Hosted payload operations with private telemetry and command

ABSTRACT

A method for hosted payload operations comprises transmitting, by a hosted payload (HoP) operation center (HOC), encrypted hosted commands to a host spacecraft operations center (SOC). The method further comprises transmitting, by the host SOC, encrypted host commands and the encrypted hosted commands to a vehicle. Also, the method comprises reconfiguring a host payload according to unencrypted host commands, and reconfiguring a hosted payload according to unencrypted hosted commands. Additionally, the method comprises transmitting host payload data to a host receiving antenna. Also, the method comprises transmitting hosted payload data to a hosted receiving antenna and/or the host receiving antenna. Additionally, the method comprises transmitting, by a host telemetry transmitter, encrypted host telemetry to the host SOC; and transmitting, by a hosted telemetry transmitter, encrypted hosted telemetry to the host SOC. Further, the method comprises transmitting, by the host SOC, the encrypted hosted telemetry to the HOC.

CROSS REFERENCE TO RELATED APPLICATION

This application is a Divisional application of, and claims the benefitof, U.S. patent application Ser. No. 15/451,205, filed Mar. 6, 2017,which is hereby incorporated by reference in its entirety.

FIELD

The present disclosure relates to payload operations. In particular, itrelates to hosted payload operations.

BACKGROUND

Currently, typical payload operations for a vehicle (e.g., a satellite)have the ability to perform switching of inputs to outputs of thepayload on the vehicle. All of this switching on the payload iscommanded and controlled by a single satellite controller with noresource allocation privacy.

As such, there is a need for an improved payload operations design thatallows for privacy in the allocation of resources on the payload.

SUMMARY

The present disclosure relates to a method, system, and apparatus forhosted payload operations. In one or more embodiments, a method forhosted payload operations comprises transmitting, by a hosted payload(HoP) operation center (HOC), encrypted hosted commands to a hostspacecraft operations center (SOC). Also, the method comprisestransmitting, by the host SOC, encrypted host commands and the encryptedhosted commands to a vehicle. In one or more embodiments, the encryptedhost commands are encrypted utilizing a first communication security(COMSEC) variety and the encrypted hosted commands are encryptedutilizing a second COMSEC variety. In addition, the method comprisesdecrypting, by a first communication security module on the vehicle, theencrypted host commands utilizing the first COMSEC variety to generateunencrypted host commands. Additionally, the method comprisesdecrypting, by a second communication security module on the vehicle,the encrypted hosted commands utilizing the second COMSEC variety togenerate unencrypted hosted commands. Also, the method comprisesreconfiguring a host payload on the vehicle according to the unencryptedhost commands. Additionally, the method comprises reconfiguring a hostedpayload on the vehicle according to the unencrypted hosted commands. Inaddition, the method comprises transmitting, by a host payload antennaon the vehicle, host payload data to a host receiving antenna. Also, themethod comprises transmitting, by a hosted payload antenna on thevehicle, hosted payload data to a hosted receiving antenna and/or thehost receiving antenna. Additionally, the method comprises encrypting,by the first communication security module, unencrypted host telemetryfrom the host payload and unencrypted hosted telemetry from the hostedpayload by utilizing the first COMSEC variety to generate encrypted hosttelemetry and encrypted hosted telemetry. Also, the method comprisestransmitting, by a telemetry transmitter on the vehicle, the encryptedhost telemetry and the encrypted hosted telemetry to the host SOC.Further, the method comprises transmitting, by the host SOC, theencrypted hosted telemetry to the HOC.

In at least one embodiment, the reconfiguring of the host payloadaccording to the unencrypted host commands and the reconfiguring of thehosted payload according to the unencrypted hosted commands comprisesadjusting transponder power, transponder spectrum monitoring,transponder connectivity, transponder gain settings, transponder limitersettings, transponder automatic level control settings, transponderphase settings, internal gain generation, bandwidth for at least onebeam, at least one frequency band for at least one beam, transponderbeamforming settings, effective isotropic radiation power (EIRP) for atleast one beam, transponder channels, and/or beam steering.

In one or more embodiments, the reconfiguring of the host payloadaccording to the unencrypted host commands and the reconfiguring of thehosted payload according to the unencrypted hosted commands comprisesreconfiguring at least one antenna, at least one analog-to-digitalconverter, at least one digital-to-analog converter, at least onebeamformer, at least one digital channelizer, at least one demodulator,at least one modulator, at least one digital switch matrix, and/or atleast one digital combiner.

In at least one embodiment, the vehicle is an airborne vehicle. In oneor more embodiments, the airborne vehicle is a satellite, aircraft,unmanned aerial vehicle (UAV), or space plane.

In one or more embodiments, the method further comprises encrypting, bythe HOC, the unencrypted hosted commands by utilizing the second COMSECvariety to produce the encrypted hosted commands. Further, the methodcomprises encrypting, by the host SOC, the unencrypted host commands byutilizing the first COMSEC variety to produce the encrypted hostcommands.

In at least one embodiment, the method further comprises receiving, by ahost command receiver on the vehicle, the encrypted host commands. Also,the method comprises receiving, by a hosted command receiver on thevehicle, the encrypted hosted commands. In addition, the methodcomprises transmitting, by the host command receiver, the encrypted hostcommands to the first communication security module. Further, the methodcomprises transmitting, by the hosted command receiver, the encryptedhosted commands to the second communication security module.

In one or more embodiments, the method further comprises transmitting,by the first communication security module, the unencrypted hostcommands to the host payload. Also, the method comprises transmitting,by the second communication security module, the unencrypted hostedcommands to the hosted payload.

In at least one embodiment, the method further comprises transmitting,by the host payload, to the first communication security module theunencrypted host telemetry. In some embodiments, the method furthercomprises transmitting, by the hosted payload, to the firstcommunication security module the unencrypted hosted telemetry.

In one or more embodiments, the method further comprises transmitting,by the first communication security module, the encrypted host telemetryand the encrypted hosted telemetry to the telemetry transmitter.

In at least one embodiment, the method further comprises decrypting, bythe host SOC, the encrypted host telemetry utilizing the first COMSECvariety and utilizing a database without hosted decommutated informationto generate the unencrypted host telemetry. Also, the method comprisesdecrypting, by the HOC, the encrypted hosted telemetry utilizing thefirst COMSEC variety and utilizing a database without host decommutatedinformation to generate the unencrypted hosted telemetry.

In one or more embodiments, a method for hosted payload operationscomprises transmitting, by the HOC, the encrypted hosted commands to ahost spacecraft operations center (SOC). The method further comprisestransmitting, by the host SOC, the encrypted host commands and theencrypted hosted commands to a vehicle. Also, the method comprisesdecrypting, by the first communication security module, the encryptedhost commands utilizing the first COMSEC variety to generate theunencrypted host commands. In addition, the method comprises decrypting,by the second communication security module, the encrypted hostedcommands utilizing the second COMSEC variety to generate the unencryptedhosted commands. Additionally, the method comprises reconfiguring thehost payload according to the unencrypted host commands. Also, themethod comprises reconfiguring the hosted payload according to theunencrypted hosted commands. Also, the method comprises transmitting, bya host payload antenna on the vehicle, host payload data to a hostreceiving antenna. Additionally, the method comprises transmitting, by ahosted payload antenna on the vehicle, hosted payload data to a hostedreceiving antenna and/or the host receiving antenna. In addition, themethod comprises encrypting, by the first communication security module,unencrypted host telemetry utilizing the first COMSEC variety togenerate encrypted host telemetry. Additionally, the method comprisestransmitting, by the host telemetry transmitter, the encrypted hosttelemetry to the host SOC. Also, the method comprises encrypting, by thesecond communication security module, unencrypted hosted telemetryutilizing the second COMSEC variety to generate encrypted hostedtelemetry. In addition, the method comprises transmitting, by the hostedtelemetry transmitter, the encrypted hosted telemetry to the host SOC.Further, the method comprises transmitting, by the host SOC, theencrypted hosted telemetry to the HOC.

In at least one embodiment, a method for hosted payload operationscomprises transmitting, by a hosted payload (HoP) operation center(HOC), encrypted hosted commands to a vehicle. The method furthercomprises transmitting, by the host SOC, encrypted host commands to thevehicle. Also, the method comprises decrypting, by a first communicationsecurity module on the vehicle, the encrypted host commands utilizing afirst COMSEC variety to generate unencrypted host commands. In addition,the method comprises decrypting, by a second communication securitymodule on the vehicle, the encrypted hosted commands utilizing a secondCOMSEC variety to generate unencrypted hosted commands. Additionally,the method comprises reconfiguring a host payload according to theunencrypted host commands. In addition, the method comprisesreconfiguring a hosted payload according to the unencrypted hostedcommands. Also, the method comprises transmitting, by a host payloadantenna on the vehicle, host payload data to a host receiving antenna.Additionally, the method comprises transmitting, by a hosted payloadantenna on the vehicle, hosted payload data to a hosted receivingantenna and/or the host receiving antenna. In addition, the methodcomprises encrypting, by the first communication security module,unencrypted host telemetry utilizing the first COMSEC variety togenerate encrypted host telemetry. Additionally, the method comprisestransmitting, by a host telemetry transmitter on the vehicle, theencrypted host telemetry to the host SOC. Also, the method comprisesencrypting, by the second communication security module, unencryptedhosted telemetry utilizing the second COMSEC variety to generateencrypted hosted telemetry. Further, the method comprises transmitting,by the hosted telemetry transmitter, the encrypted hosted telemetry tothe HOC.

In one or more embodiments, a system for hosted payload operationscomprises a hosted payload (HoP) operation center (HOC) to transmitencrypted hosted commands to a host spacecraft operations center (SOC).The system further comprises the host SOC to transmit encrypted hostcommands and the encrypted hosted commands to a vehicle. In one or moreembodiments, the encrypted host commands are encrypted utilizing a firstcommunication security (COMSEC) variety and the encrypted hostedcommands are encrypted utilizing a second COMSEC variety. Also, thesystem comprises a first communication security module on the vehicle todecrypt the encrypted host commands utilizing the first COMSEC varietyto generate unencrypted host commands. In addition, the system comprisesa second communication security module on the vehicle to decrypt theencrypted hosted commands utilizing the second COMSEC variety togenerate unencrypted hosted commands. Additionally, the system comprisesa host payload on the vehicle reconfigured according to the unencryptedhost commands. Also, the system comprises a hosted payload on thevehicle reconfigured according to the unencrypted hosted commands. Inaddition, the system comprises a host payload antenna on the vehicle totransmit host payload data to a host receiving antenna. Additionally,the system comprises a hosted payload antenna on the vehicle to transmithosted payload data to a hosted receiving antenna and/or the hostreceiving antenna. Also, the system comprises the first communicationsecurity module to encrypt unencrypted host telemetry from the hostpayload and the unencrypted hosted telemetry from the hosted payload byutilizing the first COMSEC variety to generate encrypted host telemetryand encrypted hosted telemetry. In addition, the system comprises atelemetry transmitter on the vehicle to transmit the encrypted hosttelemetry and the encrypted hosted telemetry to the host SOC. Further,the system comprises the host SOC to transmit the encrypted hostedtelemetry to the HOC.

In at least one embodiment, a system for hosted payload operationscomprises a hosted payload (HoP) operation center (HOC) to transmitencrypted hosted commands to a host spacecraft operations center (SOC).The system further comprises the host SOC to transmit encrypted hostcommands and the encrypted hosted commands to a vehicle. In one or moreembodiments, the encrypted host commands are encrypted utilizing a firstcommunication security (COMSEC) variety, and the encrypted hostedcommands are encrypted utilizing a second COMSEC variety. Also, thesystem comprises a first communication security module to decrypt theencrypted host commands utilizing the first COMSEC variety to generateunencrypted host commands. In addition, the system comprises a secondcommunication security module to decrypt the encrypted hosted commandsutilizing the second COMSEC variety to generate the unencrypted hostedcommands. Additionally, the system comprises a host payload reconfiguredaccording to the unencrypted host commands. Also, the system comprises ahosted payload reconfigured according to the unencrypted hostedcommands. In addition, the system comprises a host payload antenna onthe vehicle to transmit host payload data to a host receiving antenna.Also, the system comprises a hosted payload antenna on the vehicle totransmit hosted payload data to a hosted receiving antenna and/or thehost receiving antenna. In addition, the system comprises the firstcommunication security module to encrypt unencrypted host telemetryutilizing the first COMSEC variety to generate encrypted host telemetry.Also, the system comprises the host telemetry transmitter to transmitthe encrypted host telemetry to the host SOC. In addition, the systemcomprises the second communication security module to encryptunencrypted hosted telemetry utilizing the second COMSEC variety togenerate encrypted hosted telemetry. Also, the system comprises a hostedtelemetry transmitter to transmit the encrypted hosted telemetry to thehost SOC. Further, the system comprises the host SOC to transmit theencrypted hosted telemetry to the HOC.

In at least one embodiment, a system for hosted payload operationscomprises a hosted payload (HoP) operation center (HOC) to transmitencrypted hosted commands to a vehicle. The system further comprises thehost SOC to transmit encrypted host commands to the vehicle. In one ormore embodiments, the encrypted host commands are encrypted utilizing afirst communication security (COMSEC) variety, and the encrypted hostedcommands are encrypted utilizing a second COMSEC variety. Also, thesystem comprises a first communication security module on the vehicle todecrypt the encrypted host commands utilizing the first communicationsecurity (COMSEC) variety to generate unencrypted host commands. Inaddition, the system comprises a second communication security module onthe vehicle to decrypt the encrypted hosted commands utilizing thesecond COMSEC variety to generate unencrypted hosted commands.Additionally, the system comprises a host payload reconfigured accordingto the unencrypted host commands. Also, the system comprises a hostedpayload reconfigured according to the unencrypted hosted commands. Inaddition, the system comprises a host payload antenna on the vehicle totransmit host payload data to a host receiving antenna. Additionally,the system comprises a hosted payload antenna on the vehicle to transmithosted payload data to a hosted receiving antenna and/or the hostreceiving antenna. Also, the system comprises the first communicationsecurity module to encrypt unencrypted host telemetry utilizing thefirst COMSEC variety to generate encrypted host telemetry. In addition,the system comprises a host telemetry transmitter on the vehicle totransmit the encrypted host telemetry to the host SOC. Also, the systemcomprises the second communication security module to encryptunencrypted hosted telemetry utilizing the second COMSEC variety togenerate encrypted hosted telemetry. Further, the system comprises thehosted telemetry transmitter to transmit the encrypted hosted telemetryto the HOC.

The features, functions, and advantages can be achieved independently invarious embodiments of the present disclosure or may be combined in yetother embodiments.

DRAWINGS

These and other features, aspects, and advantages of the presentdisclosure will become better understood with regard to the followingdescription, appended claims, and accompanying drawings where:

FIG. 1 is a diagram showing simplified architecture for the disclosedsystem for hosted payload operations, in accordance with at least oneembodiment of the present disclosure.

FIG. 2 is a diagram showing the disclosed system for hosted payloadoperations where the host user transmits encrypted host commands(encrypted utilizing a first COMSEC variety) and encrypted hostedcommands (encrypted utilizing the second COMSEC variety) to a vehicle,and where the host telemetry and the hosted telemetry are both encryptedusing the first COMSEC variety, in accordance with at least oneembodiment of the present disclosure.

FIGS. 3A, 3B, and 3C together show a flow chart for the disclosed methodfor hosted payload operations where the host user transmits encryptedhost commands (encrypted utilizing a first COMSEC variety) and encryptedhosted commands (encrypted utilizing the second COMSEC variety) to avehicle, and where the host telemetry and the hosted telemetry are bothencrypted using the first COMSEC variety, in accordance with at leastone embodiment of the present disclosure.

FIG. 4 is a diagram showing the disclosed system for hosted payloadoperations where the host user transmits encrypted host commands(encrypted utilizing a first COMSEC variety) and encrypted hostedcommands (encrypted utilizing a second COMSEC variety) to a vehicle, andwhere the host telemetry is encrypted using the first COMSEC variety andthe hosted telemetry is encrypted using the second COMSEC variety, inaccordance with at least one embodiment of the present disclosure.

FIGS. 5A, 5B, 5C, and 5D together show a flow chart for the disclosedmethod for hosted payload operations where the host user transmitsencrypted host commands (encrypted utilizing a first COMSEC variety) andencrypted hosted commands (encrypted utilizing a second COMSEC variety)to a vehicle, and where the host telemetry is encrypted using the firstCOMSEC variety and the hosted telemetry is encrypted using the secondCOMSEC variety, in accordance with at least one embodiment of thepresent disclosure.

FIG. 6 is a diagram showing the disclosed system for hosted payloadoperations where the host user transmits encrypted host commands(encrypted utilizing a first COMSEC variety) to a vehicle and the hosteduser transmits encrypted hosted commands (encrypted utilizing a secondCOMSEC variety) to the vehicle, and where the host telemetry isencrypted using the first COMSEC variety and the hosted telemetry isencrypted using the second COMSEC variety, in accordance with at leastone embodiment of the present disclosure.

FIGS. 7A, 7B, and 7C together show a flow chart for the disclosed methodfor hosted payload operations where the host user transmits encryptedhost commands (encrypted utilizing a first COMSEC variety) to a vehicleand the hosted user transmits encrypted hosted commands (encryptedutilizing a second COMSEC variety) to the vehicle, and where the hosttelemetry is encrypted using the first COMSEC variety and the hostedtelemetry is encrypted using the second COMSEC variety, in accordancewith at least one embodiment of the present disclosure.

DESCRIPTION

The methods and apparatus disclosed herein provide an operative systemfor hosted payload operations. The system of the present disclosureallows for vehicle operators to privately share vehicle resources.

As previously mentioned above, currently, typical payload operations fora vehicle (e.g., a satellite) have the ability to perform switching ofinputs to outputs of the payload on the vehicle. All of this switchingon the payload is commanded and controlled by a single satellitecontroller with no resource allocation privacy.

The disclosed system allows for private vehicle resource allocation andcontrol that provides vehicle users the ability to privately,dynamically, allocate resources (e.g., a host payload and/or a hostedpayload) on demand.

It should be noted that the host payload and/or the hosted payload forthe disclosed system for private vehicle resource allocation and controlmay employ various different types of transponders. For example, variousdifferent types of transponders may be employed including, but notlimited to, various different types of digital transponders, variousdifferent types of analog transponders (e.g., conventional repeater-typetransponders), and various different types of combination analog/digitaltransponders.

It should be noted that in this disclosure, inband frequency band(s)refer to a frequency band(s) that is the same frequency band(s) utilizedto transmit payload data (e.g., host payload data and/or hosted payloaddata); and out-of-band frequency band(s) refer to a frequency band(s)that is not the same frequency band(s) utilized to transmit payload data(e.g., host payload data and/or hosted payload data).

In the following description, numerous details are set forth in order toprovide a more thorough description of the system. It will be apparent,however, to one skilled in the art, that the disclosed system may bepracticed without these specific details. In the other instances, wellknown features have not been described in detail so as not tounnecessarily obscure the system.

Embodiments of the present disclosure may be described herein in termsof functional and/or logical components and various processing steps. Itshould be appreciated that such components may be realized by any numberof hardware, software, and/or firmware components configured to performthe specified functions. For example, an embodiment of the presentdisclosure may employ various integrated circuit components (e.g.,memory elements, digital signal processing elements, logic elements,look-up tables, or the like), which may carry out a variety of functionsunder the control of one or more processors, microprocessors, or othercontrol devices. In addition, those skilled in the art will appreciatethat embodiments of the present disclosure may be practiced inconjunction with other components, and that the system described hereinis merely one example embodiment of the present disclosure.

For the sake of brevity, conventional techniques and components relatedto satellite communication systems, and other functional aspects of thesystem (and the individual operating components of the systems) may notbe described in detail herein. Furthermore, the connecting lines shownin the various figures contained herein are intended to representexample functional relationships and/or physical couplings between thevarious elements. It should be noted that many alternative or additionalfunctional relationships or physical connections may be present in anembodiment of the present disclosure.

FIG. 1 is a diagram 100 showing simplified architecture for thedisclosed system for hosted payload operations, in accordance with atleast one embodiment of the present disclosure. In this figure, asimplified view of multiple possible hosted payload configurations isillustrated. In particular, this figure shows a space segment 110 and aground segment 120. The space segment 110 represents a vehicle. Variousdifferent types of vehicles may be employed for the vehicle including,but not limited to, an airborne vehicle. And, various different types ofairborne vehicles may be employed for the vehicle including, but notlimited to, a satellite, an aircraft, an unmanned aerial vehicle (UAV),and a space plane.

In the case of a satellite being employed for the vehicle, it should benoted that satellites typically include computer-controlled systems. Asatellite generally includes a bus 130 and a payload (e.g., a hostpayload and a hosted payload(s)) 140. The bus 130 may include systems(which include components) that control the satellite. These systemsperform tasks, such as power generation and control, thermal control,telemetry, attitude control, orbit control, and other suitableoperations.

The payload 140 of the satellite provides functions to users of thesatellite. The payload 140 may include antennas, transponders, and othersuitable devices. For example, with respect to communications, thepayload 140 in a satellite may be used to provide Internet access,telephone communications, radio, television, and other types ofcommunications. It should be noted that, in one or more embodiments, thepayload 140 comprises multiple separate payloads, which are a hostpayload and a hosted payload(s).

The payload 140 of the satellite may be used by different entities. Forexample, the payload 140 may be used by the host user, the hosteduser(s), other customers, or some combination thereof.

For example, the host user may lease different portions of the payload(e.g., the hosted payload(s)) 140 to different customers (e.g., a hosteduser(s)). In one example, one group of antenna beams generated by thepayload (e.g., hosted payload(s)) 140 of the satellite may be leased toone customer, while a second group of antenna beams may be leased to asecond customer. In another example, one group of antenna beamsgenerated by the payload (e.g. the host payload) 140 of the satellitemay be utilized by the host user of the satellite, while a second groupof antenna beams generated by the payload (e.g. by the hosted payload)140 may be leased to a customer (e.g., a hosted user). In yet anotherexample, some or all of the antenna beams generated by the payload (e.g.by the hosted payload(s)) 140 of the satellite may be shared by onecustomer and a second customer. When satellites are shared by differentusers, users may have a shared communications link (e.g., Interface A)to the satellite, or each user may have a separate communications link(e.g., Interfaces A and D) to the satellite.

Leasing a satellite to multiple customers (e.g., hosted users) mayincrease the revenues that a user (e.g., the host user) of a satellitecan obtain. Further, a customer may use a subset of the total resourcesin a satellite for a cost that is less than the cost for the customer topurchase and operate a satellite, to build and operate a satellite, orto lease an entire satellite.

Referring back to FIG. 1 , the ground segment 120 comprises a hostspacecraft operations center (SOC) (e.g., a ground station associatedwith control of the host payload of the satellite) 150, and a hostedpayload (HoP) operation center(s) (HOC(s)) (e.g., a ground station(s)associated with control of the hosted payload of the satellite) 160.

FIG. 1 shows a number of different possible communication links (i.e.Interfaces A-E). It should be noted that the disclosed system may employsome or all of these illustrated communication links. Interface A, whichmay comprise multiple links, is an out-of-band command and telemetrylink from the host SOC 150 to command the satellite. Interface B, whichmay comprise multiple links, is a communication link, between the bus130 and the payload 140. Interface B may be used to control essentialitems, such as power. Information that may be communicated from the bus130 to the payload 140 via Interface B may include, but is not limitedto, time, ephemeris, and payload commands. Information that may becommunicated from the payload 140 to the bus 130 via Interface B mayinclude, but is not limited to, payload telemetry.

Interface C, which may comprise multiple links, is an inband command andtelemetry link for bus and/or payload. Interface D, which may comprisemultiple links, is a command and telemetry link from the HOC(s) 160 tocommand the satellite. Interface E, which may comprise multiple links,between the host SOC 150 and the HOCs 160.

FIG. 2 is a diagram 200 showing the disclosed system for hosted payloadoperations where the host user (i.e. the host SOC) 250 transmitsencrypted host commands (encrypted utilizing a first COMSEC variety) andencrypted hosted commands (encrypted utilizing the second COMSECvariety) to a vehicle, and where the host telemetry and the hostedtelemetry are both encrypted using the first COMSEC variety, inaccordance with at least one embodiment of the present disclosure. Inthis figure, a vehicle 210, a host SOC 250, and a HOC 260 are shown.

During operation, the HOC 260 encrypts unencrypted hosted commands (i.e.unencrypted HoP CMD), by utilizing a second COMSEC variety, to produceencrypted hosted commands (i.e. encrypted HoP CMD). The hosted commandsare commands that are used to configure the hosted payload 205 utilizedby the HOC 260. The host SOC 250 encrypts unencrypted host commands(i.e. unencrypted host CMD), by utilizing a first COMSEC variety, toproduce encrypted host commands (i.e. encrypted host CMD). The hostcommands are commands that are used to configure the host payload 206that is utilized by the host SOC 250.

It should be noted that, although in FIG. 2 the host SOC 250 is depictedto have its ground antenna located right next to its operationsbuilding; in other embodiments, the host SOC 250 may have its groundantenna located very far away from the its operations building (e.g.,the ground antenna may be located in another country than the operationsbuilding).

Also, it should be noted that the first COMSEC variety may include atleast one encryption key and/or at least one algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm). Additionally, itshould be noted that the second COMSEC variety may include at least oneencryption key and/or at least one encryption algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm).

The HOC 260 then transmits 215 the encrypted hosted commands to the hostSOC 250. After the host SOC 250 receives the encrypted hosted commands,the host SOC 250 transmits 220 the encrypted host commands and transmits225 the encrypted hosted commands to the vehicle 210. The host SOC 250transmits 220, 225 the encrypted host commands and the encrypted hostedcommands utilizing an out-of-band frequency band(s) (i.e. a frequencyband(s) that is not the same frequency band(s) utilized to transmitpayload data). The host command receiver 235 on the vehicle 210 receivesthe encrypted host commands. In addition, the hosted command receiver245 on the vehicle 210 receives the encrypted hosted commands.

The host command receiver 235 then transmits 252 the encrypted hostcommands to a first communication security module 262. The firstcommunication security module 262 decrypts the encrypted host commandsutilizing the first COMSEC variety (i.e. COMSEC Variety 1) to generateunencrypted host commands.

It should be noted that the first communication security module 262 maycomprise one or more modules. In addition, the first communicationsecurity module 262 may comprise one or more processors.

The hosted command receiver 245 then transmits 255 the encrypted hostedcommands to a second communication security module 265. The secondcommunication security module 265 decrypts the encrypted hosted commandsutilizing the second COMSEC variety (i.e. COMSEC Variety 2) to generateunencrypted hosted commands.

It should be noted that the second communication security module 265 maycomprise one or more modules. In addition, the second communicationsecurity module 265 may comprise one or more processors.

The first communication security module 262 then transmits 270 theunencrypted host commands to the host payload 206. The secondcommunication security module 265 transmits 275 the unencrypted hostedcommands to the hosted payload 205. The host payload 206 is reconfiguredaccording to the unencrypted host commands, and the hosted payload 205is reconfigured according to the unencrypted hosted commands. A hostpayload antenna 207 then transmits (e.g., in one or more antenna beams208) host payload data to a host receiving antenna 285 on the ground. Ahosted payload antenna 280 then transmits (e.g., in one or more antennabeams 281 and/or 208) hosted payload data to a hosted receiving antenna290 and/or the host receiving antenna 285 on the ground.

Also, it should be noted that, although in FIG. 2 , antenna beams 208,281 are shown to include a plurality of circular spot beams; in otherembodiments, antenna beams 208, 281 may include more or less number ofbeams than is shown in FIG. 2 (e.g., antenna beams 208, 281 may onlyinclude a single beam), and antenna beams 208, 281 may include beams ofdifferent shapes than circular spot beams as is shown in FIG. 2 (e.g.,antenna beams 208, 281 may include elliptical beams and/or shaped beamsof various different shapes).

It should be noted that in one or more embodiments, the host payloadantenna 207 and the hosted payload antenna 280 may comprise one or morereflector dishes including, but not limited to, parabolic reflectorsand/or shaped reflectors. In some embodiments, the host payload antenna207 and the hosted payload antenna 280 may comprise one or moremultifeed antenna arrays.

The host payload 206 transmits 209 unencrypted host telemetry (i.e.unencrypted host TLM, which is telemetry data related to the payload 206that is utilized by the host SOC 250) to the first communicationsecurity module 262. The hosted payload 205 transmits 291 unencryptedhosted telemetry (i.e. unencrypted HoP TLM, which is telemetry datarelated to the payload 205 that is utilized by the HOC 260) to the firstcommunication security module 262. The first communication securitymodule 262 then encrypts the unencrypted host telemetry and unencryptedhosted telemetry utilizing the first COMSEC variety to generateencrypted telemetry (i.e. encrypted TLM) (i.e. encrypted host telemetryand encrypted hosted telemetry).

The first communication security module 262 then transmits 293 theencrypted telemetry to a telemetry transmitter 294. The telemetrytransmitter 294 then transmits 295 the encrypted telemetry to the hostSOC 250. The telemetry transmitter 294 transmits 295 the encryptedtelemetry utilizing an out-of-band frequency band(s). The host SOC 250then decrypts the encrypted telemetry utilizing the first COMSEC varietyto generate the unencrypted telemetry. The host SOC 250 then utilizes adatabase that comprises host payload decommutated information and doesnot comprise hosted payload decommutated information (i.e. a databasewithout hosted payload decommutated information) to read to unencryptedtelemetry to determine the telemetry data related to the portion of thepayload 205 that is utilized by the host SOC 250.

The host SOC 250 then transmits 299 the encrypted telemetry to the HOC260. The HOC 260 then decrypts the encrypted telemetry utilizing thefirst COMSEC variety to generate the unencrypted telemetry. The HOC 260then utilizes a database that comprises hosted payload decommutatedinformation and does not comprise host payload decommutated information(i.e. a database without host payload decommutated information) to readto unencrypted telemetry to determine the telemetry data related to theportion of the payload 205 that is utilized by the HOC 260.

FIGS. 3A, 3B, and 3C together show a flow chart for the disclosed methodfor hosted payload operations where the host user transmits encryptedhost commands (encrypted utilizing a first COMSEC variety) and encryptedhosted commands (encrypted utilizing the second COMSEC variety) to avehicle, and where the host telemetry and the hosted telemetry are bothencrypted using the first COMSEC variety, in accordance with at leastone embodiment of the present disclosure. At the start 300 of themethod, a hosted payload (HoP) operation center (HOC) encryptsunencrypted hosted commands by utilizing a second COMSEC variety toproduce encrypted hosted commands 305. Then, the HOC transmits theencrypted hosted commands to a host spacecraft operations center (SOC)310. The host SOC encrypts unencrypted host commands by utilizing afirst COMSEC variety to produce encrypted host commands 315. Then, thehost SOC transmits (out-of-band) the encrypted host commands and theencrypted hosted commands to a vehicle 320.

Then, a host command receiver on the vehicle receives the encrypted hostcommands 325. And, a hosted command receiver on the vehicle receives theencrypted hosted commands 330. The host command receiver transmits theencrypted host commands to a first communication security module 335.The hosted command receiver transmits the encrypted hosted commands to asecond communication security module 340. The first communicationsecurity module then decrypts the encrypted host commands utilizing thefirst COMSEC variety to generate the unencrypted host commands 345. Thesecond communication security module then decrypts the encrypted hostedcommands utilizing the second COMSEC variety to generate the unencryptedhosted commands 350.

The first communication security module then transmits the unencryptedhost commands to the host payload 355. The second communication securitymodule then transmits the unencrypted hosted commands to the hostedpayload 360. Then, the host payload is reconfigured according to theunencrypted host commands, and the hosted payload is reconfiguredaccording to the unencrypted hosted commands 365. A host payload antennaon the vehicle then transmits host payload data to a host receivingantenna, and a hosted payload antenna on the vehicle then transmitshosted payload data to a hosted receiving antenna and/or the hostreceiving antenna 370.

Then, the host payload transmits to the first communication securitymodule unencrypted host telemetry, and the hosted payload transmits tothe first communication security module unencrypted hosted telemetry375. Then, the first communication security module encrypts theunencrypted host telemetry and the unencrypted hosted telemetryutilizing the first COMSEC variety to generate encrypted host telemetryand encrypted hosted telemetry 380. The first communication securitymodule then transmits the encrypted host telemetry and the encryptedhosted telemetry to a telemetry transmitter 385. Then, the telemetrytransmitter transmits the encrypted host telemetry and the encryptedhosted telemetry to the host SOC 390. The host SOC then decrypts theencrypted host telemetry utilizing the first COMSEC variety to generatethe unencrypted host telemetry 395.

The host SOC transmits the encrypted hosted telemetry to the HOC 396.Then, the HOC decrypts the encrypted hosted telemetry utilizing thefirst COMSEC variety to generate the unencrypted hosted telemetry 397.Then, the method ends 398.

FIG. 4 is a diagram 400 showing the disclosed system for hosted payloadoperations where the host user (i.e. the host SOC) 450 transmitsencrypted host commands (encrypted utilizing a first COMSEC variety) andencrypted hosted commands (encrypted utilizing a second COMSEC variety)to a vehicle, and where the host telemetry is encrypted using the firstCOMSEC variety and the hosted telemetry is encrypted using the secondCOMSEC variety, in accordance with at least one embodiment of thepresent disclosure. In this figure, a vehicle 410, a host SOC 450, and aHOC 460 are shown.

During operation, the HOC 460 encrypts unencrypted hosted commands (i.e.unencrypted HoP CMD), by utilizing a second COMSEC variety, to produceencrypted hosted commands (i.e. encrypted HoP CMD). The hosted commandsare commands that are used to configure the hosted payload 405 utilizedby the HOC 460. The host SOC 450 encrypts unencrypted host commands(i.e. unencrypted host CMD), by utilizing a first COMSEC variety, toproduce encrypted host commands (i.e. encrypted host CMD). The hostcommands are commands that are used to configure the host payload 406that is utilized by the host SOC 450.

It should be noted that, although in FIG. 4 the host SOC 450 is depictedto have its ground antenna located right next to its operationsbuilding; in other embodiments, the host SOC 450 may have its groundantenna located very far away from the its operations building (e.g.,the ground antenna may be located in another country than the operationsbuilding).

Also, it should be noted that the first COMSEC variety may include atleast one encryption key and/or at least one algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm). Additionally, itshould be noted that the second COMSEC variety may include at least oneencryption key and/or at least one encryption algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm).

The HOC 460 then transmits 415 the encrypted hosted commands to the hostSOC 450. After the host SOC 450 receives the encrypted hosted commands,the host SOC 450 transmits 420 the encrypted host commands and transmits425 the encrypted hosted commands to the vehicle 410. The host SOC 450transmits 420, 425 the encrypted host commands and the encrypted hostedcommands utilizing an out-of-band frequency band(s) (i.e. a frequencyband(s) that is not the same frequency band(s) utilized to transmitpayload data). The host command receiver 435 on the vehicle 410 receivesthe encrypted host commands. In addition, the hosted command receiver445 on the vehicle 410 receives the encrypted hosted commands.

The host command receiver 435 then transmits 452 the encrypted hostcommands to a first communication security module 462. The firstcommunication security module 462 decrypts the encrypted host commandsutilizing the first COMSEC variety (i.e. COMSEC Variety 1) to generateunencrypted host commands.

It should be noted that the first communication security module 462 maycomprise one or more modules. In addition, the first communicationsecurity module 462 may comprise one or more processors.

The hosted command receiver 445 then transmits 455 the encrypted hostedcommands to a second communication security module 465. The secondcommunication security module 465 decrypts the encrypted hosted commandsutilizing the second COMSEC variety (i.e. COMSEC Variety 2) to generateunencrypted hosted commands.

It should be noted that the second communication security module 465 maycomprise one or more modules. In addition, the second communicationsecurity module 465 may comprise one or more processors.

The first communication security module 462 then transmits 470 theunencrypted host commands to the host payload 406. The secondcommunication security module 465 transmits 475 the unencrypted hostedcommands to the hosted payload 405. The host payload 406 is reconfiguredaccording to the unencrypted host commands, and the hosted payload 405is reconfigured according to the unencrypted hosted commands. A hostpayload antenna 407 then transmits (e.g., in one or more antenna beams408) host payload data to a host receiving antenna 485 on the ground. Ahosted payload antenna 480 then transmits (e.g., in one or more antennabeams 481 and/or 408) hosted payload data to a hosted receiving antenna490 and/or the host receiving antenna 485 on the ground.

Also, it should be noted that, although in FIG. 4 , antenna beams 408,481 is shown to include a plurality of circular spot beams; in otherembodiments, antenna beams 408, 481 may include more or less number ofbeams than is shown in FIG. 4 (e.g., antenna beams 408, 481 may onlyinclude a single beam), and antenna beams 408, 481 may include beams ofdifferent shapes than circular spot beams as is shown in FIG. 4 (e.g.,antenna beams 408, 481 may include elliptical beams and/or shaped beamsof various different shapes).

It should be noted that in one or more embodiments, the host payloadantenna 407 and the hosted payload antenna 480 may comprise one or morereflector dishes including, but not limited to, parabolic reflectorsand/or shaped reflectors. In some embodiments, the host payload antenna407 and the hosted payload antenna 480 may comprise one or moremultifeed antenna arrays.

The host payload 406 transmits 491 unencrypted host telemetry (i.e.unencrypted host TLM, which is telemetry data related to the hostpayload 406 that is utilized by the host SOC 450) to the firstcommunication security module 462. The first communication securitymodule 462 then encrypts the unencrypted host telemetry utilizing thefirst COMSEC variety to generate encrypted host telemetry (i.e.encrypted host TLM).

The hosted payload 405 transmits 492 unencrypted hosted telemetry (i.e.unencrypted HoP TLM, which is telemetry data related to the payload 405that is utilized by the HOC 460) to the second communication securitymodule 465. The second communication security module 465 then encryptsthe unencrypted hosted telemetry utilizing the second COMSEC variety togenerate encrypted hosted telemetry (i.e. encrypted HoP TLM).

The first communication security module 462 then transmits 493 theencrypted host telemetry to a host telemetry transmitter 494. The hosttelemetry transmitter 494 then transmits 495 the encrypted hosttelemetry to the host SOC 450. The telemetry transmitter 494 transmits495 the encrypted host telemetry utilizing an out-of-band frequencyband(s). The host SOC 450 then decrypts the encrypted host telemetryutilizing the first COMSEC variety to generate the unencrypted hosttelemetry.

The second communication security module 465 then transmits 496 theencrypted hosted telemetry to a hosted telemetry transmitter 498. Thehosted telemetry transmitter 498 then transmits 497 the encrypted hostedtelemetry to the host SOC 450. The telemetry transmitter 498 transmits497 the encrypted hosted telemetry utilizing an out-of-band frequencyband(s). The host SOC 450 then transmits 499 the encrypted hostedtelemetry to the HOC 460. The HOC 460 then decrypts the encrypted hostedtelemetry utilizing the second COMSEC variety to generate theunencrypted hosted telemetry.

FIGS. 5A, 5B, 5C, and 5D together show a flow chart for the disclosedmethod for hosted payload operations where the host user transmitsencrypted host commands (encrypted utilizing a first COMSEC variety) andencrypted hosted commands (encrypted utilizing a second COMSEC variety)to a vehicle, and where the host telemetry is encrypted using the firstCOMSEC variety and the hosted telemetry is encrypted using the secondCOMSEC variety, in accordance with at least one embodiment of thepresent disclosure. At the start 500 of the method, a hosted payload(HoP) operation center (HOC) encrypts unencrypted hosted commands byutilizing a second COMSEC variety to produce encrypted hosted commands505. Then, the HOC transmits the encrypted hosted commands to a hostspacecraft operations center (SOC) 510. The host SOC encryptsunencrypted host commands by utilizing a first COMSEC variety to produceencrypted host commands 515. Then, the host SOC transmits (out-of-band)the encrypted host commands and the encrypted hosted commands to avehicle 520.

Then, a host command receiver on the vehicle receives the encrypted hostcommands 525. And, a hosted command receiver on the vehicle receives theencrypted hosted commands 530. The host command receiver transmits theencrypted host commands to a first communication security module 535.The hosted command receiver transmits the encrypted hosted commands to asecond communication security module 540. The first communicationsecurity module then decrypts the encrypted host commands utilizing thefirst COMSEC variety to generate the unencrypted host commands 545. Thesecond communication security module then decrypts the encrypted hostedcommands utilizing the second COMSEC variety to generate the unencryptedhosted commands 550.

The first communication security module then transmits the unencryptedhost commands to the host payload 555. The second communication securitymodule then transmits the unencrypted hosted commands to the hostedpayload 560. Then, the host payload is reconfigured according to theunencrypted host commands, and the hosted payload is reconfiguredaccording to the unencrypted hosted commands 565. A host payload antennaon the vehicle then transmits host payload data to a host receivingantenna, and a hosted payload antenna on the vehicle then transmitshosted payload data to a hosted receiving antenna and/or the hostreceiving antenna 570.

Then, the host payload transmits to the first communication securitymodule unencrypted host telemetry 575. The first communication securitymodule then encrypts the unencrypted host telemetry utilizing the firstCOMSEC variety to generate encrypted host telemetry 580. Then, the firstcommunication security module transmits the encrypted host telemetry toa host telemetry transmitter 585. The host telemetry transmitter thentransmits the encrypted host telemetry to the host SOC 590. Then, thehost SOC decrypts the encrypted host telemetry utilizing the firstCOMSEC variety to generate the unencrypted host telemetry 591.

The hosted payload transmits to the second communication security moduleunencrypted hosted telemetry 592. Then, the second communicationsecurity module encrypts the unencrypted hosted telemetry utilizing thesecond COMSEC variety to generate encrypted hosted telemetry 593. Thesecond communication security module then transmits the encrypted hostedtelemetry to a hosted telemetry transmitter 594. Then, the hostedtelemetry transmitter transmits the encrypted hosted telemetry to thehost SOC 595. The host SOC then transmits the encrypted hosted telemetryto the HOC 596. Then the HOC decrypts the encrypted hosted telemetryutilizing the second COMSEC variety to generate the unencrypted hostedtelemetry 597. Then, the method ends 598.

FIG. 6 is a diagram 600 showing the disclosed system for hosted payloadoperations where the host user (i.e. the host SOC) 650 transmitsencrypted host commands (encrypted utilizing a first COMSEC variety) toa vehicle and the hosted user (i.e. the HOC) 660 transmits encryptedhosted commands (encrypted utilizing a second COMSEC variety) to thevehicle, and where the host telemetry is encrypted using the firstCOMSEC variety and the hosted telemetry is encrypted using the secondCOMSEC variety, in accordance with at least one embodiment of thepresent disclosure. In this figure, a vehicle 610, a host SOC 650, and aHOC 660 are shown.

During operation, the HOC 660 encrypts unencrypted hosted commands (i.e.unencrypted HoP CMD), by utilizing a second COMSEC variety, to produceencrypted hosted commands (i.e. encrypted HoP CMD). The hosted commandsare commands that are used to configure the hosted payload 605 utilizedby the HOC 660. The host SOC 650 encrypts unencrypted host commands(i.e. unencrypted host CMD), by utilizing a first COMSEC variety, toproduce encrypted host commands (i.e. encrypted host CMD). The hostcommands are commands that are used to configure the host payload 606utilized by the host SOC 650.

It should be noted that, although in FIG. 6 the host SOC 650 is depictedto have its ground antenna located right next to its operationsbuilding; in other embodiments, the host SOC 650 may have its groundantenna located very far away from the its operations building (e.g.,the ground antenna may be located in another country than the operationsbuilding).

Also, it should be noted that the first COMSEC variety may include atleast one encryption key and/or at least one algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm). Additionally, itshould be noted that the second COMSEC variety may include at least oneencryption key and/or at least one encryption algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm).

The host SOC 650 transmits 620 the encrypted host commands to thevehicle 610. The host SOC 650 transmits 620 the encrypted host commandsutilizing an out-of-band frequency band(s) (i.e. a frequency band(s)that is not the same frequency band(s) utilized to transmit payloaddata).

The HOC 660 transmits 625 the encrypted hosted commands to the vehicle610. The HOC 660 transmits 625 the encrypted hosted commands utilizingan out-of-band frequency band(s).

The host command receiver 635 on the vehicle 610 receives the encryptedhost commands. In addition, the hosted command receiver 645 on thevehicle 610 receives the encrypted hosted commands.

The host command receiver 635 then transmits 652 the encrypted hostcommands to a first communication security module 662. The firstcommunication security module 662 decrypts the encrypted host commandsutilizing the first COMSEC variety (i.e. COMSEC Variety 1) to generateunencrypted host commands.

It should be noted that the first communication security module 662 maycomprise one or more modules. In addition, the first communicationsecurity module 662 may comprise one or more processors.

The hosted command receiver 645 then transmits 655 the encrypted hostedcommands to a second communication security module 665. The secondcommunication security module 665 decrypts the encrypted hosted commandsutilizing the second COMSEC variety (i.e. COMSEC Variety 2) to generateunencrypted hosted commands.

It should be noted that the second communication security module 665 maycomprise one or more modules. In addition, the second communicationsecurity module 665 may comprise one or more processors.

The first communication security module 662 then transmits 670 theunencrypted host commands to the host payload 606. The secondcommunication security module 665 transmits 675 the unencrypted hostedcommands to the hosted payload 605. The host payload 606 is reconfiguredaccording to the unencrypted host commands, and the hosted payload 605is reconfigured according to the unencrypted hosted commands. A hostpayload antenna 607 then transmits (e.g., in one or more antenna beams608) host payload data to a host receiving antenna 685 on the ground. Ahosted payload antenna 680 then transmits (e.g., in one or more antennabeams 681 and/or 608) hosted payload data to a hosted receiving antenna690 and/or a host receiving antenna 685 on the ground.

Also, it should be noted that, although in FIG. 6 , antenna beams 608,681 is shown to include a plurality of circular spot beams; in otherembodiments, antenna beams 608, 681 may include more or less number ofbeams than is shown in FIG. 6 (e.g., antenna beams 608, 681 may onlyinclude a single beam), and antenna beams 608, 681 may include beams ofdifferent shapes than circular spot beams as is shown in FIG. 6 (e.g.,antenna beams 608, 681 may include elliptical beams and/or shaped beamsof various different shapes).

It should be noted that in one or more embodiments, the host payloadantenna 607 and the hosted payload antenna 680 may comprise one or morereflector dishes including, but not limited to, parabolic reflectorsand/or shaped reflectors. In some embodiments, the host payload antenna607 and the hosted payload antenna 680 may comprise one or moremultifeed antenna arrays.

The host payload 606 transmits 691 unencrypted host telemetry (i.e.unencrypted host TLM, which is telemetry data related to the payload 606that is utilized by the host SOC 650) to the first communicationsecurity module 662. The first communication security module 662 thenencrypts the unencrypted host telemetry utilizing the first COMSECvariety to generate encrypted host telemetry (i.e. encrypted host TLM).

The hosted payload 605 transmits 692 unencrypted hosted telemetry (i.e.unencrypted HoP TLM, which is telemetry data related to the payload 605that is utilized by the HOC 660) to the second communication securitymodule 665. The second communication security module 665 then encryptsthe unencrypted hosted telemetry utilizing the second COMSEC variety togenerate encrypted hosted telemetry (i.e. encrypted HoP TLM).

The first communication security module 662 then transmits 693 theencrypted host telemetry to a host telemetry transmitter 694. The hosttelemetry transmitter 694 then transmits 695 the encrypted hosttelemetry to the host SOC 650. The telemetry transmitter 694 transmits695 the encrypted host telemetry utilizing an out-of-band frequencyband(s). The host SOC 650 then decrypts the encrypted host telemetryutilizing the first COMSEC variety to generate the unencrypted hosttelemetry.

The second communication security module 665 then transmits 696 theencrypted hosted telemetry to a hosted telemetry transmitter 698. Thehosted telemetry transmitter 698 then transmits 697 the encrypted hostedtelemetry to the HOC 660. The telemetry transmitter 698 transmits 697the encrypted hosted telemetry utilizing an out-of-band frequencyband(s). The HOC 660 then decrypts the encrypted hosted telemetryutilizing the second COMSEC variety to generate the unencrypted hostedtelemetry.

FIGS. 7A, 7B, and 7C together show a flow chart for the disclosed methodfor hosted payload operations where the host user transmits encryptedhost commands (encrypted utilizing a first COMSEC variety) to a vehicleand the hosted user transmits encrypted hosted commands (encryptedutilizing a second COMSEC variety) to the vehicle, and where the hosttelemetry is encrypted using the first COMSEC variety and the hostedtelemetry is encrypted using the second COMSEC variety, in accordancewith at least one embodiment of the present disclosure. At the start 700of the method, a hosted payload (HoP) operation center (HOC) encryptsunencrypted hosted commands by utilizing a second COMSEC variety toproduce encrypted hosted commands 705. Then, the HOC transmits(out-of-band) the encrypted hosted commands to a vehicle 710. The hostspacecraft operations center (SOC) encrypts unencrypted host commands byutilizing a first COMSEC variety to produce encrypted host commands 715.Then, the host SOC transmits (out-of-band) the encrypted host commandsto the vehicle 720.

Then, a host command receiver on the vehicle receives the encrypted hostcommands 725. And, a hosted command receiver on the vehicle receives theencrypted hosted commands 730. The host command receiver transmits theencrypted host commands to a first communication security module 735.The hosted command receiver transmits the encrypted hosted commands to asecond communication security module 740. The first communicationsecurity module then decrypts the encrypted host commands utilizing thefirst COMSEC variety to generate the unencrypted host commands 745. Thesecond communication security module then decrypts the encrypted hostedcommands utilizing the second COMSEC variety to generate the unencryptedhosted commands 750.

The first communication security module then transmits the unencryptedhost commands to the host payload 755. The second communication securitymodule then transmits the unencrypted hosted commands to the hostedpayload 760. Then, the host payload is reconfigured according to theunencrypted host commands and, the hosted payload is reconfiguredaccording to the unencrypted hosted command 765. A host payload antennaon the vehicle then transmits host payload data to a host receivingantenna and, a hosted payload antenna on the vehicle then transmitshosted payload data to a hosted receiving antenna and/or the hostreceiving antenna 770.

Then, the host payload transmits to the first communication securitymodule unencrypted host telemetry 775. Then, the first communicationsecurity module encrypts the unencrypted host telemetry utilizing thefirst COMSEC variety to generate encrypted host telemetry 780. The firstcommunication security module then transmits the encrypted hosttelemetry to a host telemetry transmitter 785. Then, the host telemetrytransmitter transmits the encrypted host telemetry to the host SOC 790.Then, the host SOC decrypts the encrypted host telemetry utilizing thefirst COMSEC variety to generate the unencrypted host telemetry 791.

The hosted payload transmits to the second communication security moduleunencrypted hosted telemetry 792. Then, the second communicationsecurity module encrypts the unencrypted hosted telemetry utilizing thesecond COMSEC variety to generate encrypted hosted telemetry 793. Thesecond communication security module then transmits the encrypted hostedtelemetry to a hosted telemetry transmitter 794. Then, the hostedtelemetry transmitter transmits the encrypted hosted telemetry to theHOC 795. The HOC then decrypts the encrypted hosted telemetry utilizingthe second COMSEC variety to generate the unencrypted hosted telemetry796. Then, the method ends 797.

Although particular embodiments have been shown and described, it shouldbe understood that the above discussion is not intended to limit thescope of these embodiments. While embodiments and variations of the manyaspects of the present disclosure have been disclosed and describedherein, such disclosure is provided for purposes of explanation andillustration only. Thus, various changes and modifications may be madewithout departing from the scope of the claims.

Where methods described above indicate certain events occurring incertain order, those of ordinary skill in the art having the benefit ofthis disclosure would recognize that the ordering may be modified andthat such modifications are in accordance with the variations of thepresent disclosure. Additionally, parts of methods may be performedconcurrently in a parallel process when possible, as well as performedsequentially. In addition, more parts or less part of the methods may beperformed.

Accordingly, embodiments are intended to exemplify alternatives,modifications, and equivalents that may fall within the scope of theclaims.

Although certain illustrative embodiments and methods have beendisclosed herein, it can be apparent from the foregoing disclosure tothose skilled in the art that variations and modifications of suchembodiments and methods can be made without departing from the truespirit and scope of the art disclosed. Many other examples of the artdisclosed exist, each differing from others in matters of detail only.Accordingly, it is intended that the art disclosed shall be limited onlyto the extent required by the appended claims and the rules andprinciples of applicable law.

We claim:
 1. A method for hosted payload operations, the methodcomprising: transmitting, by a hosted payload (HoP) operation center(HOC), encrypted hosted commands to a host spacecraft operations center(SOC); transmitting, by the host SOC, encrypted host commands and theencrypted hosted commands to a vehicle, wherein the encrypted hostcommands are encrypted utilizing a first communication security (COMSEC)variety, and the encrypted hosted commands are encrypted utilizing asecond COMSEC variety; decrypting, by a first communication securitymodule, the encrypted host commands utilizing the first COMSEC varietyto generate unencrypted host commands; decrypting, by a secondcommunication security module, the encrypted hosted commands utilizingthe second COMSEC variety to generate the unencrypted hosted commands;reconfiguring a host payload according to the unencrypted host commands;reconfiguring a hosted payload according to the unencrypted hostedcommands; transmitting, by a host payload antenna on the vehicle, hostpayload data to a host receiving antenna; transmitting, by a hostedpayload antenna on the vehicle, hosted payload data to at least one of ahosted receiving antenna or the host receiving antenna; encrypting, bythe first communication security module, unencrypted host telemetryutilizing the first COMSEC variety to generate encrypted host telemetry;transmitting, by a host telemetry transmitter, the encrypted hosttelemetry to the host SOC; encrypting, by the second communicationsecurity module, unencrypted hosted telemetry utilizing the secondCOMSEC variety to generate encrypted hosted telemetry; transmitting, bya hosted telemetry transmitter, the encrypted hosted telemetry to thehost SOC; and transmitting, by the host SOC, the encrypted hostedtelemetry to the HOC.
 2. The method of claim 1, wherein thereconfiguring of the host payload according to the unencrypted hostcommands and the reconfiguring of the hosted payload according to theunencrypted hosted commands comprises adjusting at least one of:transponder power, transponder spectrum monitoring, transponderconnectivity, transponder gain settings, transponder limiter settings,transponder automatic level control settings, transponder phasesettings, internal gain generation, bandwidth for at least one beam, atleast one frequency band for at least one of the at least one beam,transponder beamforming settings, effective isotropic radiation power(EIRP) for at least one of the at least one beam, transponder channels,or beam steering.
 3. The method of claim 1, wherein the reconfiguring ofthe host payload according to the unencrypted host commands and thereconfiguring of the hosted payload according to the unencrypted hostedcommands comprises reconfiguring at least one of: at least one antenna,at least one analog-to-digital converter, at least one digital-to-analogconverter, at least one beamformer, at least one digital channelizer, atleast one demodulator, at least one modulator, at least one digitalswitch matrix, or at least one digital combiner.
 4. The method of claim1, wherein the vehicle is an airborne vehicle.
 5. The method of claim 4,wherein the airborne vehicle is one of a satellite, aircraft, unmannedaerial vehicle (UAV), or space plane.
 6. A method for hosted payloadoperations, the method comprising: transmitting, by a hosted payload(HoP) operation center (HOC), encrypted hosted commands to a vehicle;transmitting, by a host spacecraft operations center (SOC), encryptedhost commands to the vehicle, wherein the encrypted host commands areencrypted utilizing a first communication security (COMSEC) variety, andthe encrypted hosted commands are encrypted utilizing a second COMSECvariety; decrypting, by a first communication security module on thevehicle, the encrypted host commands utilizing the first communicationsecurity (COMSEC) variety to generate unencrypted host commands;decrypting, by a second communication security module on the vehicle,the encrypted hosted commands utilizing the second COMSEC variety togenerate unencrypted hosted commands; reconfiguring a host payloadaccording to the unencrypted host commands; reconfiguring a hostedpayload according to the unencrypted hosted commands; transmitting, by ahost payload antenna on the vehicle, host payload data to a hostreceiving antenna; transmitting, by a hosted payload antenna on thevehicle, hosted payload data to at least one of a hosted receivingantenna or the host receiving antenna; encrypting, by the firstcommunication security module, unencrypted host telemetry utilizing thefirst COMSEC variety to generate encrypted host telemetry; transmitting,by a host telemetry transmitter on the vehicle, the encrypted hosttelemetry to the host SOC; encrypting, by the second communicationsecurity module, unencrypted hosted telemetry utilizing the secondCOMSEC variety to generate encrypted hosted telemetry; and transmitting,by the hosted telemetry transmitter, the encrypted hosted telemetry tothe HOC.
 7. The method of claim 6, wherein the reconfiguring of the hostpayload according to the unencrypted host commands and the reconfiguringof the hosted payload according to the unencrypted hosted commandscomprises adjusting at least one of: transponder power, transponderspectrum monitoring, transponder connectivity, transponder gainsettings, transponder limiter settings, transponder automatic levelcontrol settings, transponder phase settings, internal gain generation,bandwidth for at least one beam, at least one frequency band for atleast one of the at least one beam, transponder beamforming settings,effective isotropic radiation power (EIRP) for at least one of the atleast one beam, transponder channels, or beam steering.
 8. The method ofclaim 6, wherein the reconfiguring of the host payload according to theunencrypted host commands and the reconfiguring of the hosted payloadaccording to the unencrypted hosted commands comprises reconfiguring atleast one of: at least one antenna, at least one analog-to-digitalconverter, at least one digital-to-analog converter, at least onebeamformer, at least one digital channelizer, at least one demodulator,at least one modulator, at least one digital switch matrix, or at leastone digital combiner.
 9. The method of claim 6, wherein the vehicle isan airborne vehicle.
 10. The method of claim 9, wherein the airbornevehicle is one of a satellite, aircraft, unmanned aerial vehicle (UAV),or space plane.
 11. A system for hosted payload operations, the systemcomprising: a hosted payload (HoP) operation center (HOC) to transmitencrypted hosted commands to a host spacecraft operations center (SOC);the host SOC to transmit encrypted host commands and the encryptedhosted commands to a vehicle, wherein the encrypted host commands areencrypted utilizing a first communication security (COMSEC) variety, andthe encrypted hosted commands are encrypted utilizing a second COMSECvariety; a first communication security processor to decrypt theencrypted host commands utilizing the first COMSEC variety to generateunencrypted host commands; a second communication security processor todecrypt the encrypted hosted commands utilizing the second COMSECvariety to generate the unencrypted hosted commands; a host payloadreconfigured according to the unencrypted host commands; a hostedpayload reconfigured according to the unencrypted hosted commands; ahost payload antenna on the vehicle to transmit host payload data to ahost receiving antenna; a hosted payload antenna on the vehicle totransmit hosted payload data to at least one of a hosted receivingantenna or the host receiving antenna; the first communication securityprocessor to encrypt unencrypted host telemetry utilizing the firstCOMSEC variety to generate encrypted host telemetry; a host telemetrytransmitter to transmit the encrypted host telemetry to the host SOC;the second communication security processor to encrypt unencryptedhosted telemetry utilizing the second COMSEC variety to generateencrypted hosted telemetry; a hosted telemetry transmitter to transmitthe encrypted hosted telemetry to the host SOC; and the host SOC totransmit the encrypted hosted telemetry to the HOC.
 12. The system ofclaim 11, wherein the vehicle is an airborne vehicle.
 13. The system ofclaim 12, wherein the airborne vehicle is one of a satellite, aircraft,unmanned aerial vehicle (UAV), or space plane.
 14. A system for hostedpayload operations, the system comprising: a hosted payload (HoP)operation center (HOC) to transmit encrypted hosted commands to avehicle; a host spacecraft operations center (SOC) to transmit encryptedhost commands to the vehicle, wherein the encrypted host commands areencrypted utilizing a first communication security (COMSEC) variety, andthe encrypted hosted commands are encrypted utilizing a second COMSECvariety; a first communication security processor on the vehicle todecrypt the encrypted host commands utilizing the first communicationsecurity (COMSEC) variety to generate unencrypted host commands; asecond communication security modulo processor on the vehicle to decryptthe encrypted hosted commands utilizing the second COMSEC variety togenerate unencrypted hosted commands; a host payload reconfiguredaccording to the unencrypted host commands; a hosted payloadreconfigured according to the unencrypted hosted commands; a hostpayload antenna on the vehicle to transmit host payload data to a hostreceiving antenna; a hosted payload antenna on the vehicle to transmithosted payload data to at least one of a hosted receiving antenna or thehost receiving antenna; the first communication security processor toencrypt unencrypted host telemetry utilizing the first COMSEC variety togenerate encrypted host telemetry; a host telemetry transmitter on thevehicle to transmit the encrypted host telemetry to the host SOC; thesecond communication security processor to encrypt unencrypted hostedtelemetry utilizing the second COMSEC variety to generate encryptedhosted telemetry; and the hosted telemetry transmitter to transmit theencrypted hosted telemetry to the HOC.
 15. The system of claim 14,wherein the vehicle is an airborne vehicle.
 16. The method of claim 1,the method comprising: decrypting, by the first communication securitymodule on the vehicle, the encrypted host commands utilizing the firstCOMSEC variety to generate the unencrypted host commands; decrypting, bythe second communication security module on the vehicle, the encryptedhosted commands utilizing the second COMSEC variety to generate theunencrypted hosted commands; reconfiguring the host payload on thevehicle according to the unencrypted host commands; and reconfiguringthe hosted payload on the vehicle according to the unencrypted hostedcommands.
 17. The method of claim 16, wherein the reconfiguring of thehost payload according to the unencrypted host commands and thereconfiguring of the hosted payload according to the unencrypted hostedcommands comprises adjusting at least one of: transponder power,transponder spectrum monitoring, transponder connectivity, transpondergain settings, transponder limiter settings, transponder automatic levelcontrol settings, transponder phase settings, internal gain generation,bandwidth for at least one beam, at least one frequency band for atleast one of the at least one beam, transponder beamforming settings,effective isotropic radiation power (EIRP) for at least one of the atleast one beam, transponder channels, or beam steering.
 18. The methodof claim 16, wherein the reconfiguring of the host payload according tothe unencrypted host commands and the reconfiguring of the hostedpayload according to the unencrypted hosted commands comprisesreconfiguring at least one of: at least one antenna, at least oneanalog-to-digital converter, at least one digital-to-analog converter,at least one beamformer, at least one digital channelizer, at least onedemodulator, at least one modulator, at least one digital switch matrix,or at least one digital combiner.
 19. The method of claim 16, whereinthe vehicle is an airborne vehicle.
 20. The method of claim 19, whereinthe airborne vehicle is one of a satellite, aircraft, unmanned aerialvehicle (UAV), or space plane.