12, wherein reconfiguring the payload in accordance with the unencrypted host command and the unencrypted hosted command comprises adjusting at least one of: transponder power, transponder spectrum monitoring, transponder connectivity, transponder gain setting, transponder limiter setting, transponder automatic level control setting, transponder phase setting, internal gain generation, bandwidth of at least one beam, at least one frequency band of at least one of the at least one beam, transponder beamforming setting, effective isotropic radiated power, or EIRP, of at least one of the at least one beam, transponder channel, or beam steering.
14. The method of claim 12, wherein reconfiguring the payload in accordance with the unencrypted host command and the unencrypted hosted command comprises reconfiguring at least one of: at least one antenna, at least one analog-to-digital converter, at least one digital-to-analog converter, at least one beamformer, at least one digital channelizer, at least one demodulator, at least one modulator, at least one digital switching matrix, or at least one digital combiner.
15. The method of claim 12, wherein the vehicle is an air vehicle.
16. The method of claim 15, wherein the air vehicle is one of a satellite, an airplane, an Unmanned Aerial Vehicle (UAV), or a space vehicle.
17. A method for protected multi-operator payload operation, the method comprising:
transmitting, by a managed payload operations center, or HOC, the encrypted managed command to the vehicle;
encrypted host commands are transmitted by a host spacecraft operations center or SOC to the vehicle,
wherein the encrypted host command is encrypted using a first communication security class, i.e., a first COMSEC class, and the encrypted hosted command is encrypted using a second COMSEC class;
decrypting, by a first communication security module on the vehicle, the encrypted host command with the first communication security class to generate an unencrypted host command;
decrypting, by a second communications security module on the vehicle, the encrypted hosted command with the second COMSEC species to generate an unencrypted hosted command;
reconfiguring a payload from the unencrypted host command and the unencrypted hosted command;
transmitting, by a payload antenna on the vehicle, payload data to a host receive antenna and a hosted receive antenna;
encrypting, by the first communications security module, a non-encrypted host telemetry value using the first COMSEC species to generate an encrypted host telemetry value;
transmitting, by a host telemetry value transmitter on the vehicle, the encrypted host telemetry value to the host SOC;
encrypting, by the second communication security module, the unencrypted hosted telemetry value with the second COMSEC category to generate an encrypted hosted telemetry value; and
transmitting, by a hosted telemetry value transmitter, the encrypted hosted telemetry value to the HOC.
18. The method of claim 17, wherein reconfiguring the payload in accordance with the unencrypted host command and the unencrypted hosted command comprises adjusting at least one of: transponder power, transponder spectrum monitoring, transponder connectivity, transponder gain setting, transponder limiter setting, transponder automatic level control setting, transponder phase setting, internal gain generation, bandwidth of at least one beam, at least one frequency band of at least one of the at least one beam, transponder beamforming setting, effective isotropic radiated power, or EIRP, of at least one of the at least one beam, transponder channel, or beam steering.
19. The method of claim 17, wherein reconfiguring the payload in accordance with the unencrypted host command and the unencrypted hosted command comprises reconfiguring at least one of: at least one antenna, at least one analog-to-digital converter, at least one digital-to-analog converter, at least one beamformer, at least one digital channelizer, at least one demodulator, at least one modulator, at least one digital switching matrix, or at least one digital combiner.
20. The method of claim 17, wherein the vehicle is an air vehicle, and
wherein the air vehicle is one of a satellite, an aircraft, an Unmanned Aerial Vehicle (UAV), or a space vehicle.
21. A system for protected multi-operator payload operation, the system comprising:
a hosted payload operations center (HOC) to transmit encrypted hosted commands to a host Spacecraft Operations Center (SOC);
the host SOC to transmit the encrypted host commands and the encrypted hosted commands to the vehicle,
wherein the encrypted host command is encrypted using a first communication security class, i.e., a first COMSEC class, and the encrypted hosted command is encrypted using a second COMSEC class;
a first communication security module on the vehicle to decrypt the encrypted host command with the first COMSEC species to generate an unencrypted host command;
a second communications security module on the vehicle to decrypt the encrypted hosted command utilizing the second COMSEC category to generate an unencrypted hosted command;
a payload on the vehicle that is reconfigured according to the unencrypted host command and the unencrypted hosted command;
a payload antenna on the vehicle that transmits payload data to a host receive antenna and a hosted receive antenna;
the first communication security module to encrypt an unencrypted host telemetry value and an unencrypted hosted telemetry value from the payload by utilizing the first COMSEC class to generate an encrypted host telemetry value and an encrypted hosted telemetry value;
a telemetry value transmitter on the vehicle to transmit the encrypted host telemetry value and the encrypted hosted telemetry value to the host SOC; and
the host SOC to transmit the encrypted hosted telemetry value to the HOC.
22. A system for protected multi-operator payload operation, the system comprising:
a hosted payload operations center (HOC) to transmit encrypted hosted commands to a host Spacecraft Operations Center (SOC);
the host SOC to transmit the encrypted host commands and the encrypted hosted commands to the vehicle,
wherein the encrypted host command is encrypted using a first communication security class, i.e., a first COMSEC class, and the encrypted hosted command is encrypted using a second COMSEC class;
a first communication security module to decrypt the encrypted host command with the first COMSEC class to generate an unencrypted host command;
a second communication security module to decrypt the encrypted hosted command utilizing the second COMSEC category to generate the unencrypted hosted command;
a payload that is reconfigured according to the unencrypted host command and the unencrypted hosted command;
a payload antenna on the vehicle that transmits payload data to a host receive antenna and a managed receive antenna;
the first communication security module to encrypt a non-encrypted host telemetry value with the first COMSEC category to generate an encrypted host telemetry value;
a host telemetry value transmitter for transmitting the encrypted host telemetry value to the host SOC;
the second communication security module to encrypt non-encrypted hosted telemetry values with the second COMSEC category to generate encrypted hosted telemetry values;
a hosted telemetry value transmitter to transmit the encrypted hosted telemetry value to the host SOC; and
the host SOC to transmit the encrypted hosted telemetry value to the HOC.
23. A system for protected multi-operator payload operation, the system comprising:
a hosted payload operations center (HOC) that transmits encrypted hosted commands to the vehicle;
a host spacecraft operations center, or SOC, for transmitting encrypted host commands to the vehicle,
wherein the encrypted host command is encrypted using a first communication security class, i.e., a first COMSEC class, and the encrypted hosted command is encrypted using a second COMSEC class;
a first communication security module on the vehicle to decrypt the encrypted host command using the first communication security class to generate an unencrypted host command;
a second communications security module on the vehicle to decrypt the encrypted hosted command utilizing the second COMSEC category to generate an unencrypted hosted command;
a payload that is reconfigured according to the unencrypted host command and the unencrypted hosted command;
a payload antenna on the vehicle that transmits payload data to a host receive antenna and a hosted receive antenna;
the first communication security module to encrypt a non-encrypted host telemetry value with the first COMSEC category to generate an encrypted host telemetry value;
a host telemetry value transmitter on the vehicle for transmitting the encrypted host telemetry value to the host SOC;
the second communication security module to encrypt non-encrypted hosted telemetry values with the second COMSEC category to generate encrypted hosted telemetry values; and
a hosted telemetry value transmitter for transmitting the encrypted hosted telemetry value to the HOC.
CN201880094837.3A 2018-05-04 2018-05-04 Protected multi-operator payload operation Active CN112313917B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2018/031222 WO2019212573A1 (en) 2018-05-04 2018-05-04 Protected multi-operators payload operations

Publications (2)

Publication Number Publication Date
CN112313917A true CN112313917A (en) 2021-02-02
CN112313917B CN112313917B (en) 2023-06-27

Family

ID=62495857

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880094837.3A Active CN112313917B (en) 2018-05-04 2018-05-04 Protected multi-operator payload operation

Country Status (6)

Country Link
EP (1) EP3788754A1 (en)
JP (1) JP7122062B2 (en)
CN (1) CN112313917B (en)
AU (1) AU2018421734B2 (en)
CA (1) CA3096587A1 (en)
WO (1) WO2019212573A1 (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1768495A (en) * 2003-01-28 2006-05-03 波音公司 Systems and methods for digital processing of satellite communications data
US20090008503A1 (en) * 2007-07-06 2009-01-08 The Boeing Company Single-wire telemetry and command
CN102932261A (en) * 2012-11-20 2013-02-13 航天东方红卫星有限公司 Management system for payload information of satellite based on intelligent high-speed router
US20130077788A1 (en) * 2011-09-23 2013-03-28 The Boeing Company Selective Downlink Data Encryption System for Satellites
US20130077561A1 (en) * 2011-09-23 2013-03-28 The Boeing Company Multi-Operator System for Accessing Satellite Resources
CN105245364A (en) * 2015-09-29 2016-01-13 中国运载火箭技术研究院 Satellite payload task management system
CN105978664A (en) * 2016-06-24 2016-09-28 中国科学院国家空间科学中心 Efficient superspeed effective load data transmission system for remote sensing satellite

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8160575B2 (en) * 2001-07-23 2012-04-17 Space Systems/Loral, Inc. Methods for testing multibeam satellite systems using input power telemetry and output noise power
US7751779B2 (en) * 2006-12-21 2010-07-06 Northrop Grumman Space & Mission Systems Corp. Satellite communication system
US8355359B2 (en) 2008-08-04 2013-01-15 Orbital Sciences Corporation Secondary payload interface
US9042295B1 (en) 2012-03-01 2015-05-26 The Boeing Company Transponded anti-jam satellite communications

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1768495A (en) * 2003-01-28 2006-05-03 波音公司 Systems and methods for digital processing of satellite communications data
US20090008503A1 (en) * 2007-07-06 2009-01-08 The Boeing Company Single-wire telemetry and command
US20130077788A1 (en) * 2011-09-23 2013-03-28 The Boeing Company Selective Downlink Data Encryption System for Satellites
US20130077561A1 (en) * 2011-09-23 2013-03-28 The Boeing Company Multi-Operator System for Accessing Satellite Resources
CN102932261A (en) * 2012-11-20 2013-02-13 航天东方红卫星有限公司 Management system for payload information of satellite based on intelligent high-speed router
CN105245364A (en) * 2015-09-29 2016-01-13 中国运载火箭技术研究院 Satellite payload task management system
CN105978664A (en) * 2016-06-24 2016-09-28 中国科学院国家空间科学中心 Efficient superspeed effective load data transmission system for remote sensing satellite

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
SWADHIN THAKKAR: "Video steganography using encrypted payload for satellite communication", 《2017 IEEE AEROSPACE CONFERENCE》 *
孙红波等: "密码技术在卫星测控中的应用", 《无线电工程》 *
曾巍等: "一种有效载荷地面测试***星地时间的同步方法", 《航天器工程》 *

Also Published As

Publication number Publication date
AU2018421734A1 (en) 2020-11-12
EP3788754A1 (en) 2021-03-10
WO2019212573A1 (en) 2019-11-07
JP2021530882A (en) 2021-11-11
JP7122062B2 (en) 2022-08-19
CN112313917B (en) 2023-06-27
CA3096587A1 (en) 2019-11-07
AU2018421734B2 (en) 2024-03-14

Similar Documents

Publication Publication Date Title
US11595360B2 (en) Hosted payload operations with private telemetry and command
US11388151B2 (en) Protected multi-operators payload operations with private telemetry and command
US11290176B2 (en) Facilitating satellite operations with secure enclave for hosted payload operations
US11201707B2 (en) Secured independent hosted payload operations
CN109600161B (en) Secure independent managed payload operation
EP3468066B1 (en) Commercial satellite operations with secure enclave for payload operations
CN112425092B (en) Managed payload operation
CN112313917B (en) Protected multi-operator payload operation
NZ746846B2 (en) Secured independent hosted payload operations

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant