Virtual transponder utilizing inband telemetry

ABSTRACT

Systems, methods, and apparatuses for a virtual transponder utilizing inband telemetry are disclosed. A disclosed method for a virtual transponder utilizing inband telemetry comprises receiving, by a vehicle, encrypted host commands from a host spacecraft operations center (SOC). The method further comprises receiving, by the vehicle via the host SOC, encrypted hosted commands from a hosted payload (HoP) operation center (HOC). Also, the method comprises reconfiguring a payload on the vehicle according to unencrypted host commands and/or unencrypted hosted commands. In addition, the method comprises transmitting payload data to a host receiving antenna and/or a hosted receiving antenna. In addition, the method comprises transmitting, by a host telemetry transmitter on the vehicle, encrypted host telemetry to the host SOC. Further, the method comprises transmitting, by the payload antenna, encrypted hosted telemetry to the HOC.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a Continuation application of, and claims priorityto and the benefit of, U.S. patent application Ser. No. 16/677,544,filed on Nov. 7, 2019, which is a Continuation application of U.S.patent application Ser. No. 15/451,291, filed on Mar. 6, 2017, theentire disclosures of which are expressly incorporated by referenceherein.

FIELD

The present disclosure relates to virtual transponders. In particular,it relates to virtual transponders utilizing inband telemetry.

BACKGROUND

Currently, typical transponders on a vehicle (e.g., a satellite) havethe ability to perform switching of inputs to outputs of the payload.All of this switching on the payload is commanded and controlled by asingle satellite controller with no resource allocation privacy. Forexample, in a digital transponder, when a user request for a channelwith specific bandwidth and antenna characteristics is made, the channelis then set up, used, and then disconnected.

As such, there is a need for an improved transponder design that allowsfor privacy in the allocation of resources on the payload.

SUMMARY

The present disclosure relates to a method, system, and apparatus forvirtual transponders utilizing inband telemetry. In one or moreembodiments, a method for a virtual transponder utilizing inbandtelemetry comprises transmitting, by a hosted payload (HoP) operationcenter (HOC), encrypted hosted commands to a host spacecraft operationscenter (SOC). The method further comprises transmitting, by the hostSOC, encrypted host commands and the encrypted hosted commands to avehicle, where the encrypted host commands are encrypted utilizing afirst communication security (COMSEC) variety and the encrypted hostedcommands are encrypted utilizing a second COMSEC variety. Also, themethod comprises decrypting, by a first communication security module onthe vehicle, the encrypted host commands utilizing the first COMSECvariety to generate unencrypted host commands. In addition, the methodcomprises decrypting, by a second communication security module on thevehicle, the encrypted hosted commands utilizing the second COMSECvariety to generate unencrypted hosted commands. Additionally, themethod comprises reconfiguring a payload on the vehicle according to theunencrypted host commands and/or the unencrypted hosted commands. Also,the method comprises transmitting, by a payload antenna on the vehicle,payload data to a host receiving antenna and/or a hosted receivingantenna. Additionally, the method comprises encrypting, by the firstcommunication security module, unencrypted host telemetry from thepayload by utilizing the first COMSEC variety to generate encrypted hosttelemetry. In addition, the method comprises encrypting, by the secondcommunication security module, unencrypted hosted telemetry from thepayload by utilizing the second COMSEC variety to generate encryptedhosted telemetry. Also, the method comprises transmitting, by a hosttelemetry transmitter on the vehicle, the encrypted host telemetry tothe host SOC. Additionally, the method comprises transmitting, by thepayload antenna, the encrypted hosted telemetry to the hosted receivingantenna. Further, the method comprises transmitting, by the hostedreceiving antenna, the encrypted hosted telemetry to the HOC.

In one or more embodiments, the reconfiguring of the payload accordingto the unencrypted host commands and/or the unencrypted hosted commandscomprises adjusting transponder power, transponder spectrum monitoring,transponder connectivity, transponder gain settings, transponder limitersettings, transponder automatic level control settings, transponderphase settings, internal gain generation, bandwidth for at least onebeam, at least one frequency band for at least one beam, transponderbeamforming settings, effective isotropic radiation power (EIRP) for atleast one beam, transponder channels, and/or beam steering.

In at least one embodiment, the reconfiguring of the payload accordingto the unencrypted host commands and/or the unencrypted hosted commandscomprises reconfiguring at least one antenna, at least oneanalog-to-digital converter, at least one digital-to-analog converter,at least one beamformer, at least one digital channelizer, at least onedemodulator, at least one modulator, at least one digital switch matrix,at least one digital combiner, and/or at least one analog switch matrix.

In one or more embodiments, the vehicle is an airborne vehicle. In atleast one embodiment, the airborne vehicle is a satellite, aircraft,unmanned aerial vehicle (UAV), or space plane.

In at least one embodiment, the method further comprises encrypting, bythe host SOC, the unencrypted host commands by utilizing the firstCOMSEC variety to produce the encrypted host commands. In addition, themethod comprises encrypting, by the HOC, the unencrypted hosted commandsby utilizing the second COMSEC variety to produce the encrypted hostedcommands.

In at least one embodiment, the method further comprises receiving, by ahost command receiver on the vehicle, the encrypted host commands. Also,the method comprises receiving, by a hosted command receiver on thevehicle, the encrypted hosted commands. In addition, the methodcomprises transmitting, by the host command receiver, the encrypted hostcommands to the first communication security module. Further, the methodcomprises transmitting, by the hosted command receiver, the encryptedhosted commands to the second communication security module.

In one or more embodiments, the method further comprises transmitting,by the first communication security module, the unencrypted hostcommands to the payload. Also, the method comprises transmitting, by thesecond communication security module, the unencrypted hosted commands tothe payload.

In at least one embodiment, the method further comprises transmitting,by the payload, to the first communication security module theunencrypted host telemetry. Also, the method comprises transmitting, bythe payload, to the second communication security module the unencryptedhosted telemetry.

In one or more embodiments, the method further comprises transmitting,by the first communication security module, the encrypted host telemetryto a host telemetry transmitter. In addition, the method comprisestransmitting, by the second communication security module, the encryptedhosted telemetry to the payload.

In at least one embodiment, the method further comprises decrypting, bythe host SOC, the encrypted host telemetry utilizing the first COMSECvariety to generate the unencrypted host telemetry. Also, the methodcomprises decrypting, by the HOC, the encrypted hosted telemetryutilizing the second COMSEC variety to generate the unencrypted hostedtelemetry.

In one or more embodiments, a method for a virtual transponder utilizinginband telemetry comprises transmitting, by a hosted payload (HoP)operation center (HOC), encrypted hosted commands to a host spacecraftoperations center (SOC). The method further comprises transmitting, bythe host SOC, encrypted host commands and the encrypted hosted commandsto a vehicle, where the encrypted host commands are encrypted utilizinga first COMSEC variety and the encrypted hosted commands are encryptedutilizing a second COMSEC variety. Also, the method comprisesdecrypting, by a first communication security module on the vehicle, theencrypted host commands utilizing the first COMSEC variety to generateunencrypted host commands. In addition, the method comprises decrypting,by a second communication security module on the vehicle, the encryptedhosted commands utilizing the second COMSEC variety to generateunencrypted hosted commands. Additionally, the method comprisesreconfiguring a payload on the vehicle according to the unencrypted hostcommands and/or the unencrypted hosted commands. Also, the methodcomprises transmitting, by a payload antenna on the vehicle, payloaddata to a host receiving antenna and/or a hosted receiving antenna. Inaddition, the method comprises encrypting, by the first communicationsecurity module, unencrypted host telemetry from the payload byutilizing the first COMSEC variety to generate encrypted host telemetry.Also, the method comprises encrypting, by the second communicationsecurity module, unencrypted hosted telemetry from the payload byutilizing the second COMSEC variety to generate encrypted hostedtelemetry. In addition, the method comprises transmitting, by thepayload antenna, the encrypted host telemetry to the host receivingantenna. Also, the method comprises transmitting, by the host receivingantenna, the encrypted host telemetry to the host SOC. In addition, themethod comprises transmitting, by a hosted telemetry transmitter on thevehicle, the encrypted hosted telemetry to the host SOC. Further, themethod comprises transmitting, by the host SOC, the encrypted hostedtelemetry to the HOC.

In at least one embodiment, a method for a virtual transponder utilizinginband telemetry comprises transmitting, by a hosted payload (HoP)operation center (HOC), encrypted hosted commands to a host spacecraftoperations center (SOC). The method further comprises transmitting, bythe host SOC, encrypted host commands and the encrypted hosted commandsto a vehicle, where the encrypted host commands are encrypted utilizinga first COMSEC variety and the encrypted hosted commands are encryptedutilizing a second COMSEC variety. Also, the method comprisesdecrypting, by a first communication security module on the vehicle, theencrypted host commands utilizing the first COMSEC variety to generateunencrypted host commands. In addition, the method comprises decrypting,by a second communication security module on the vehicle, the encryptedhosted commands utilizing the second COMSEC variety to generateunencrypted hosted commands. Additionally, the method comprisesreconfiguring a payload on the vehicle according to the unencrypted hostcommands and/or the unencrypted hosted commands. Also, the methodcomprises transmitting, by a payload antenna on the vehicle, payloaddata to a host receiving antenna and/or a hosted receiving antenna. Inaddition, the method comprises encrypting, by the first communicationsecurity module, unencrypted host telemetry from the payload byutilizing the first COMSEC variety to generate encrypted host telemetry.Also, the method comprises encrypting, by the second communicationsecurity module, unencrypted hosted telemetry from the payload byutilizing the second COMSEC variety to generate encrypted hostedtelemetry. In addition, the method comprises transmitting, by thepayload antenna, the encrypted host telemetry to the host receivingantenna. Additionally, the method comprises transmitting, by the hostreceiving antenna, the encrypted host telemetry to the host SOC. Also,the method comprises transmitting, by the payload antenna, the encryptedhosted telemetry to the hosted receiving antenna. Further, the methodcomprises transmitting, by the hosted receiving antenna, the encryptedhosted telemetry to the HOC.

In one or more embodiments, a method for a virtual transponder utilizinginband telemetry comprises transmitting, by a hosted payload (HoP)operation center (HOC), encrypted hosted commands to a host spacecraftoperations center (SOC). The method further comprises transmitting, bythe host SOC, encrypted host commands and the encrypted hosted commandsto a vehicle. Also, the method comprises decrypting, by a firstcommunication security module, the encrypted host commands utilizing afirst communication security (COMSEC) variety to generate unencryptedhost commands. In addition, the method comprises decrypting, by a secondcommunication security module, the encrypted hosted commands utilizing asecond COMSEC variety to generate unencrypted hosted commands.Additionally, the method comprises reconfiguring the payload accordingto the unencrypted host commands and/or the unencrypted hosted commands.Also, the method comprises transmitting, by a payload antenna on thevehicle, payload data to a host receiving antenna and/or a hostedreceiving antenna. In addition, the method comprises encrypting, by thefirst communication security module, unencrypted telemetry utilizing thefirst COMSEC variety to generate encrypted telemetry. Additionally, themethod comprises transmitting, by the payload antenna, the encryptedtelemetry to the host receiving antenna. Also, the method comprisestransmitting, by the host receiving antenna, the encrypted telemetry tothe host SOC. In addition, the method comprises transmitting, by thepayload antenna, the encrypted telemetry to the hosted receivingantenna. Further, the method comprises transmitting, by the hostedreceiving antenna, the encrypted telemetry to the HOC.

In at least one embodiment, a system for a virtual transponder utilizinginband telemetry comprises a hosted payload (HoP) operation center (HOC)to transmit encrypted hosted commands to a host spacecraft operationscenter (SOC). The system further comprises the host SOC to transmitencrypted host commands and the encrypted hosted commands to a vehicle,wherein the encrypted host commands are encrypted utilizing a firstcommunication security (COMSEC) variety and the encrypted hostedcommands are encrypted utilizing a second COMSEC variety. Also, thesystem comprises a first communication security module on the vehicle todecrypt the encrypted host commands utilizing the first COMSEC varietyto generate unencrypted host commands. In addition, the system comprisesa second communication security module on the vehicle to decrypt theencrypted hosted commands utilizing the second COMSEC variety togenerate unencrypted hosted commands. Additionally, the system comprisesa payload on the vehicle reconfigured according to the unencrypted hostcommands and/or the unencrypted hosted commands. Also, the systemcomprises a payload antenna on the vehicle to transmit payload data to ahost receiving antenna and/or a hosted receiving antenna. In addition,the system comprises the first communication security module to encryptunencrypted host telemetry from the payload by utilizing the firstCOMSEC variety to generate encrypted host telemetry. Additionally, thesystem comprises the second communication security module to encryptunencrypted hosted telemetry from the payload by utilizing the secondCOMSEC variety to generate encrypted hosted telemetry. Also, the systemcomprises a host telemetry transmitter on the vehicle to transmit theencrypted host telemetry to the host SOC. In addition, the systemcomprises the payload antenna to transmit the encrypted hosted telemetryto the hosted receiving antenna. Further, the system comprises thehosted receiving antenna to transmit the encrypted hosted telemetry tothe HOC.

In one or more embodiments, a system for a virtual transponder utilizinginband telemetry comprising a hosted payload (HoP) operation center(HOC) to transmit encrypted hosted commands to a host spacecraftoperations center (SOC). The system further comprises the host SOC totransmit encrypted host commands and the encrypted hosted commands to avehicle, wherein the encrypted host commands are encrypted utilizing afirst communication security (COMSEC) variety and the encrypted hostedcommands are encrypted utilizing a second COMSEC variety. Also, thesystem comprises a first communication security module on the vehicle todecrypt the encrypted host commands utilizing the first COMSEC varietyto generate unencrypted host commands. In addition, the system comprisesa second communication security module on the vehicle to decrypt theencrypted hosted commands utilizing the second COMSEC variety togenerate unencrypted hosted commands. Additionally, the system comprisesa payload on the vehicle reconfigured according to the unencrypted hostcommands and/or the unencrypted hosted commands. Also, the systemcomprises a payload antenna on the vehicle to transmit payload data to ahost receiving antenna and/or a hosted receiving antenna. In addition,the system comprises the first communication security module to encryptunencrypted host telemetry from the payload by utilizing the firstCOMSEC variety to generate encrypted host telemetry. Additionally, thesystem comprises the second communication security module to encryptunencrypted hosted telemetry from the payload by utilizing the secondCOMSEC variety to generate encrypted hosted telemetry. Also, the systemcomprises the payload antenna to transmit the encrypted host telemetryto the host receiving antenna Also, the system comprises the hostreceiving antenna to transmit the encrypted host telemetry to the hostSOC. In addition, the system comprises a hosted telemetry transmitter onthe vehicle to transmit the encrypted hosted telemetry to the host SOC.Further, the system comprises the host SOC to transmit the encryptedhosted telemetry to the HOC.

In at least one embodiment, a system for a virtual transponder utilizinginband telemetry comprises a hosted payload (HoP) operation center (HOC)to transmit encrypted hosted commands to a host spacecraft operationscenter (SOC). The system further comprises the host SOC to transmitencrypted host commands and the encrypted hosted commands to a vehicle,where the encrypted host commands are encrypted utilizing a firstcommunication security (COMSEC) variety and the encrypted hostedcommands are encrypted utilizing a second COMSEC variety. Also, thesystem comprises a first communication security module on the vehicle todecrypt the encrypted host commands utilizing the first COMSEC varietyto generate unencrypted host commands. In addition, the system comprisesa second communication security module on the vehicle to decrypt theencrypted hosted commands utilizing the second COMSEC variety togenerate unencrypted hosted commands. Additionally, the system comprisesa payload on the vehicle reconfigured according to the unencrypted hostcommands and/or the unencrypted hosted commands. Also, the systemcomprises a payload antenna on the vehicle to transmit payload data to ahost receiving antenna and/or a hosted receiving antenna. In addition,the system comprises the first communication security module to encryptunencrypted host telemetry from the payload by utilizing the firstCOMSEC variety to generate encrypted host telemetry. Additionally, thesystem comprises the second communication security module to encryptunencrypted hosted telemetry from the payload by utilizing the secondCOMSEC variety to generate encrypted hosted telemetry. Also, the systemcomprises the payload antenna to transmit the encrypted host telemetryto the host receiving antenna. In addition, the system comprises thehost receiving antenna to transmit the encrypted host telemetry to thehost SOC. Additionally, the system comprises the payload antenna totransmit the encrypted hosted telemetry to the hosted receiving antenna.Further, the system comprises the hosted receiving antenna to transmitthe encrypted hosted telemetry to the HOC.

In one or more embodiments, a system for a virtual transponder utilizinginband telemetry comprises a hosted payload (HoP) operation center (HOC)to transmit encrypted hosted commands to a host spacecraft operationscenter (SOC). The system further comprises the host SOC to transmitencrypted host commands and the encrypted hosted commands to a vehicle.Also, the system comprises a first communication security module todecrypt the encrypted host commands utilizing a first communicationsecurity (COMSEC) variety to generate unencrypted host commands. Inaddition, the system comprises a second communication security module todecrypt the encrypted hosted commands utilizing a second COMSEC varietyto generate unencrypted hosted commands. Additionally, the systemcomprises a payload on the vehicle reconfigured according to theunencrypted host commands and/or the unencrypted hosted commands. Also,the system comprises a payload antenna on the vehicle to transmitpayload data to a host receiving antenna and/or a hosted receivingantenna. In addition, the system comprises the first communicationsecurity module to encrypt unencrypted telemetry utilizing the firstCOMSEC variety to generate encrypted telemetry. Additionally, the systemcomprises the payload antenna to transmit the encrypted telemetry to thehost receiving antenna. Also, the system comprises the host receivingantenna to transmit the encrypted telemetry to the host SOC. Inaddition, the system comprises the payload antenna to transmit theencrypted telemetry to the hosted receiving antenna. Further, the systemcomprises the hosted receiving antenna to transmit the encryptedtelemetry to the HOC.

In one or more embodiments, a method for a virtual transponder utilizinginband telemetry comprises transmitting, by a hosted payload (HoP)operation center (HOC), encrypted hosted commands to a host spacecraftoperations center (SOC). The method further comprises transmitting, bythe host SOC, encrypted host commands and the encrypted hosted commandsto a vehicle, where the encrypted host commands are encrypted utilizinga first communication security (COMSEC) variety and the encrypted hostedcommands are encrypted utilizing a second COMSEC variety. Also, themethod comprises decrypting, by a first communication security module onthe vehicle, the encrypted host commands utilizing the first COMSECvariety to generate unencrypted host commands. In addition, the methodcomprises decrypting, by a second communication security module on thevehicle, the encrypted hosted commands utilizing the second COMSECvariety to generate unencrypted hosted commands. Additionally, themethod comprises reconfiguring a payload on the vehicle according to theunencrypted host commands and/or the unencrypted hosted commands. Also,the method comprises transmitting, by a payload antenna on the vehicle,payload data to a host receiving antenna and/or a hosted receivingantenna. Additionally, the method comprises encrypting, by the firstcommunication security module, unencrypted host telemetry from thepayload by utilizing the first COMSEC variety to generate encrypted hosttelemetry. In addition, the method comprises encrypting, by the secondcommunication security module, unencrypted hosted telemetry from thepayload by utilizing the second COMSEC variety to generate encryptedhosted telemetry. Also, the method comprises transmitting, by a hosttelemetry transmitter on the vehicle, the encrypted host telemetry tothe host SOC. Additionally, the method comprises transmitting, by thepayload antenna, the encrypted hosted telemetry to the host receivingantenna. Also, the method comprises transmitting, by the host receivingantenna, the encrypted hosted telemetry to the host SOC. Further, themethod comprises transmitting, by the host SOC, the encrypted hostedtelemetry to the HOC.

In at least one embodiment, a method for a virtual transponder utilizinginband telemetry comprises transmitting, by a hosted payload (HoP)operation center (HOC), encrypted hosted commands to a host spacecraftoperations center (SOC). The method further comprises transmitting, bythe host SOC, encrypted host commands and the encrypted hosted commandsto a vehicle, where the encrypted host commands are encrypted utilizinga first COMSEC variety and the encrypted hosted commands are encryptedutilizing a second COMSEC variety. Also, the method comprisesdecrypting, by a first communication security module on the vehicle, theencrypted host commands utilizing the first COMSEC variety to generateunencrypted host commands. In addition, the method comprises decrypting,by a second communication security module on the vehicle, the encryptedhosted commands utilizing the second COMSEC variety to generateunencrypted hosted commands. Additionally, the method comprisesreconfiguring a payload on the vehicle according to the unencrypted hostcommands and/or the unencrypted hosted commands. Also, the methodcomprises transmitting, by a payload antenna on the vehicle, payloaddata to a host receiving antenna and/or a hosted receiving antenna. Inaddition, the method comprises encrypting, by the first communicationsecurity module, unencrypted host telemetry from the payload byutilizing the first COMSEC variety to generate encrypted host telemetry.Also, the method comprises encrypting, by the second communicationsecurity module, unencrypted hosted telemetry from the payload byutilizing the second COMSEC variety to generate encrypted hostedtelemetry. In addition, the method comprises transmitting, by thepayload antenna, the encrypted host telemetry and the encrypted hostedtelemetry to the host receiving antenna. Additionally, the methodcomprises transmitting, by the host receiving antenna, the encryptedhost telemetry and the encrypted hosted telemetry to the host SOC.Further, the method comprises transmitting, by the host SOC, theencrypted hosted telemetry to the HOC.

In one or more embodiments, a method for a virtual transponder utilizinginband telemetry comprises transmitting, by a hosted payload (HoP)operation center (HOC), encrypted hosted commands to a host spacecraftoperations center (SOC). The method further comprises transmitting, bythe host SOC, encrypted host commands and the encrypted hosted commandsto a vehicle. Also, the method comprises decrypting, by a firstcommunication security module, the encrypted host commands utilizing afirst communication security (COMSEC) variety to generate unencryptedhost commands. In addition, the method comprises decrypting, by a secondcommunication security module, the encrypted hosted commands utilizing asecond COMSEC variety to generate unencrypted hosted commands.Additionally, the method comprises reconfiguring the payload accordingto the unencrypted host commands and/or the unencrypted hosted commands.Also, the method comprises transmitting, by a payload antenna on thevehicle, payload data to a host receiving antenna and/or a hostedreceiving antenna. In addition, the method comprises encrypting, by thefirst communication security module, unencrypted telemetry utilizing thefirst COMSEC variety to generate encrypted telemetry. Additionally, themethod comprises transmitting, by the payload antenna, the encryptedtelemetry to the host receiving antenna. Also, the method comprisestransmitting, by the host receiving antenna, the encrypted telemetry tothe host SOC. In addition, the method comprises transmitting, by thepayload antenna, the encrypted telemetry to the host receiving antenna.Also, the method comprises transmitting, by the host receiving antenna,the encrypted telemetry to the host SOC. Further, the method comprisestransmitting, by the host SOC, the encrypted telemetry to the HOC.

In at least one embodiment, a system for a virtual transponder utilizinginband telemetry comprises a hosted payload (HoP) operation center (HOC)to transmit encrypted hosted commands to a host spacecraft operationscenter (SOC). The system further comprises the host SOC to transmitencrypted host commands and the encrypted hosted commands to a vehicle,wherein the encrypted host commands are encrypted utilizing a firstcommunication security (COMSEC) variety and the encrypted hostedcommands are encrypted utilizing a second COMSEC variety. Also, thesystem comprises a first communication security module on the vehicle todecrypt the encrypted host commands utilizing the first COMSEC varietyto generate unencrypted host commands. In addition, the system comprisesa second communication security module on the vehicle to decrypt theencrypted hosted commands utilizing the second COMSEC variety togenerate unencrypted hosted commands. Additionally, the system comprisesa payload on the vehicle reconfigured according to the unencrypted hostcommands and/or the unencrypted hosted commands. Also, the systemcomprises a payload antenna on the vehicle to transmit payload data to ahost receiving antenna and/or a hosted receiving antenna. In addition,the system comprises the first communication security module to encryptunencrypted host telemetry from the payload by utilizing the firstCOMSEC variety to generate encrypted host telemetry. Additionally, thesystem comprises the second communication security module to encryptunencrypted hosted telemetry from the payload by utilizing the secondCOMSEC variety to generate encrypted hosted telemetry. Also, the systemcomprises a host telemetry transmitter on the vehicle to transmit theencrypted host telemetry to the host SOC. In addition, the systemcomprises the payload antenna to transmit the encrypted hosted telemetryto the host receiving antenna. Also, the system comprises the hostreceiving antenna to transmit the encrypted hosted telemetry to the hostSOC. Further, the system comprises the host SOC to transmit theencrypted hosted telemetry to the HOC.

In at least one embodiment, a system for a virtual transponder utilizinginband telemetry comprises a hosted payload (HoP) operation center (HOC)to transmit encrypted hosted commands to a host spacecraft operationscenter (SOC). The system further comprises the host SOC to transmitencrypted host commands and the encrypted hosted commands to a vehicle,where the encrypted host commands are encrypted utilizing a firstcommunication security (COMSEC) variety and the encrypted hostedcommands are encrypted utilizing a second COMSEC variety. Also, thesystem comprises a first communication security module on the vehicle todecrypt the encrypted host commands utilizing the first COMSEC varietyto generate unencrypted host commands. In addition, the system comprisesa second communication security module on the vehicle to decrypt theencrypted hosted commands utilizing the second COMSEC variety togenerate unencrypted hosted commands. Additionally, the system comprisesa payload on the vehicle reconfigured according to the unencrypted hostcommands and/or the unencrypted hosted commands. Also, the systemcomprises a payload antenna on the vehicle to transmit payload data to ahost receiving antenna and/or a hosted receiving antenna. In addition,the system comprises the first communication security module to encryptunencrypted host telemetry from the payload by utilizing the firstCOMSEC variety to generate encrypted host telemetry. Additionally, thesystem comprises the second communication security module to encryptunencrypted hosted telemetry from the payload by utilizing the secondCOMSEC variety to generate encrypted hosted telemetry. Also, the systemcomprises the payload antenna to transmit the encrypted host telemetryand encrypted hosted telemetry to the host receiving antenna. Inaddition, the system comprises the host receiving antenna to transmitthe encrypted host telemetry and the encrypted hosted telemetry to thehost SOC. Further, the system comprises the hosted SOC to transmit theencrypted hosted telemetry to the HOC.

In one or more embodiments, a system for a virtual transponder utilizinginband telemetry comprises a hosted payload (HoP) operation center (HOC)to transmit encrypted hosted commands to a host spacecraft operationscenter (SOC). The system further comprises the host SOC to transmitencrypted host commands and the encrypted hosted commands to a vehicle.Also, the system comprises a first communication security module todecrypt the encrypted host commands utilizing a first communicationsecurity (COMSEC) variety to generate unencrypted host commands. Inaddition, the system comprises a second communication security module todecrypt the encrypted hosted commands utilizing a second COMSEC varietyto generate unencrypted hosted commands. Additionally, the systemcomprises a payload on the vehicle reconfigured according to theunencrypted host commands and/or the unencrypted hosted commands. Also,the system comprises a payload antenna on the vehicle to transmitpayload data to a host receiving antenna and/or a hosted receivingantenna. In addition, the system comprises the first communicationsecurity module to encrypt unencrypted telemetry utilizing the firstCOMSEC variety to generate encrypted telemetry. Additionally, the systemcomprises the payload antenna to transmit the encrypted telemetry to thehost receiving antenna. Also, the system comprises the host receivingantenna to transmit the encrypted telemetry to the host SOC. Further,the system comprises the host SOC to transmit the encrypted telemetry tothe HOC.

In at least one embodiment, a method for a virtual transponder on avehicle comprises generating, by a configuration algorithm (CA), aconfiguration for a portion of a payload on the vehicle utilized by ahost user by using an option for each of at least one variable for theportion of the payload on the vehicle utilized by the host user. Themethod further comprises generating, by the CA, a configuration for aportion of the payload on the vehicle utilized by a hosted user by usingan option for each of at least one variable for the portion of thepayload on the vehicle utilized by the hosted user. Also, the methodcomprises generating, by a host command generator, host commands forreconfiguring the portion of the payload on the vehicle utilized by thehost user by using the configuration for the portion of the payload onthe vehicle utilized by the host user. In addition, the method comprisesgenerating, by a hosted command generator, hosted commands forreconfiguring the portion of the payload on the vehicle utilized by thehosted user by using the configuration for the portion of the payload onthe vehicle utilized by the hosted user. Additionally, the methodcomprises transmitting the host commands and the hosted commands to thevehicle. Also, the method comprises reconfiguring the portion of thepayload on the vehicle utilized by the host user by using the hostcommands. Further the method comprises reconfiguring the portion of thepayload on the vehicle utilized by the hosted user by using the hostedcommands.

In one or more embodiments, at least one variable is: at least onetransponder power, at least one transponder spectrum, at least onetransponder gain setting, at least one transponder limiter setting, atleast one transponder automatic level control setting, at least onetransponder phase setting, at least one internal gain generation,bandwidth for at least one beam, at least one frequency band for atleast one of at least one beam, at least one transponder beamformingsetting, effective isotropic radiation power (EIRP) for at least one ofat least one beam, at least one transponder channel, and/or beamsteering for at least one of at least one beam.

In at least one embodiment, the reconfiguring comprises reconfiguring:at least one antenna, at least one analog-to-digital converter, at leastone digital-to-analog converter, at least one beamformer, at least onedigital channelizer, at least one demodulator, at least one modulator,at least one digital switch matrix, at least one digital combiner,and/or at least one analog switch matrix.

In one or more embodiments, at least one antenna a parabolic reflectorantenna, a shaped reflector antenna, a multifeed array antenna, and/or aphased array antenna.

In at least one embodiment, the host computing device and the hostedcomputing device are located at a respective station. In someembodiments, the station a ground station, a terrestrial vehicle, anairborne vehicle, or a marine vehicle.

In one or more embodiments, the vehicle is an airborne vehicle. In someembodiments, the airborne vehicle is a satellite, an aircraft, anunmanned aerial vehicle (UAV), or a space plane.

In at least one embodiment, the method further comprises selecting, witha host graphical user interface (GUI) on a host computing device, theoption for each of at least one variable for the portion of the payloadon the vehicle utilized by the host user.

In one or more embodiments, the method further comprises selecting, witha hosted GUI on a hosted computing device, the option for each of atleast one variable for the portion of the payload on the vehicleutilized by the hosted user.

In at least one embodiment, a system for a virtual transponder on avehicle comprises a configuration algorithm (CA) to generate aconfiguration for a portion of a payload on the vehicle utilized by ahost user by using an option for each of at least one variable for theportion of the payload on the vehicle utilized by the host user, and togenerate a configuration for a portion of the payload on the vehicleutilized by a hosted user by using an option for each of at least onevariable for the portion of the payload on the vehicle utilized by thehosted user. The system further comprises a host command generator togenerate host commands for reconfiguring the portion of the payload onthe vehicle utilized by the host user by using the configuration for theportion of the payload on the vehicle utilized by the host user.Further, the system comprises a hosted command generator to generatehosted commands for reconfiguring the portion of the payload on thevehicle utilized by the hosted user by using the configuration for theportion of the payload on the vehicle utilized by the hosted user. Inone or more embodiments, the portion of the payload on the vehicleutilized by the host user is reconfigured by using the host commands. Insome embodiments, the portion of the payload on the vehicle utilized bythe hosted user is reconfigured by using the hosted commands.

In one or more embodiments, the system further comprises a hostgraphical user interface (GUI), on a host computing device, used toselect the option for each of at least one variable for the portion ofthe payload on the vehicle utilized by the host user.

In at least one embodiment, the system further comprises a hosted GUI,on a hosted computing device, used to select the option for each of atleast one variable for the portion of the payload on the vehicleutilized by the hosted user.

In one or more embodiments, a method for inband telemetry for a virtualtransponder comprises transmitting, by a payload antenna on a vehicle, apayload signal to a hosted receiving antenna. The method furthercomprises transmitting, by the payload antenna, a hosted telemetrysignal to the hosted receiving antenna. In one or more embodiments, thehosted telemetry signal and the payload signal are transmitted on a samefrequency band.

In one or more embodiments, the hosted telemetry signal comprises ascript comprising telemetry data related to the hosted payloadconfiguration, where the script has a duration of time equal to a mastercycle time and the script is repeated within the hosted telemetrysignal.

In at least one embodiment, the hosted telemetry signal comprises hostedtelemetry data related to the hosted payload configuration comprisingsubchannel power (SCP), analog spectrum monitoring configuration (ASMS),analog random access memory (ANARAM), switch configuration, limiterconfiguration, subchannel automatic level control (SALC), and/orsubchannel gain (SCG).

In one or more embodiments, each different type of the hosted telemetrydata related to the hosted payload configuration has an associatedrefresh rate.

In at least one embodiment, each different type of the hosted telemetrydata related to the hosted payload configuration has an associatednumber of times it is repeated during a script cycle time.

In one or more embodiments, the hosted telemetry signal comprisesencrypted hosted telemetry.

In at least one embodiment, a method for inband telemetry for a virtualtransponder comprises transmitting, by a payload antenna on a vehicle, apayload signal to a host receiving antenna. The method further comprisestransmitting, by the payload antenna, a host telemetry signal to thehost receiving antenna. In one or more embodiments, the host telemetrysignal and the payload signal are transmitted on a same frequency band.

In one or more embodiments, the hosted telemetry signal comprises ascript comprising telemetry data related to the host payloadconfiguration, where the script has a duration of time equal to a mastercycle time and the script is repeated within the hosted telemetrysignal.

In at least one embodiment, the host telemetry signal comprises hosttelemetry data related to the host payload configuration comprisingsubchannel power (SCP), analog spectrum monitoring configuration (ASMS),analog random access memory (ANARAM), switch configuration, limiterconfiguration, subchannel automatic level control (SALC), and/orsubchannel gain (SCG).

In one or more embodiments, each different type of the host telemetrydata related to the host payload configuration has an associated refreshrate.

In at least one embodiment, each different type of the host telemetrydata related to the host payload configuration has an associated numberof times it is repeated during a script cycle time.

In one or more embodiments, the host telemetry signal comprisesencrypted host telemetry.

In at least one embodiment, a method for inband telemetry for a virtualtransponder comprises transmitting, by a payload antenna on a vehicle, ahost payload signal to a host receiving antenna. The method furthercomprises transmitting, by the payload antenna, a hosted payload signalto a hosted receiving antenna. Also, the method comprises transmitting,by the payload antenna, a host telemetry signal to the host receivingantenna. Further the method comprises transmitting, by the payloadantenna, a hosted telemetry signal to the hosted receiving antenna. Inone or more embodiments, the host telemetry signal and the hostedtelemetry signal are transmitted on a same frequency band.

In one or more embodiments, the host telemetry signal comprises a hostscript comprising host telemetry data related to the host payloadconfiguration, where the host script has a duration of time equal to ahost master cycle time and the host script is repeated within the hosttelemetry signal. In at least one embodiment, the hosted telemetrysignal comprises a hosted script comprising hosted telemetry datarelated to the hosted payload configuration, where the script has aduration of time equal to a hosted master cycle time and the script isrepeated within the hosted telemetry signal.

In at least one embodiment, the host telemetry signal comprises hosttelemetry data related to the host payload configuration comprisingsubchannel power (SCP), analog spectrum monitoring configuration (ASMS),analog random access memory (ANARAM), switch configuration, limiterconfiguration, subchannel automatic level control (SALC), and/orsubchannel gain (SCG). In one or more embodiments, the hosted telemetrysignal comprises hosted telemetry data related to the hosted payloadconfiguration comprising subchannel power (SCP), analog spectrummonitoring configuration (ASMS), analog random access memory (ANARAM),switch configuration, limiter configuration, subchannel automatic levelcontrol (SALC), and/or subchannel gain (SCG).

In one or more embodiments, each different type of the host telemetrydata related to the host payload configuration has an associated hostrefresh rate. In at least one embodiment, each different type of thehosted telemetry data related to the hosted payload configuration has anassociated hosted refresh transmission rate.

In at least one embodiment, each different type of the host telemetrydata related to the host payload configuration has an associated numberof times it is repeated during a host script cycle time. In one or moreembodiments, each different type of the hosted telemetry data related tothe hosted payload configuration has an associated number of times it isrepeated during a hosted script cycle time.

In one or more embodiments, the host telemetry signal comprisesencrypted host telemetry, and the hosted telemetry signal comprisesencrypted hosted telemetry. In at least one embodiment, the encryptedhost telemetry is encrypted utilizing a first COMSEC variety, and theencrypted hosted telemetry is encrypted utilizing a second COMSECvariety.

In at least one embodiment, the host telemetry signal and the hostedtelemetry signal are transmitted on the same frequency band utilizingtime division multiple access (TDMA).

In one or more embodiments, a method for inband telemetry for a virtualtransponder comprises transmitting, by a payload antenna on a vehicle, ahost payload signal to a host receiving antenna. The method furthercomprises transmitting, by the payload antenna, a hosted payload signalto a hosted receiving antenna. Also, the method comprises transmitting,by the payload antenna, a host telemetry signal to the host receivingantenna. In one or more embodiments, the host telemetry signal and thehost payload signal are transmitted on a host frequency band. Further,the method comprises transmitting, by the payload antenna, a hostedtelemetry signal to the hosted receiving antenna. In one or moreembodiments, the hosted telemetry signal and the hosted payload signalare transmitted on a hosted frequency band.

In at least one embodiment, a system for inband telemetry for a virtualtransponder comprises a vehicle. The system further comprises a payloadantenna on the vehicle to transmit a payload signal to a hostedreceiving antenna, and to transmit a hosted telemetry signal to thehosted receiving antenna. In some embodiments, the hosted telemetrysignal and the payload signal are transmitted on a same frequency band.

In one or more embodiments, a system for inband telemetry for a virtualtransponder comprises a vehicle. The system further comprises a payloadantenna on the vehicle to transmit a host payload signal to a hostreceiving antenna, to transmit a hosted payload signal to a hostedreceiving antenna, to transmit a host telemetry signal to the hostreceiving antenna, and to transmit a hosted telemetry signal to thehosted receiving antenna. In some embodiments, the host telemetry signaland the hosted telemetry signal are transmitted on a same frequencyband.

In at least one embodiment, a system for inband telemetry for a virtualtransponder comprises a vehicle. The system further comprises a payloadantenna on a vehicle to transmit a host payload signal to a hostreceiving antenna, to transmit a hosted payload signal to a hostedreceiving antenna, to transmit a host telemetry signal to the hostreceiving antenna, and to transmit a hosted telemetry signal to thehosted receiving antenna. In at least one embodiment, the host telemetrysignal and the host payload signal are transmitted on a host frequencyband. In some embodiments, the hosted telemetry signal and the hostedpayload signal are transmitted on a hosted frequency band.

The features, functions, and advantages can be achieved independently invarious embodiments of the present disclosure or may be combined in yetother embodiments.

DRAWINGS

These and other features, aspects, and advantages of the presentdisclosure will become better understood with regard to the followingdescription, appended claims, and accompanying drawings where:

FIG. 1 is a diagram showing simplified architecture for the disclosedsystem for a virtual transponder, in accordance with at least oneembodiment of the present disclosure.

FIGS. 2A-9H show exemplary systems and methods for a virtual transponderutilizing inband telemetry, in accordance with at least one embodimentof the present disclosure.

FIG. 2A is a diagram showing the disclosed system for a virtualtransponder utilizing inband telemetry for the hosted user beingtransmitted to a hosted receiving antenna, in accordance with at leastone embodiment of the present disclosure.

FIG. 2B is a diagram showing the disclosed system for a virtualtransponder utilizing inband telemetry for the hosted user beingtransmitted to a host receiving antenna, in accordance with at least oneembodiment of the present disclosure.

FIGS. 3A, 3B, 3C, and 3D together show a flow chart for the disclosedmethod for a virtual transponder utilizing inband telemetry for thehosted user being transmitted to a hosted receiving antenna, inaccordance with at least one embodiment of the present disclosure.

FIGS. 3E, 3F, 3G, and 3H together show a flow chart for the disclosedmethod for a virtual transponder utilizing inband telemetry for thehosted user being transmitted to a host receiving antenna, in accordancewith at least one embodiment of the present disclosure.

FIG. 4 is a diagram showing the disclosed system for a virtualtransponder utilizing inband telemetry for the host user, in accordancewith at least one embodiment of the present disclosure.

FIGS. 5A, 5B, 5C, and 5D together show a flow chart for the disclosedmethod for a virtual transponder utilizing inband telemetry for the hostuser, in accordance with at least one embodiment of the presentdisclosure.

FIG. 6A is a diagram showing the disclosed system for a virtualtransponder utilizing inband telemetry for the host user and the hosteduser being transmitted to a host receiving antenna and a hostedreceiving antenna, in accordance with at least one embodiment of thepresent disclosure.

FIG. 6B is a diagram showing the disclosed system for a virtualtransponder utilizing inband telemetry for the host user and the hosteduser being transmitted to a host receiving antenna, in accordance withat least one embodiment of the present disclosure.

FIGS. 7A, 7B, 7C, and 7D together show a flow chart for the disclosedmethod for a virtual transponder utilizing inband telemetry for the hostuser and the hosted user being transmitted to a host receiving antennaand a hosted receiving antenna, in accordance with at least oneembodiment of the present disclosure.

FIGS. 7E, 7F, 7G, and 7H together show a flow chart for the disclosedmethod for a virtual transponder utilizing inband telemetry for the hostuser and the hosted user being transmitted to a host receiving antenna,in accordance with at least one embodiment of the present disclosure.

FIG. 8A is a diagram showing the disclosed system for a virtualtransponder utilizing inband telemetry for the host user and the hosteduser being transmitted to a host receiving antenna and a hostedreceiving antenna, where the telemetry is encrypted utilizing a singlecommunication security (COMSEC) variety, in accordance with at least oneembodiment of the present disclosure.

FIG. 8B is a diagram showing the disclosed system for a virtualtransponder utilizing inband telemetry for the host user and the hosteduser being transmitted to a host receiving antenna, where the telemetryis encrypted utilizing a single communication security (COMSEC) variety,in accordance with at least one embodiment of the present disclosure.

FIGS. 9A, 9B, 9C, and 9D together show a flow chart for the disclosedmethod for a virtual transponder utilizing inband telemetry for the hostuser and the hosted user being transmitted to a host receiving antennaand a hosted receiving antenna, where the telemetry is encryptedutilizing a single COMSEC variety, in accordance with at least oneembodiment of the present disclosure.

FIGS. 9E, 9F, 9G, and 9H together show a flow chart for the disclosedmethod for a virtual transponder utilizing inband telemetry for the hostuser and the hosted user being transmitted to a host receiving antenna,where the telemetry is encrypted utilizing a single COMSEC variety, inaccordance with at least one embodiment of the present disclosure.

FIG. 10 is a diagram showing the disclosed system for a virtualtransponder on a vehicle, in accordance with at least one embodiment ofthe present disclosure.

FIG. 11 is a diagram showing an exemplary allocation of bandwidthamongst a plurality of beams when utilizing the disclosed virtualtransponder, in accordance with at least one embodiment of the presentdisclosure.

FIG. 12 is a diagram showing the switch architecture for a flexibleallocation of bandwidth amongst a plurality of beams when utilizing thedisclosed virtual transponder, in accordance with at least oneembodiment of the present disclosure.

FIG. 13 is a diagram showing details of the digital channelizer of FIG.12, in accordance with at least one embodiment of the presentdisclosure.

FIG. 14 is a diagram showing exemplary components on the vehicle thatmay be utilized by the disclosed virtual transponder, in accordance withat least one embodiment of the present disclosure.

FIGS. 15A and 15B together show a flow chart for the disclosed methodfor a virtual transponder on a vehicle, in accordance with at least oneembodiment of the present disclosure.

FIG. 16 is a diagram showing an exemplary script for inband telemetryfor the hosted user, in accordance with at least one embodiment of thepresent disclosure.

FIG. 17 is a diagram showing an exemplary script for inband telemetryfor the host user, in accordance with at least one embodiment of thepresent disclosure.

FIG. 18 is a diagram showing an exemplary script for inband telemetryfor the host user and the hosted user, in accordance with at least oneembodiment of the present disclosure.

FIG. 19 is a diagram showing two exemplary scripts for inband telemetryfor the host user and the hosted user, in accordance with at least oneembodiment of the present disclosure.

DESCRIPTION

The methods and apparatus disclosed herein provide an operative systemfor virtual transponders utilizing inband telemetry. The system of thepresent disclosure allows for vehicle operators to privately sharevehicle resources. It should be noted that in this disclosure, in-bandfrequency band(s) refer to a frequency band(s) that is the samefrequency band(s) utilized to transmit payload data; and out-of-bandfrequency band(s) refer to a frequency band(s) that is not the samefrequency band(s) utilized to transmit payload data.

As previously mentioned above, currently, typical transponders on avehicle (e.g., a satellite) have the ability to perform switching ofinputs to outputs of the payload. All of this switching on the payloadis commanded and controlled by a single satellite controller with noresource allocation privacy. For example, in a digital transponder, whena user request for a channel with specific bandwidth and antennacharacteristics is made, the channel is then set up, used, and thendisconnected.

The disclosed system allows for private vehicle resource allocation andcontrol that provides vehicle users the ability to privately,dynamically, allocate resources on demand. In particular, the disclosedsystem employs a virtual transponder, which is a transponder partitionedinto multiple transponders with independent command and control. In oneor more embodiments, an exemplary virtual transponder includes a digitaltransponder with a digital channelizer, a digital switch matrix, and adigital combiner that is configured to partition a digital transponderinto multiple transponders with independent command and control. Commandand control of the virtual transponder is achieved via ground softwarethat provides dynamic allocation and privatization of the digital switchmatrix for bandwidth on demand.

It should be noted that the disclosed system for private vehicleresource allocation and control may employ various different types oftransponders for the virtual transponder other than the specificdisclosed embodiments (e.g., depicted FIGS. 12-14) for the virtualtransponder. For example, various different types of transponders may beemployed for the virtual transponder including, but not limited to,various different types of digital transponders, various different typesof analog transponders (e.g., conventional repeater-type transponders),and various different types of combination analog/digital transponders.

In the following description, numerous details are set forth in order toprovide a more thorough description of the system. It will be apparent,however, to one skilled in the art, that the disclosed system may bepracticed without these specific details. In the other instances, wellknown features have not been described in detail so as not tounnecessarily obscure the system.

Embodiments of the present disclosure may be described herein in termsof functional and/or logical components and various processing steps. Itshould be appreciated that such components may be realized by any numberof hardware, software, and/or firmware components configured to performthe specified functions. For example, an embodiment of the presentdisclosure may employ various integrated circuit components (e.g.,memory elements, digital signal processing elements, logic elements,look-up tables, or the like), which may carry out a variety of functionsunder the control of one or more processors, microprocessors, or othercontrol devices. In addition, those skilled in the art will appreciatethat embodiments of the present disclosure may be practiced inconjunction with other components, and that the system described hereinis merely one example embodiment of the present disclosure.

For the sake of brevity, conventional techniques and components relatedto satellite communication systems, and other functional aspects of thesystem (and the individual operating components of the systems) may notbe described in detail herein. Furthermore, the connecting lines shownin the various figures contained herein are intended to representexample functional relationships and/or physical couplings between thevarious elements. It should be noted that many alternative or additionalfunctional relationships or physical connections may be present in anembodiment of the present disclosure.

FIG. 1 is a diagram 100 showing simplified architecture for thedisclosed system for a virtual transponder, in accordance with at leastone embodiment of the present disclosure. In this figure, a simplifiedview of multiple possible hosted payload configurations is illustrated.In particular, this figure shows a space segment 110 and a groundsegment 120. The space segment 110 represents a vehicle. Variousdifferent types of vehicles may be employed for the vehicle including,but not limited to, an airborne vehicle. And, various different types ofairborne vehicles may be employed for the vehicle including, but notlimited to, a satellite, an aircraft, an unmanned aerial vehicle (UAV),and a space plane.

In the case of a satellite being employed for the vehicle, it should benoted that satellites typically include computer-controlled systems. Asatellite generally includes a bus 130 and a payload 140. The bus 130may include systems (which include components) that control thesatellite. These systems perform tasks, such as power generation andcontrol, thermal control, telemetry, attitude control, orbit control,and other suitable operations.

The payload 140 of the satellite provides functions to users of thesatellite. The payload 140 may include antennas, transponders, and othersuitable devices. For example, with respect to communications, thepayload 140 in a satellite may be used to provide Internet access,telephone communications, radio, television, and other types ofcommunications.

The payload 140 of the satellite may be used by different entities. Forexample, the payload 140 may be used by the owner of the satellite (i.e.the host user), one or more customers (i.e. the hosted user(s)), or somecombination thereof.

For example, the owner of a satellite may lease different portions ofthe payload 140 to different customers. In one example, one group ofantenna beams generated by the payload 140 of the satellite may beleased to one customer, while a second group of antenna beams may beleased to a second customer. In another example, one group of antennabeams generated by the payload 140 of the satellite may be utilized bythe owner of the satellite, while a second group of antenna beams may beleased to a customer. In yet another example, some or all of the antennabeams generated by the payload 140 of the satellite may be shared by onecustomer and a second customer. In another example, some or all of theantenna beams generated by the payload 140 of the satellite may beshared by the owner of the satellite and a customer. When satellites areshared by different users, users may have a shared communications link(e.g., Interface A) to the satellite, or each user may have a separatecommunications link (e.g., Interfaces A and D) to the satellite.

Leasing a satellite to multiple customers may increase the revenues thatan owner of a satellite can obtain. Further, a customer may use a subsetof the total resources in a satellite for a cost that is less than thecost for the customer to purchase and operate a satellite, to build andoperate a satellite, or to lease an entire satellite.

Referring back to FIG. 1, the ground segment 120 comprises a hostspacecraft operations center (SOC) (e.g., a ground station associatedwith the owner of the satellite) 150, and a hosted payload (HoP)operation center(s) (HOC(s)) (e.g., a ground station(s) associated witha customer(s) that is leasing at least a portion of the payload of thesatellite from the owner) 160.

FIG. 1 shows a number of different possible communication links (i.e.Interfaces A-E). It should be noted that the disclosed system may employsome or all of these illustrated communication links. Interface A, whichmay comprise multiple links, is an out-of-band command and telemetrylink from the host SOC 150 to command the satellite. Interface B, whichmay comprise multiple links, is a communication link, between the bus130 and the payload 140. Interface B may be used to control essentialitems, such as power. Information that may be communicated from the bus130 to the payload 140 via Interface B may include, but is not limitedto, time, ephemeris, and payload commands. Information that may becommunicated from the payload 140 to the bus 130 via Interface B mayinclude, but is not limited to, payload telemetry.

Interface C, which may comprise multiple links, is an inband command andtelemetry link for bus and/or payload. Interface D, which may comprisemultiple links, is a command and telemetry link from the HOC(s) 160 tocommand the satellite. Interface E, which may comprise multiple links,between the host SOC 150 and the HOCs 160 allows for requests from theHOCs for resource sharing of the payload 140.

FIGS. 2A-9H show exemplary systems and methods for a virtual transponderutilizing inband telemetry, in accordance with at least one embodimentof the present disclosure.

FIG. 2A is a diagram 200 showing the disclosed system for a virtualtransponder utilizing inband telemetry for the hosted user (i.e. theHOC) 260 being transmitted to a hosted receiving antenna 290, inaccordance with at least one embodiment of the present disclosure. Inthis figure, a vehicle 210, a host SOC 250, and a HOC 260 are shown. TheHOC 260 has leased at least a portion (e.g., a virtual transponder(s))of the payload 205 of the vehicle 210 from the owner of a satellite(i.e. the host SOC) 250. It should be noted that in some embodiments,the HOC 260 may lease all of the payload 205 of the vehicle 210 from theowner of a satellite (i.e. the host SOC) 250. Also, it should be notedthat in some embodiments, the HOC 260 may own the payload 205 (e.g., asteerable antenna) of the vehicle 210, and contract the host SOC 250 totransmit encrypted hosted commands to the vehicle 210.

During operation, the HOC 260 encrypts unencrypted hosted commands (i.e.unencrypted HoP CMD), by utilizing a second communication security(COMSEC) variety, to produce encrypted hosted commands (i.e. encryptedHoP CMD). The hosted commands are commands that are used to configurethe portion (i.e. a virtual transponder(s)) of the payload 205 that theHOC 260 is leasing from the host SOC 250. The host SOC 250 encryptsunencrypted host commands (i.e. unencrypted host CMD), by utilizing afirst COMSEC variety, to produce encrypted host commands (i.e. encryptedhost CMD). The host commands are commands that are used to configure theportion (e.g., a transponder(s)) of the payload 205 that host SOC 250 isutilizing for itself.

It should be noted that, although in FIG. 2A the host SOC 250 isdepicted to have its ground antenna located right next to its operationsbuilding; in other embodiments, the host SOC 250 may have its groundantenna located very far away from the its operations building (e.g.,the ground antenna may be located in another country than the operationsbuilding).

Also, it should be noted that the first COMSEC variety may include atleast one encryption key and/or at least one algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm). Additionally, itshould be noted that the second COMSEC variety may include at least oneencryption key and/or at least one encryption algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm).

The HOC 260 then transmits 215 the encrypted hosted commands to the hostSOC 250. After the host SOC 250 receives the encrypted hosted commands,the host SOC 250 transmits 220 the encrypted host commands and transmits225 the encrypted hosted commands to the vehicle 210. The host SOC 250transmits 220, 225 the encrypted host commands and the encrypted hostedcommands utilizing an out-of-band frequency band(s) (i.e. a frequencyband(s) that is not the same frequency band(s) utilized to transmitpayload data). The host command receiver 235 on the vehicle 210 receivesthe encrypted host commands. In addition, the hosted command receiver245 on the vehicle 210 receives the encrypted hosted commands.

It should be noted that in other embodiments, the disclosed system for avirtual transponder utilizing inband telemetry may employ more or lessreceivers 235, 245 than as is shown in FIG. 2A.

The host command receiver 235 then transmits 252 the encrypted hostcommands to a first communication security module 262. The firstcommunication security module 262 decrypts the encrypted host commandsutilizing the first COMSEC variety (i.e. COMSEC Variety 1) to generateunencrypted host commands.

It should be noted that the first communication security module 262 maycomprise one or more modules. In addition, the first communicationsecurity module 262 may comprise one or more processors.

The hosted command receiver 245 then transmits 255 the encrypted hostedcommands to a second communication security module 265. The secondcommunication security module 265 decrypts the encrypted hosted commandsutilizing the second COMSEC variety (i.e. COMSEC Variety 2) to generateunencrypted hosted commands.

It should be noted that the second communication security module 265 maycomprise one or more modules. In addition, the second communicationsecurity module 265 may comprise one or more processors.

The first communication security module 262 then transmits 270 theunencrypted host commands to the payload (i.e. the shared host/hostedpayload) 205. The second communication security module 265 transmits 275the unencrypted hosted commands to the payload (i.e. the sharedhost/hosted payload) 205. The payload 205 is reconfigured according tothe unencrypted host commands and/or the unencrypted hosted commands. Apayload antenna 280 then transmits (e.g., in one or more antenna beams281) payload data to a host receiving antenna 285 and/or a hostedreceiving antenna 290 on the ground. It should be noted that in someembodiments, the hosted receiving antenna 290 may be air based, seabased, or ground based, as is shown in FIG. 2A.

Also, it should be noted that, although in FIG. 2A, antenna beams 281 isshown to include a plurality of circular spot beams; in otherembodiments, antenna beams 281 may include more or less number of beamsthan is shown in FIG. 2A (e.g., antenna beams 281 may only include asingle beam), and antenna beams 281 may include beams of differentshapes than circular spot beams as is shown in FIG. 2A (e.g., antennabeams 281 may include elliptical beams and/or shaped beams of variousdifferent shapes).

It should be noted that in one or more embodiments, the payload antenna280 may comprise one or more reflector dishes including, but not limitedto, parabolic reflectors and/or shaped reflectors. In some embodiments,the payload antenna 280 may comprise one or more multifeed antennaarrays.

The payload 205 transmits 291 unencrypted host telemetry (i.e.unencrypted host TLM, which is telemetry data related to the portion ofthe payload 205 that is utilized by the host SOC 250) to the firstcommunication security module 262. The first communication securitymodule 262 then encrypts the unencrypted host telemetry utilizing thefirst COMSEC variety to generate encrypted host telemetry (i.e.encrypted host TLM).

The payload 205 transmits 292 unencrypted hosted telemetry (i.e.unencrypted HoP TLM, which is telemetry data related to the portion ofthe payload 205 that is leased by the HOC 260) to the secondcommunication security module 265. The second communication securitymodule 265 then encrypts the unencrypted hosted telemetry utilizing thesecond COMSEC variety to generate encrypted hosted telemetry (i.e.encrypted HoP TLM).

The first communication security module 262 then transmits 293 theencrypted host telemetry to a host telemetry transmitter 294. The hosttelemetry transmitter 294 then transmits 295 the encrypted hosttelemetry to the host SOC 250. The host SOC 250 then decrypts theencrypted host telemetry utilizing the first COMSEC variety to generatethe unencrypted host telemetry.

The second communication security module 265 then transmits 296 theencrypted hosted telemetry to the payload 205. The payload antenna 280then transmits 297 the encrypted hosted telemetry to the hostedreceiving antenna 290. The payload antenna 280 transmits 297 theencrypted hosted telemetry utilizing an inband frequency band(s) (i.e.at least one frequency band that is the same as at least one frequencyband utilized to transmit payload data). The hosted receiving antenna290 then transmits 298 the encrypted hosted telemetry to the HOC 260.The HOC 260 then decrypts the encrypted hosted telemetry utilizing thesecond COMSEC variety to generate the unencrypted hosted telemetry.

FIG. 2B is a diagram 2000 showing the disclosed system for a virtualtransponder utilizing inband telemetry for the hosted user (i.e. theHOC) 2060 being transmitted to a host receiving antenna 2085, inaccordance with at least one embodiment of the present disclosure. Inthis figure, a vehicle 2010, a host SOC 2050, and a HOC 2060 are shown.The HOC 2060 has leased at least a portion (e.g., a virtualtransponder(s)) of the payload 2005 of the vehicle 2010 from the ownerof a satellite (i.e. the host SOC) 2050. It should be noted that in someembodiments, the HOC 2060 may lease all of the payload 2005 of thevehicle 2010 from the owner of a satellite (i.e. the host SOC) 2050.Also, it should be noted that is some embodiments, the HOC 2060 may ownthe payload 2005 (e.g., a steerable antenna) of the vehicle 2010, andcontract the host SOC 2050 to transmit encrypted hosted commands to thevehicle 2010.

During operation, the HOC 2060 encrypts unencrypted hosted commands(i.e. unencrypted HoP CMD), by utilizing a second communication security(COMSEC) variety, to produce encrypted hosted commands (i.e. encryptedHoP CMD). The hosted commands are commands that are used to configurethe portion (i.e. a virtual transponder(s)) of the payload 2005 that theHOC 2060 is leasing from the host SOC 2050. The host SOC 2050 encryptsunencrypted host commands (i.e. unencrypted host CMD), by utilizing afirst COMSEC variety, to produce encrypted host commands (i.e. encryptedhost CMD). The host commands are commands that are used to configure theportion (e.g., a transponder(s)) of the payload 2005 that host SOC 2050is utilizing for itself.

It should be noted that, although in FIG. 2B the host SOC 2050 isdepicted to have its ground antenna located right next to its operationsbuilding; in other embodiments, the host SOC 2050 may have its groundantenna located very far away from the its operations building (e.g.,the ground antenna may be located in another country than the operationsbuilding).

Also, it should be noted that the first COMSEC variety may include atleast one encryption key and/or at least one algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm). Additionally, itshould be noted that the second COMSEC variety may include at least oneencryption key and/or at least one encryption algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm).

The HOC 2060 then transmits 2015 the encrypted hosted commands to thehost SOC 2050. After the host SOC 2050 receives the encrypted hostedcommands, the host SOC 2050 transmits 2020 the encrypted host commandsand transmits 2025 the encrypted hosted commands to the vehicle 2010.The host SOC 2050 transmits 2020, 2025 the encrypted host commands andthe encrypted hosted commands utilizing an out-of-band frequency band(s)(i.e. a frequency band(s) that is not the same frequency band(s)utilized to transmit payload data). The host command receiver 2035 onthe vehicle 2010 receives the encrypted host commands. In addition, thehosted command receiver 2045 on the vehicle 2010 receives the encryptedhosted commands.

It should be noted that in other embodiments, the disclosed system for avirtual transponder utilizing inband telemetry may employ more or lessreceivers 2035, 2045 than as is shown in FIG. 2B.

The host command receiver 2035 then transmits 2052 the encrypted hostcommands to a first communication security module 2062. The firstcommunication security module 2062 decrypts the encrypted host commandsutilizing the first COMSEC variety (i.e. COMSEC Variety 1) to generateunencrypted host commands.

It should be noted that the first communication security module 2062 maycomprise one or more modules. In addition, the first communicationsecurity module 2062 may comprise one or more processors.

The hosted command receiver 2045 then transmits 2055 the encryptedhosted commands to a second communication security module 2065. Thesecond communication security module 2065 decrypts the encrypted hostedcommands utilizing the second COMSEC variety (i.e. COMSEC Variety 2) togenerate unencrypted hosted commands.

It should be noted that the second communication security module 2065may comprise one or more modules. In addition, the second communicationsecurity module 2065 may comprise one or more processors.

The first communication security module 2062 then transmits 2070 theunencrypted host commands to the payload (i.e. the shared host/hostedpayload) 2005. The second communication security module 2065 transmits2075 the unencrypted hosted commands to the payload (i.e. the sharedhost/hosted payload) 2005. The payload 2005 is reconfigured according tothe unencrypted host commands and/or the unencrypted hosted commands. Apayload antenna 2080 then transmits (e.g., in one or more antenna beams2081) payload data to a host receiving antenna 2085 and/or a hostedreceiving antenna 2090 on the ground. It should be noted that in someembodiments, the hosted receiving antenna 2090 may be air based, seabased, or ground based, as is shown in FIG. 2B.

Also, it should be noted that, although in FIG. 2B, antenna beams 2081is shown to include a plurality of circular spot beams; in otherembodiments, antenna beams 2081 may include more or less number of beamsthan is shown in FIG. 2B (e.g., antenna beams 2081 may only include asingle beam), and antenna beams 2081 may include beams of differentshapes than circular spot beams as is shown in FIG. 2B (e.g., antennabeams 2081 may include elliptical beams and/or shaped beams of variousdifferent shapes).

It should be noted that in one or more embodiments, the payload antenna2080 may comprise one or more reflector dishes including, but notlimited to, parabolic reflectors and/or shaped reflectors. In someembodiments, the payload antenna 2080 may comprise one or more multifeedantenna arrays.

The payload 2005 transmits 2091 unencrypted host telemetry (i.e.unencrypted host TLM, which is telemetry data related to the portion ofthe payload 2005 that is utilized by the host SOC 2050) to the firstcommunication security module 2062. The first communication securitymodule 2062 then encrypts the unencrypted host telemetry utilizing thefirst COMSEC variety to generate encrypted host telemetry (i.e.encrypted host TLM).

The payload 2005 transmits 2092 unencrypted hosted telemetry (i.e.unencrypted HoP TLM, which is telemetry data related to the portion ofthe payload 2005 that is leased by the HOC 2060) to the secondcommunication security module 2065. The second communication securitymodule 2065 then encrypts the unencrypted hosted telemetry utilizing thesecond COMSEC variety to generate encrypted hosted telemetry (i.e.encrypted HoP TLM).

The first communication security module 2062 then transmits 2093 theencrypted host telemetry to a host telemetry transmitter 2094. The hosttelemetry transmitter 2094 then transmits 2095 the encrypted hosttelemetry to the host SOC 2050. The host SOC 2050 then decrypts theencrypted host telemetry utilizing the first COMSEC variety to generatethe unencrypted host telemetry.

The second communication security module 2065 then transmits 2096 theencrypted hosted telemetry to the payload 2005. The payload antenna 2080then transmits 2097 the encrypted hosted telemetry to the host receivingantenna 2085. The payload antenna 2080 transmits 2097 the encryptedhosted telemetry utilizing an inband frequency band(s) (i.e. at leastone frequency band that is the same as at least one frequency bandutilized to transmit payload data). The host receiving antenna 2085 thentransmits 2098 the encrypted hosted telemetry to the host SOC 2050. Thehost SOC 2050 transmits 2099 the encrypted hosted telemetry to the HOC2060. The HOC 2060 then decrypts the encrypted hosted telemetryutilizing the second COMSEC variety to generate the unencrypted hostedtelemetry.

FIGS. 3A, 3B, 3C, and 3D together show a flow chart for the disclosedmethod for a virtual transponder utilizing inband telemetry for thehosted user being transmitted to a hosted receiving antenna, inaccordance with at least one embodiment of the present disclosure. Atthe start 300 of the method, a hosted payload (HoP) operation center(HOC) encrypts unencrypted hosted commands by utilizing a second COMSECvariety to produce encrypted hosted commands 305. Then, the HOCtransmits the encrypted hosted commands to a host spacecraft operationscenter (SOC) 310. The host SOC encrypts unencrypted host commands byutilizing a first COMSEC variety to produce encrypted host commands 315.Then, the host SOC transmits (out-of-band) the encrypted host commandsand the encrypted hosted commands to a vehicle 320.

Then, a host command receiver on the vehicle receives the encrypted hostcommands 325. And, a hosted command receiver on the vehicle receives theencrypted hosted commands 330. The host command receiver transmits theencrypted host commands to a first communication security module 335.The hosted command receiver transmits the encrypted hosted commands to asecond communication security module 340. The first communicationsecurity module then decrypts the encrypted host commands utilizing thefirst COMSEC variety to generate the unencrypted host commands 345. Thesecond communication security module then decrypts the encrypted hostedcommands utilizing the second COMSEC variety to generate the unencryptedhosted commands 350.

The first communication security module then transmits the unencryptedhost commands to the payload 355. The second communication securitymodule then transmits the unencrypted hosted commands to the payload360. Then, the payload is reconfigured according to the unencrypted hostcommands and/or the unencrypted hosted commands 365. A payload antennaon the vehicle then transmits payload data to a host receiving antennaand/or a hosted receiving antenna 370.

Then, the payload transmits to the first communication security moduleunencrypted host telemetry 375. And, the payload transmits to the secondcommunication security module unencrypted hosted telemetry 380. Thefirst communication security module encrypts the unencrypted hosttelemetry utilizing the first COMSEC variety to generate encrypted hosttelemetry 385. And, the second communication security module encryptsthe unencrypted hosted telemetry utilizing the second COMSEC variety togenerate encrypted hosted telemetry 390.

The first communication security module then transmits the encryptedhost telemetry to a host telemetry transmitter 391. Then, the hosttelemetry transmitter transmits the encrypted host telemetry to the hostSOC 392. The host SOC then decrypts the encrypted host telemetryutilizing the first COMSEC variety to generate the unencrypted hosttelemetry 393.

The second communication security module transmits the encrypted hostedtelemetry to the payload 394. Then, the payload antenna transmits theencrypted hosted telemetry to the hosted receiving antenna 395. Thehosted receiving antenna then transmits the encrypted hosted telemetryto the HOC 396. Then, the HOC decrypts the encrypted hosted telemetryutilizing the second COMSEC variety to generate the unencrypted hostedtelemetry 397. Then, the method ends 398.

FIGS. 3E, 3F, 3G, and 3H together show a flow chart for the disclosedmethod for a virtual transponder utilizing inband telemetry for thehosted user being transmitted to a host receiving antenna, in accordancewith at least one embodiment of the present disclosure. At the start3000 of the method, a hosted payload (HoP) operation center (HOC)encrypts unencrypted hosted commands by utilizing a second COMSECvariety to produce encrypted hosted commands 3005. Then, the HOCtransmits the encrypted hosted commands to a host spacecraft operationscenter (SOC) 3010. The host SOC encrypts unencrypted host commands byutilizing a first COMSEC variety to produce encrypted host commands3015. Then, the host SOC transmits (out-of-band) the encrypted hostcommands and the encrypted hosted commands to a vehicle 3020.

Then, a host command receiver on the vehicle receives the encrypted hostcommands 3025. And, a hosted command receiver on the vehicle receivesthe encrypted hosted commands 3030. The host command receiver transmitsthe encrypted host commands to a first communication security module3035. The hosted command receiver transmits the encrypted hostedcommands to a second communication security module 3040. The firstcommunication security module then decrypts the encrypted host commandsutilizing the first COMSEC variety to generate the unencrypted hostcommands 3045. The second communication security module then decryptsthe encrypted hosted commands utilizing the second COMSEC variety togenerate the unencrypted hosted commands 3050.

The first communication security module then transmits the unencryptedhost commands to the payload 3055. The second communication securitymodule then transmits the unencrypted hosted commands to the payload3060. Then, the payload is reconfigured according to the unencryptedhost commands and/or the unencrypted hosted commands 3065. A payloadantenna on the vehicle then transmits payload data to a host receivingantenna and/or a hosted receiving antenna 3070.

Then, the payload transmits to the first communication security moduleunencrypted host telemetry 3075. And, the payload transmits to thesecond communication security module unencrypted hosted telemetry 3080.The first communication security module encrypts the unencrypted hosttelemetry utilizing the first COMSEC variety to generate encrypted hosttelemetry 3085. And, the second communication security module encryptsthe unencrypted hosted telemetry utilizing the second COMSEC variety togenerate encrypted hosted telemetry 3090.

The first communication security module then transmits the encryptedhost telemetry to a host telemetry transmitter 3091. Then, the hosttelemetry transmitter transmits the encrypted host telemetry to the hostSOC 3092. The host SOC then decrypts the encrypted host telemetryutilizing the first COMSEC variety to generate the unencrypted hosttelemetry 3093.

The second communication security module transmits the encrypted hostedtelemetry to the payload 3094. Then, the payload antenna transmits theencrypted hosted telemetry to the host receiving antenna 3095. The hostreceiving antenna then transmits the encrypted hosted telemetry to thehost SOC 3096. The host SOC transmits the encrypted hosted telemetry tothe HOC 3097. Then, the HOC decrypts the encrypted hosted telemetryutilizing the second COMSEC variety to generate the unencrypted hostedtelemetry 3098. Then, the method ends 3099.

FIG. 4 is a diagram 400 showing the disclosed system for a virtualtransponder utilizing inband telemetry for the host user (i.e. the hostSOC) 450, in accordance with at least one embodiment of the presentdisclosure. In this figure, a vehicle 410, a host SOC 450, and a HOC 460are shown. The HOC 460 has leased at least a portion (i.e. a virtualtransponder(s)) of the payload 405 of the vehicle 410 from the owner ofa satellite (i.e. the host SOC) 450. It should be noted that in someembodiments, the HOC 460 may lease all of the payload 405 of the vehicle410 from the owner of a satellite (i.e. the host SOC) 450. Also, itshould be noted that is some embodiments, the HOC 460 may own thepayload 405 (e.g., a steerable antenna) of the vehicle 410, and contractthe host SOC 450 to transmit encrypted hosted commands to the vehicle410.

During operation, the HOC 460 encrypts unencrypted hosted commands (i.e.unencrypted HoP CMD), by utilizing a second COMSEC variety, to produceencrypted hosted commands (i.e. encrypted HoP CMD). The hosted commandsare commands that are used to configure the portion (i.e. a virtualtransponder(s)) of the payload 405 that the HOC 460 is leasing from thehost SOC 450. The host SOC 450 encrypts unencrypted host commands (i.e.unencrypted host CMD), by utilizing a first COMSEC variety, to produceencrypted host commands (i.e. encrypted host CMD). The host commands arecommands that are used to configure the portion (e.g., a transponder(s))of the payload 405 that host SOC 450 is utilizing for itself.

It should be noted that, although in FIG. 4 the host SOC 450 is depictedto have its ground antenna located right next to its operationsbuilding; in other embodiments, the host SOC 450 may have its groundantenna located very far away from the its operations building (e.g.,the ground antenna may be located in another country than the operationsbuilding).

Also, it should be noted that the first COMSEC variety may include atleast one encryption key and/or at least one algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm). Additionally, itshould be noted that the second COMSEC variety may include at least oneencryption key and/or at least one encryption algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm).

The HOC 460 then transmits 415 the encrypted hosted commands to the hostSOC 450. After the host SOC 450 receives the encrypted hosted commands,the host SOC 450 transmits 420 the encrypted host commands and transmits425 the encrypted hosted commands to the vehicle 410. The host SOC 450transmits 420, 425 the encrypted host commands and the encrypted hostedcommands utilizing an out-of-band frequency band(s) (i.e. a frequencyband(s) that is not the same frequency band(s) utilized to transmitpayload data). The host command receiver 435 on the vehicle 410 receivesthe encrypted host commands. In addition, the hosted command receiver445 on the vehicle 410 receives the encrypted hosted commands.

It should be noted that in other embodiments, the disclosed system for avirtual transponder utilizing inband telemetry may employ more or lessreceivers 435, 445 than as is shown in FIG. 4.

The host command receiver 435 then transmits 452 the encrypted hostcommands to a first communication security module 462. The firstcommunication security module 462 decrypts the encrypted host commandsutilizing the first COMSEC variety (i.e. COMSEC Variety 1) to generateunencrypted host commands.

It should be noted that the first communication security module 462 maycomprise one or more modules. In addition, the first communicationsecurity module 462 may comprise one or more processors.

The hosted command receiver 445 then transmits 455 the encrypted hostedcommands to a second communication security module 465. The secondcommunication security module 465 decrypts the encrypted hosted commandsutilizing the second COMSEC variety (i.e. COMSEC Variety 2) to generateunencrypted hosted commands.

It should be noted that the second communication security module 465 maycomprise one or more modules. In addition, the second communicationsecurity module 465 may comprise one or more processors.

The first communication security module 462 then transmits 470 theunencrypted host commands to the payload (i.e. the shared host/hostedpayload) 405. The second communication security module 465 transmits 475the unencrypted hosted commands to the payload (i.e. the sharedhost/hosted payload) 405. The payload 405 is reconfigured according tothe unencrypted host commands and/or the unencrypted hosted commands. Apayload antenna 480 then transmits (e.g., in one or more antenna beams481) payload data to a host receiving antenna 485 and/or a hostedreceiving antenna 490 on the ground. It should be noted that in someembodiments, the hosted receiving antenna 490 may be air based, seabased, or ground based, as is shown in FIG. 4.

Also, it should be noted that, although in FIG. 4, antenna beams 481 isshown to include a plurality of circular spot beams; in otherembodiments, antenna beams 481 may include more or less number of beamsthan is shown in FIG. 4 (e.g., antenna beams 481 may only include asingle beam), and antenna beams 481 may include beams of differentshapes than circular spot beams as is shown in FIG. 4 (e.g., antennabeams 481 may include elliptical beams and/or shaped beams of variousdifferent shapes).

It should be noted that in one or more embodiments, the payload antenna480 may comprise one or more reflector dishes including, but not limitedto, parabolic reflectors and/or shaped reflectors. In some embodiments,the payload antenna 480 may comprise one or more multifeed antennaarrays.

The payload 405 transmits 491 unencrypted host telemetry (i.e.unencrypted host TLM, which is telemetry data related to the portion ofthe payload 405 that is utilized by the host SOC 450) to the firstcommunication security module 462. The first communication securitymodule 462 then encrypts the unencrypted host telemetry utilizing thefirst COMSEC variety to generate encrypted host telemetry (i.e.encrypted host TLM).

The payload 405 transmits 492 unencrypted hosted telemetry (i.e.unencrypted HoP TLM, which is telemetry data related to the portion ofthe payload 405 that is leased by the HOC 460) to the secondcommunication security module 465. The second communication securitymodule 465 then encrypts the unencrypted hosted telemetry utilizing thesecond COMSEC variety to generate encrypted hosted telemetry (i.e.encrypted HoP TLM).

The first communication security module 462 then transmits 493 theencrypted host telemetry to the payload 405. The payload antenna 480then transmits 497 the encrypted host telemetry to the host receivingantenna 485. The payload antenna 480 transmits 497 the encrypted hosttelemetry utilizing an inband frequency band(s) (i.e. at least onefrequency band that is the same as at least one frequency band utilizedto transmit payload data). The host receiving antenna 485 then transmits498 the encrypted host telemetry to the host SOC 450. The host SOC 450then decrypts the encrypted host telemetry utilizing the first COMSECvariety to generate the unencrypted host telemetry.

The second communication security module 465 then transmits 496 theencrypted hosted telemetry to a hosted telemetry transmitter 494. Thehosted telemetry transmitter 494 then transmits 495 the encrypted hostedtelemetry to the host SOC 450. The host SOC 450 then transmits 499 theencrypted hosted telemetry to the HOC 460. The HOC 460 then decrypts theencrypted hosted telemetry utilizing the second COMSEC variety togenerate the unencrypted hosted telemetry.

FIGS. 5A, 5B, 5C, and 5D together show a flow chart for the disclosedmethod for a virtual transponder utilizing inband telemetry for the hostuser, in accordance with at least one embodiment of the presentdisclosure. At the start 500 of the method, a hosted payload (HoP)operation center (HOC) encrypts unencrypted hosted commands by utilizinga second COMSEC variety to produce encrypted hosted commands 505. Then,the HOC transmits the encrypted hosted commands to a host spacecraftoperations center (SOC) 510. The host SOC encrypts unencrypted hostcommands by utilizing a first COMSEC variety to produce encrypted hostcommands 515. Then, the host SOC transmits (out-of-band) the encryptedhost commands and the encrypted hosted commands to a vehicle 520.

Then, a host command receiver on the vehicle receives the encrypted hostcommands 525. And, a hosted command receiver on the vehicle receives theencrypted hosted commands 530. The host command receiver transmits theencrypted host commands to a first communication security module 535.The hosted command receiver transmits the encrypted hosted commands to asecond communication security module 540. The first communicationsecurity module then decrypts the encrypted host commands utilizing thefirst COMSEC variety to generate the unencrypted host commands 545. Thesecond communication security module then decrypts the encrypted hostedcommands utilizing the second COMSEC variety to generate the unencryptedhosted commands 550.

The first communication security module then transmits the unencryptedhost commands to the payload 555. The second communication securitymodule then transmits the unencrypted hosted commands to the payload560. Then, the payload is reconfigured according to the unencrypted hostcommands and/or the unencrypted hosted commands 565. A payload antennaon the vehicle then transmits payload data to a host receiving antennaand/or a hosted receiving antenna 570.

Then, the payload transmits to the first communication security moduleunencrypted host telemetry 575. And, the payload transmits to the secondcommunication security module unencrypted hosted telemetry 580. Thefirst communication security module encrypts the unencrypted hosttelemetry utilizing the first COMSEC variety to generate encrypted hosttelemetry 585. And, the second communication security module encryptsthe unencrypted hosted telemetry utilizing the second COMSEC variety togenerate encrypted hosted telemetry 590.

The first communication security module then transmits the encryptedhost telemetry to the payload 591. Then, the payload antenna transmitsthe encrypted host telemetry to the host receiving antenna 592. The hostreceiving antenna transmits the encrypted host telemetry to the host SOC593. Then, the host SOC decrypts the encrypted host telemetry utilizingthe first COMSEC variety to generate the unencrypted host telemetry 594.

The second communication security module then transmits the encryptedhosted telemetry to a hosted telemetry transmitter 595. Then, the hostedtelemetry transmitter transmits the encrypted hosted telemetry to thehost SOC 596. The host SOC transmits the encrypted hosted telemetry tothe HOC 597. Then, the HOC decrypts the encrypted hosted telemetryutilizing the second COMSEC variety to generate the unencrypted hostedtelemetry 598. Then, the method ends 599.

FIG. 6A is a diagram 600 showing the disclosed system for a virtualtransponder utilizing inband telemetry for the host user (i.e. the hostSOC) 650 and the hosted user (i.e. the HOC) 660 being transmitted to ahost receiving antenna 685 and a hosted receiving antenna 690, inaccordance with at least one embodiment of the present disclosure. Inthis figure, a vehicle 610, a host SOC 650, and a HOC 660 are shown. TheHOC 660 has leased at least a portion (i.e. a virtual transponder(s)) ofthe payload 605 of the vehicle 610 from the owner of a satellite (i.e.the host SOC) 650. It should be noted that in some embodiments, the HOC660 may lease all of the payload 605 of the vehicle 610 from the ownerof a satellite (i.e. the host SOC) 650. Also, it should be noted that issome embodiments, the HOC 660 may own the payload 605 (e.g., a steerableantenna) of the vehicle 610, and contract the host SOC 650 to transmitencrypted hosted commands to the vehicle 610.

During operation, the HOC 660 encrypts unencrypted hosted commands (i.e.unencrypted HoP CMD), by utilizing a second COMSEC variety, to produceencrypted hosted commands (i.e. encrypted HoP CMD). The hosted commandsare commands that are used to configure the portion (i.e. a virtualtransponder(s)) of the payload 605 that the HOC 660 is leasing from thehost SOC 650. The host SOC 650 encrypts unencrypted host commands (i.e.unencrypted host CMD), by utilizing a first COMSEC variety, to produceencrypted host commands (i.e. encrypted host CMD). The host commands arecommands that are used to configure the portion (e.g., a transponder(s))of the payload 605 that host SOC 650 is utilizing for itself.

It should be noted that, although in FIG. 6A the host SOC 650 isdepicted to have its ground antenna located right next to its operationsbuilding; in other embodiments, the host SOC 650 may have its groundantenna located very far away from the its operations building (e.g.,the ground antenna may be located in another country than the operationsbuilding).

Also, it should be noted that the first COMSEC variety may include atleast one encryption key and/or at least one algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm). Additionally, itshould be noted that the second COMSEC variety may include at least oneencryption key and/or at least one encryption algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm).

The HOC 660 then transmits 615 the encrypted hosted commands to the hostSOC 650. After the host SOC 650 receives the encrypted hosted commands,the host SOC 650 transmits 620 the encrypted host commands and transmits625 the encrypted hosted commands to the vehicle 610. The host SOC 650transmits 620, 625 the encrypted host commands and the encrypted hostedcommands utilizing an out-of-band frequency band(s) (i.e. a frequencyband(s) that is not the same frequency band(s) utilized to transmitpayload data). The host command receiver 635 on the vehicle 610 receivesthe encrypted host commands. In addition, the hosted command receiver645 on the vehicle 610 receives the encrypted hosted commands.

It should be noted that in other embodiments, the disclosed system for avirtual transponder utilizing inband telemetry may employ more or lessreceivers 635, 645 than as is shown in FIG. 6A.

The host command receiver 635 then transmits 652 the encrypted hostcommands to a first communication security module 662. The firstcommunication security module 662 decrypts the encrypted host commandsutilizing the first COMSEC variety (i.e. COMSEC Variety 1) to generateunencrypted host commands.

It should be noted that the first communication security module 662 maycomprise one or more modules. In addition, the first communicationsecurity module 662 may comprise one or more processors.

The hosted command receiver 645 then transmits 655 the encrypted hostedcommands to a second communication security module 665. The secondcommunication security module 665 decrypts the encrypted hosted commandsutilizing the second COMSEC variety (i.e. COMSEC Variety 2) to generateunencrypted hosted commands.

It should be noted that the second communication security module 665 maycomprise one or more modules. In addition, the second communicationsecurity module 665 may comprise one or more processors.

The first communication security module 662 then transmits 670 theunencrypted host commands to the payload (i.e. the shared host/hostedpayload) 605. The second communication security module 665 transmits 675the unencrypted hosted commands to the payload (i.e. the sharedhost/hosted payload) 605. The payload 605 is reconfigured according tothe unencrypted host commands and/or the unencrypted hosted commands. Apayload antenna 680 then transmits (e.g., in one or more antenna beams681) payload data to a host receiving antenna 685 and/or a hostedreceiving antenna 690 on the ground. It should be noted that in someembodiments, the hosted receiving antenna 690 may be air based, seabased, or ground based, as is shown in FIG. 6A.

Also, it should be noted that, although in FIG. 6A, antenna beams 681 isshown to include a plurality of circular spot beams; in otherembodiments, antenna beams 681 may include more or less number of beamsthan is shown in FIG. 6A (e.g., antenna beams 681 may only include asingle beam), and antenna beams 681 may include beams of differentshapes than circular spot beams as is shown in FIG. 6A (e.g., antennabeams 681 may include elliptical beams and/or shaped beams of variousdifferent shapes).

It should be noted that in one or more embodiments, the payload antenna680 may comprise one or more reflector dishes including, but not limitedto, parabolic reflectors and/or shaped reflectors. In some embodiments,the payload antenna 680 may comprise one or more multifeed antennaarrays.

The payload 605 transmits 691 unencrypted host telemetry (i.e.unencrypted host TLM, which is telemetry data related to the portion ofthe payload 605 that is utilized by the host SOC 650) to the firstcommunication security module 662. The first communication securitymodule 662 then encrypts the unencrypted host telemetry utilizing thefirst COMSEC variety to generate encrypted host telemetry (i.e.encrypted host TLM).

The payload 605 transmits 692 unencrypted hosted telemetry (i.e.unencrypted HoP TLM, which is telemetry data related to the portion ofthe payload 605 that is leased by the HOC 660) to the secondcommunication security module 665. The second communication securitymodule 665 then encrypts the unencrypted hosted telemetry utilizing thesecond COMSEC variety to generate encrypted hosted telemetry (i.e.encrypted HoP TLM).

The first communication security module 662 then transmits 693 theencrypted host telemetry to the payload 605. The payload antenna 680then transmits 697 the encrypted host telemetry to the host receivingantenna 685. The payload antenna 680 transmits 697 the encrypted hosttelemetry utilizing an inband frequency band(s) (i.e. at least onefrequency band that is the same as at least one frequency band utilizedto transmit payload data). The host receiving antenna 685 then transmits698 the encrypted host telemetry to the host SOC 650. The host SOC 650then decrypts the encrypted host telemetry utilizing the first COMSECvariety to generate the unencrypted host telemetry.

The second communication security module 665 then transmits 696 theencrypted hosted telemetry to the payload 605. The payload antenna 680then transmits 696 the encrypted hosted telemetry to the hostedreceiving antenna 690. The payload antenna 680 transmits 696 theencrypted hosted telemetry utilizing an inband frequency band(s) (i.e.at least one frequency band that is the same as at least one frequencyband utilized to transmit payload data). The hosted receiving antenna690 then transmits 699 the encrypted hosted telemetry to the HOC 660.The HOC 660 then decrypts the encrypted hosted telemetry utilizing thesecond COMSEC variety to generate the unencrypted hosted telemetry.

FIG. 6B is a diagram 6000 showing the disclosed system for a virtualtransponder utilizing inband telemetry for the host user (i.e. the hostSOC) 6050 and the hosted user (i.e. the HOC) 6060 being transmitted to ahost receiving antenna 6085, in accordance with at least one embodimentof the present disclosure. In this figure, a vehicle 6010, a host SOC6050, and a HOC 6060 are shown. The HOC 6060 has leased at least aportion (i.e. a virtual transponder(s)) of the payload 6005 of thevehicle 6010 from the owner of a satellite (i.e. the host SOC) 6050. Itshould be noted that in some embodiments, the HOC 6060 may lease all ofthe payload 6005 of the vehicle 6010 from the owner of a satellite (i.e.the host SOC) 6050. Also, it should be noted that is some embodiments,the HOC 6060 may own the payload 6005 (e.g., a steerable antenna) of thevehicle 6010, and contract the host SOC 6050 to transmit encryptedhosted commands to the vehicle 6010.

During operation, the HOC 6060 encrypts unencrypted hosted commands(i.e. unencrypted HoP CMD), by utilizing a second COMSEC variety, toproduce encrypted hosted commands (i.e. encrypted HoP CMD). The hostedcommands are commands that are used to configure the portion (i.e. avirtual transponder(s)) of the payload 6005 that the HOC 6060 is leasingfrom the host SOC 6050. The host SOC 6050 encrypts unencrypted hostcommands (i.e. unencrypted host CMD), by utilizing a first COMSECvariety, to produce encrypted host commands (i.e. encrypted host CMD).The host commands are commands that are used to configure the portion(e.g., a transponder(s)) of the payload 6005 that host SOC 6050 isutilizing for itself.

It should be noted that, although in FIG. 6B the host SOC 6050 isdepicted to have its ground antenna located right next to its operationsbuilding; in other embodiments, the host SOC 6050 may have its groundantenna located very far away from the its operations building (e.g.,the ground antenna may be located in another country than the operationsbuilding).

Also, it should be noted that the first COMSEC variety may include atleast one encryption key and/or at least one algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm). Additionally, itshould be noted that the second COMSEC variety may include at least oneencryption key and/or at least one encryption algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm).

The HOC 6060 then transmits 6015 the encrypted hosted commands to thehost SOC 6050. After the host SOC 6050 receives the encrypted hostedcommands, the host SOC 6050 transmits 6020 the encrypted host commandsand transmits 6025 the encrypted hosted commands to the vehicle 6010.The host SOC 6050 transmits 6020, 6025 the encrypted host commands andthe encrypted hosted commands utilizing an out-of-band frequency band(s)(i.e. a frequency band(s) that is not the same frequency band(s)utilized to transmit payload data). The host command receiver 6035 onthe vehicle 6010 receives the encrypted host commands. In addition, thehosted command receiver 6045 on the vehicle 6010 receives the encryptedhosted commands.

It should be noted that in other embodiments, the disclosed system for avirtual transponder utilizing inband telemetry may employ more or lessreceivers 6035, 6045 than as is shown in FIG. 6B.

The host command receiver 6035 then transmits 6052 the encrypted hostcommands to a first communication security module 6062. The firstcommunication security module 6062 decrypts the encrypted host commandsutilizing the first COMSEC variety (i.e. COMSEC Variety 1) to generateunencrypted host commands.

It should be noted that the first communication security module 6062 maycomprise one or more modules. In addition, the first communicationsecurity module 6062 may comprise one or more processors.

The hosted command receiver 6045 then transmits 6055 the encryptedhosted commands to a second communication security module 6065. Thesecond communication security module 6065 decrypts the encrypted hostedcommands utilizing the second COMSEC variety (i.e. COMSEC Variety 2) togenerate unencrypted hosted commands.

It should be noted that the second communication security module 6065may comprise one or more modules. In addition, the second communicationsecurity module 6065 may comprise one or more processors.

The first communication security module 6062 then transmits 6070 theunencrypted host commands to the payload (i.e. the shared host/hostedpayload) 6005. The second communication security module 6065 transmits6075 the unencrypted hosted commands to the payload (i.e. the sharedhost/hosted payload) 6005. The payload 6005 is reconfigured according tothe unencrypted host commands and/or the unencrypted hosted commands. Apayload antenna 6080 then transmits (e.g., in one or more antenna beams6081) payload data to a host receiving antenna 6085 and/or a hostedreceiving antenna 6090 on the ground. It should be noted that in someembodiments, the hosted receiving antenna 6090 may be air based, seabased, or ground based, as is shown in FIG. 6B.

Also, it should be noted that, although in FIG. 6B, antenna beams 6081is shown to include a plurality of circular spot beams; in otherembodiments, antenna beams 6081 may include more or less number of beamsthan is shown in FIG. 6B (e.g., antenna beams 6081 may only include asingle beam), and antenna beams 6081 may include beams of differentshapes than circular spot beams as is shown in FIG. 6B (e.g., antennabeams 6081 may include elliptical beams and/or shaped beams of variousdifferent shapes).

It should be noted that in one or more embodiments, the payload antenna6080 may comprise one or more reflector dishes including, but notlimited to, parabolic reflectors and/or shaped reflectors. In someembodiments, the payload antenna 680 may comprise one or more multifeedantenna arrays.

The payload 6005 transmits 6091 unencrypted host telemetry (i.e.unencrypted host TLM, which is telemetry data related to the portion ofthe payload 6005 that is utilized by the host SOC 6050) to the firstcommunication security module 6062. The first communication securitymodule 6062 then encrypts the unencrypted host telemetry utilizing thefirst COMSEC variety to generate encrypted host telemetry (i.e.encrypted host TLM).

The payload 6005 transmits 6092 unencrypted hosted telemetry (i.e.unencrypted HoP TLM, which is telemetry data related to the portion ofthe payload 6005 that is leased by the HOC 6060) to the secondcommunication security module 6065. The second communication securitymodule 6065 then encrypts the unencrypted hosted telemetry utilizing thesecond COMSEC variety to generate encrypted hosted telemetry (i.e.encrypted HoP TLM).

The first communication security module 6062 then transmits 6093 theencrypted host telemetry to the payload 6005. The payload antenna 6080then transmits 6097 the encrypted host telemetry to the host receivingantenna 6085. The payload antenna 6080 transmits 6097 the encrypted hosttelemetry utilizing an inband frequency band(s) (i.e. at least onefrequency band that is the same as at least one frequency band utilizedto transmit payload data). The host receiving antenna 6085 thentransmits 6098 the encrypted host telemetry to the host SOC 6050. Thehost SOC 6050 then decrypts the encrypted host telemetry utilizing thefirst COMSEC variety to generate the unencrypted host telemetry.

The second communication security module 6065 then transmits 6096 theencrypted hosted telemetry to the payload 6005. The payload antenna 6080then transmits 6096 the encrypted hosted telemetry to the host receivingantenna 6085. The payload antenna 6080 transmits 6096 the encryptedhosted telemetry utilizing an inband frequency band(s) (i.e. at leastone frequency band that is the same as at least one frequency bandutilized to transmit payload data). The host receiving antenna 6085 thentransmits 6099 the encrypted hosted telemetry to the host SOC 6050. Thehost SOC 6050 transmits 6090 the encrypted hosted telemetry to the HOC6060. The HOC 6060 then decrypts the encrypted hosted telemetryutilizing the second COMSEC variety to generate the unencrypted hostedtelemetry.

FIGS. 7A, 7B, 7C, and 7D together show a flow chart for the disclosedmethod for a virtual transponder utilizing inband telemetry for the hostuser and the hosted user being transmitted to a host receiving antennaand a hosted receiving antenna, in accordance with at least oneembodiment of the present disclosure. At the start 700 of the method, ahosted payload (HoP) operation center (HOC) encrypts unencrypted hostedcommands by utilizing a second COMSEC variety to produce encryptedhosted commands 705. Then, the HOC transmits the encrypted hostedcommands to a host spacecraft operations center (SOC) 710. The host SOCencrypts unencrypted host commands by utilizing a first COMSEC varietyto produce encrypted host commands 715. Then, the host SOC transmits(out-of-band) the encrypted host commands and the encrypted hostedcommands to a vehicle 720.

Then, a host command receiver on the vehicle receives the encrypted hostcommands 725. And, a hosted command receiver on the vehicle receives theencrypted hosted commands 730. The host command receiver transmits theencrypted host commands to a first communication security module 735.The hosted command receiver transmits the encrypted hosted commands to asecond communication security module 740. The first communicationsecurity module then decrypts the encrypted host commands utilizing thefirst COMSEC variety to generate the unencrypted host commands 745. Thesecond communication security module then decrypts the encrypted hostedcommands utilizing the second COMSEC variety to generate the unencryptedhosted commands 750.

The first communication security module then transmits the unencryptedhost commands to the payload 755. The second communication securitymodule then transmits the unencrypted hosted commands to the payload760. Then, the payload is reconfigured according to the unencrypted hostcommands and/or the unencrypted hosted commands 765. A payload antennaon the vehicle then transmits payload data to a host receiving antennaand/or a hosted receiving antenna 770.

Then, the payload transmits to the first communication security moduleunencrypted host telemetry 775. And, the payload transmits to the secondcommunication security module unencrypted hosted telemetry 780. Thefirst communication security module encrypts the unencrypted hosttelemetry utilizing the first COMSEC variety to generate encrypted hosttelemetry 785. And, the second communication security module encryptsthe unencrypted hosted telemetry utilizing the second COMSEC variety togenerate encrypted hosted telemetry 790.

Then, the first communication security module transmits the encryptedhost telemetry to the payload 791. The payload antenna then transmitsthe encrypted host telemetry to the host receiving antenna 792. Then,the host receiving antenna transmits the encrypted host telemetry to thehost SOC 793. The host SOC then decrypts the encrypted host telemetryutilizing the first COMSEC variety to generate the unencrypted hosttelemetry 794.

The second communication security module transmits the encrypted hostedtelemetry to the payload 795. The payload antenna then transmits theencrypted hosted telemetry to the hosted receiving antenna 796. Thehosted receiving antenna then transmits the encrypted hosted telemetryto the HOC 797. Then, the HOC decrypts the encrypted hosted telemetryutilizing the second COMSEC variety to generate the unencrypted hostedtelemetry 798. Then, the method ends 799.

FIGS. 7E, 7F, 7G, and 7H together show a flow chart for the disclosedmethod for a virtual transponder utilizing inband telemetry for the hostuser and the hosted user being transmitted to a host receiving antenna,in accordance with at least one embodiment of the present disclosure. Atthe start 7000 of the method, a hosted payload (HoP) operation center(HOC) encrypts unencrypted hosted commands by utilizing a second COMSECvariety to produce encrypted hosted commands 7005. Then, the HOCtransmits the encrypted hosted commands to a host spacecraft operationscenter (SOC) 7010. The host SOC encrypts unencrypted host commands byutilizing a first COMSEC variety to produce encrypted host commands7015. Then, the host SOC transmits (out-of-band) the encrypted hostcommands and the encrypted hosted commands to a vehicle 7020.

Then, a host command receiver on the vehicle receives the encrypted hostcommands 7025. And, a hosted command receiver on the vehicle receivesthe encrypted hosted commands 7030. The host command receiver transmitsthe encrypted host commands to a first communication security module7035. The hosted command receiver transmits the encrypted hostedcommands to a second communication security module 7040. The firstcommunication security module then decrypts the encrypted host commandsutilizing the first COMSEC variety to generate the unencrypted hostcommands 7045. The second communication security module then decryptsthe encrypted hosted commands utilizing the second COMSEC variety togenerate the unencrypted hosted commands 7050.

The first communication security module then transmits the unencryptedhost commands to the payload 7055. The second communication securitymodule then transmits the unencrypted hosted commands to the payload7060. Then, the payload is reconfigured according to the unencryptedhost commands and/or the unencrypted hosted commands 7065. A payloadantenna on the vehicle then transmits payload data to a host receivingantenna and/or a hosted receiving antenna 7070.

Then, the payload transmits to the first communication security moduleunencrypted host telemetry 7075. And, the payload transmits to thesecond communication security module unencrypted hosted telemetry 7080.The first communication security module encrypts the unencrypted hosttelemetry utilizing the first COMSEC variety to generate encrypted hosttelemetry 7085. And, the second communication security module encryptsthe unencrypted hosted telemetry utilizing the second COMSEC variety togenerate encrypted hosted telemetry 7090.

Then, the first communication security module transmits the encryptedhost telemetry to the payload 7091. The payload antenna then transmitsthe encrypted host telemetry to the host receiving antenna 7092. Then,the host receiving antenna transmits the encrypted host telemetry to thehost SOC 7093. The host SOC then decrypts the encrypted host telemetryutilizing the first COMSEC variety to generate the unencrypted hosttelemetry 7094.

The second communication security module transmits the encrypted hostedtelemetry to the payload 7095. The payload antenna then transmits theencrypted hosted telemetry to the host receiving antenna 7096. The hostreceiving antenna then transmits the encrypted hosted telemetry to thehost SOC 7097. The host SOC transmits the encrypted hosted telemetry tothe HOC 7098. Then, the HOC decrypts the encrypted hosted telemetryutilizing the second COMSEC variety to generate the unencrypted hostedtelemetry 7099. Then, the method ends 7001.

FIG. 8A is a diagram 800 showing the disclosed system for a virtualtransponder utilizing inband telemetry for the host user (i.e. the hostSOC) 850 and the hosted user (i.e. the HOC) 860 being transmitted to ahost receiving antenna 885 and a hosted receiving antenna 890, where thetelemetry is encrypted utilizing a single communication security(COMSEC) variety, in accordance with at least one embodiment of thepresent disclosure. In this figure, a vehicle 810, a host SOC 850, and aHOC 860 are shown. The HOC 860 has leased at least a portion (i.e. avirtual transponder(s)) of the payload 805 of the vehicle 810 from theowner of a satellite (i.e. the host SOC) 850. It should be noted that insome embodiments, the HOC 860 may lease all of the payload 805 of thevehicle 810 from the owner of a satellite (i.e. the host SOC) 850. Also,it should be noted that is some embodiments, the HOC 860 may own thepayload 805 (e.g., a steerable antenna) of the vehicle 810, and contractthe host SOC 850 to transmit encrypted hosted commands to the vehicle810.

During operation, the HOC 860 encrypts unencrypted hosted commands (i.e.unencrypted HoP CMD), by utilizing a second COMSEC variety, to produceencrypted hosted commands (i.e. encrypted HoP CMD). The hosted commandsare commands that are used to configure the portion (i.e. a virtualtransponder(s)) of the payload 805 that the HOC 860 is leasing from thehost SOC 850. The host SOC 850 encrypts unencrypted host commands (i.e.unencrypted host CMD), by utilizing a first COMSEC variety, to produceencrypted host commands (i.e. encrypted host CMD). The host commands arecommands that are used to configure the portion (e.g., a transponder(s))of the payload 805 that host SOC 850 is utilizing for itself.

It should be noted that, although in FIG. 8A the host SOC 850 isdepicted to have its ground antenna located right next to its operationsbuilding; in other embodiments, the host SOC 850 may have its groundantenna located very far away from the its operations building (e.g.,the ground antenna may be located in another country than the operationsbuilding).

Also, it should be noted that the first COMSEC variety may include atleast one encryption key and/or at least one algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm). Additionally, itshould be noted that the second COMSEC variety may include at least oneencryption key and/or at least one encryption algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm).

The HOC 860 then transmits 815 the encrypted hosted commands to the hostSOC 850. After the host SOC 850 receives the encrypted hosted commands,the host SOC 850 transmits 820 the encrypted host commands and transmits825 the encrypted hosted commands to the vehicle 810. The host SOC 850transmits 820, 825 the encrypted host commands and the encrypted hostedcommands utilizing an out-of-band frequency band(s) (i.e. a frequencyband(s) that is not the same frequency band(s) utilized to transmitpayload data). The host command receiver 835 on the vehicle 810 receivesthe encrypted host commands. In addition, the hosted command receiver845 on the vehicle 810 receives the encrypted hosted commands.

It should be noted that in other embodiments, the disclosed system for avirtual transponder utilizing inband telemetry may employ more or lessreceivers 835, 845 than as is shown in FIG. 8A.

The host command receiver 835 then transmits 852 the encrypted hostcommands to a first communication security module 862. The firstcommunication security module 862 decrypts the encrypted host commandsutilizing the first COMSEC variety (i.e. COMSEC Variety 1) to generateunencrypted host commands.

It should be noted that the first communication security module 862 maycomprise one or more modules. In addition, the first communicationsecurity module 862 may comprise one or more processors.

The hosted command receiver 845 then transmits 855 the encrypted hostedcommands to a second communication security module 865. The secondcommunication security module 865 decrypts the encrypted hosted commandsutilizing the second COMSEC variety (i.e. COMSEC Variety 2) to generateunencrypted hosted commands.

It should be noted that the second communication security module 865 maycomprise one or more modules. In addition, the second communicationsecurity module 865 may comprise one or more processors.

The first communication security module 862 then transmits 870 theunencrypted host commands to the payload (i.e. the shared host/hostedpayload) 805. The second communication security module 865 transmits 875the unencrypted hosted commands to the payload (i.e. the sharedhost/hosted payload) 805. The payload 805 is reconfigured according tothe unencrypted host commands and/or the unencrypted hosted commands. Apayload antenna 880 then transmits (e.g., in one or more antenna beams881) payload data to a host receiving antenna 885 and/or a hostedreceiving antenna 890 on the ground. It should be noted that in someembodiments, the hosted receiving antenna 890 may be air based, seabased, or ground based, as is shown in FIG. 8A.

It should be noted that, although in FIG. 8A, antenna beams 881 is shownto include a plurality of circular spot beams; in other embodiments,antenna beams 881 may include more or less number of beams than is shownin FIG. 8A (e.g., antenna beams 881 may only include a single beam), andantenna beams 881 may include beams of different shapes than circularspot beams as is shown in FIG. 8A (e.g., antenna beams 881 may includeelliptical beams and/or shaped beams of various different shapes).

It should be noted that in one or more embodiments, the payload antenna880 may comprise one or more reflector dishes including, but not limitedto, parabolic reflectors and/or shaped reflectors. In some embodiments,the payload antenna 880 may comprise one or more multifeed antennaarrays.

The payload 805 transmits 891 unencrypted telemetry to the firstcommunication security module 862. The unencrypted telemetry comprisesunencrypted host telemetry (i.e. unencrypted host TLM, which istelemetry data related to the portion of the payload 805 that isutilized by the host SOC 850) and unencrypted hosted telemetry (i.e.unencrypted HoP TLM, which is telemetry data related to the portion ofthe payload 805 that is leased by the HOC 860). The first communicationsecurity module 862 then encrypts the unencrypted telemetry utilizingthe first COMSEC variety to generate encrypted telemetry (i.e. encryptedTLM).

The first communication security module 862 then transmits 893 theencrypted telemetry to the payload 805. The payload antenna 880 thentransmits 897 the encrypted telemetry to the host receiving antenna 885.The payload antenna 880 transmits 897 the encrypted telemetry utilizingan inband frequency band(s) (i.e. at least one frequency band that isthe same as at least one frequency band utilized to transmit payloaddata). The host receiving antenna 885 then transmits 898 the encryptedtelemetry to the host SOC 850. The host SOC 850 then decrypts theencrypted telemetry utilizing the first COMSEC variety to generate theunencrypted telemetry. The host SOC 850 then utilizes a database thatcomprises host payload decommutated information and does not comprisehosted payload decommutated information (i.e. a database without hostedpayload decommutated information) to read to unencrypted telemetry todetermine the telemetry data related to the portion of the payload 805that is utilized by the host SOC 850.

The payload antenna 880 then transmits 896 the encrypted telemetry tothe hosted receiving antenna 890. The payload antenna 880 transmits 896the encrypted telemetry utilizing an inband frequency band(s) (i.e. atleast one frequency band that is the same as at least one frequency bandutilized to transmit payload data). The hosted receiving antenna 890then transmits 899 the encrypted telemetry to the HOC 860. The HOC 860then decrypts the encrypted telemetry utilizing the first COMSEC varietyto generate the unencrypted telemetry. The HOC 860 then utilizes adatabase that comprises hosted payload decommutated information and doesnot comprise host payload decommutated information (i.e. a databasewithout host payload decommutated information) to read to unencryptedtelemetry to determine the telemetry data related to the portion of thepayload 805 that is utilized by the HOC 860.

FIG. 8B is a diagram 8000 showing the disclosed system for a virtualtransponder utilizing inband telemetry for the host user (i.e. the hostSOC) 8050 and the hosted user (i.e. the HOC) 8060 being transmitted to ahost receiving antenna 8085, where the telemetry is encrypted utilizinga single communication security (COMSEC) variety, in accordance with atleast one embodiment of the present disclosure. In this figure, avehicle 8010, a host SOC 8050, and a HOC 8060 are shown. The HOC 8060has leased at least a portion (i.e. a virtual transponder(s)) of thepayload 8005 of the vehicle 8010 from the owner of a satellite (i.e. thehost SOC) 8050. It should be noted that in some embodiments, the HOC8060 may lease all of the payload 8005 of the vehicle 8010 from theowner of a satellite (i.e. the host SOC) 8050. Also, it should be notedthat is some embodiments, the HOC 8060 may own the payload 8005 (e.g., asteerable antenna) of the vehicle 8010, and contract the host SOC 8050to transmit encrypted hosted commands to the vehicle 8010.

During operation, the HOC 8060 encrypts unencrypted hosted commands(i.e. unencrypted HoP CMD), by utilizing a second COMSEC variety, toproduce encrypted hosted commands (i.e. encrypted HoP CMD). The hostedcommands are commands that are used to configure the portion (i.e. avirtual transponder(s)) of the payload 8005 that the HOC 8060 is leasingfrom the host SOC 8050. The host SOC 8050 encrypts unencrypted hostcommands (i.e. unencrypted host CMD), by utilizing a first COMSECvariety, to produce encrypted host commands (i.e. encrypted host CMD).The host commands are commands that are used to configure the portion(e.g., a transponder(s)) of the payload 8005 that host SOC 8050 isutilizing for itself.

It should be noted that, although in FIG. 8B the host SOC 8050 isdepicted to have its ground antenna located right next to its operationsbuilding; in other embodiments, the host SOC 8050 may have its groundantenna located very far away from the its operations building (e.g.,the ground antenna may be located in another country than the operationsbuilding).

Also, it should be noted that the first COMSEC variety may include atleast one encryption key and/or at least one algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm). Additionally, itshould be noted that the second COMSEC variety may include at least oneencryption key and/or at least one encryption algorithm (e.g., a Type 1encryption algorithm or a Type 2 encryption algorithm).

The HOC 8060 then transmits 8015 the encrypted hosted commands to thehost SOC 8050. After the host SOC 8050 receives the encrypted hostedcommands, the host SOC 8050 transmits 8020 the encrypted host commandsand transmits 8025 the encrypted hosted commands to the vehicle 8010.The host SOC 8050 transmits 8020, 8025 the encrypted host commands andthe encrypted hosted commands utilizing an out-of-band frequency band(s)(i.e. a frequency band(s) that is not the same frequency band(s)utilized to transmit payload data). The host command receiver 8035 onthe vehicle 8010 receives the encrypted host commands. In addition, thehosted command receiver 8045 on the vehicle 8010 receives the encryptedhosted commands.

It should be noted that in other embodiments, the disclosed system for avirtual transponder utilizing inband telemetry may employ more or lessreceivers 8035, 8045 than as is shown in FIG. 8B.

The host command receiver 8035 then transmits 8052 the encrypted hostcommands to a first communication security module 8062. The firstcommunication security module 8062 decrypts the encrypted host commandsutilizing the first COMSEC variety (i.e. COMSEC Variety 1) to generateunencrypted host commands.

It should be noted that the first communication security module 8062 maycomprise one or more modules. In addition, the first communicationsecurity module 8062 may comprise one or more processors.

The hosted command receiver 8045 then transmits 8055 the encryptedhosted commands to a second communication security module 8065. Thesecond communication security module 8065 decrypts the encrypted hostedcommands utilizing the second COMSEC variety (i.e. COMSEC Variety 2) togenerate unencrypted hosted commands.

It should be noted that the second communication security module 8065may comprise one or more modules. In addition, the second communicationsecurity module 8065 may comprise one or more processors.

The first communication security module 8062 then transmits 8070 theunencrypted host commands to the payload (i.e. the shared host/hostedpayload) 8005. The second communication security module 8065 transmits8075 the unencrypted hosted commands to the payload (i.e. the sharedhost/hosted payload) 8005. The payload 8005 is reconfigured according tothe unencrypted host commands and/or the unencrypted hosted commands. Apayload antenna 8080 then transmits (e.g., in one or more antenna beams8081) payload data to a host receiving antenna 8085 and/or a hostedreceiving antenna 8090 on the ground. It should be noted that in someembodiments, the hosted receiving antenna 8090 may be air based, seabased, or ground based, as is shown in FIG. 8B.

It should be noted that, although in FIG. 8B, antenna beams 8081 isshown to include a plurality of circular spot beams; in otherembodiments, antenna beams 8081 may include more or less number of beamsthan is shown in FIG. 8B (e.g., antenna beams 8081 may only include asingle beam), and antenna beams 8081 may include beams of differentshapes than circular spot beams as is shown in FIG. 8B (e.g., antennabeams 8081 may include elliptical beams and/or shaped beams of variousdifferent shapes).

It should be noted that in one or more embodiments, the payload antenna8080 may comprise one or more reflector dishes including, but notlimited to, parabolic reflectors and/or shaped reflectors. In someembodiments, the payload antenna 8080 may comprise one or more multifeedantenna arrays.

The payload 8005 transmits 8091 unencrypted telemetry to the firstcommunication security module 8062. The unencrypted telemetry comprisesunencrypted host telemetry (i.e. unencrypted host TLM, which istelemetry data related to the portion of the payload 8005 that isutilized by the host SOC 8050) and unencrypted hosted telemetry (i.e.unencrypted HoP TLM, which is telemetry data related to the portion ofthe payload 8005 that is leased by the HOC 8060). The firstcommunication security module 8062 then encrypts the unencryptedtelemetry utilizing the first COMSEC variety to generate encryptedtelemetry (i.e. encrypted TLM).

The first communication security module 8062 then transmits 8093 theencrypted telemetry to the payload 8005. The payload antenna 8080 thentransmits 8097 the encrypted telemetry to the host receiving antenna8085. The payload antenna 8080 transmits 8097 the encrypted telemetryutilizing an inband frequency band(s) (i.e. at least one frequency bandthat is the same as at least one frequency band utilized to transmitpayload data). The host receiving antenna 8085 then transmits 8098 theencrypted telemetry to the host SOC 8050. The host SOC 8050 thendecrypts the encrypted telemetry utilizing the first COMSEC variety togenerate the unencrypted telemetry. The host SOC 8050 then utilizes adatabase that comprises host payload decommutated information and doesnot comprise hosted payload decommutated information (i.e. a databasewithout hosted payload decommutated information) to read to unencryptedtelemetry to determine the telemetry data related to the portion of thepayload 8005 that is utilized by the host SOC 8050.

The host SOC 8050 transmits 8099 the encrypted telemetry to the HOC8060. The HOC 8060 then decrypts the encrypted telemetry utilizing thefirst COMSEC variety to generate the unencrypted telemetry. The HOC 8060then utilizes a database that comprises hosted payload decommutatedinformation and does not comprise host payload decommutated information(i.e. a database without host payload decommutated information) to readto unencrypted telemetry to determine the telemetry data related to theportion of the payload 8005 that is utilized by the HOC 8060.

FIGS. 9A, 9B, 9C, and 9D together show a flow chart for the disclosedmethod for a virtual transponder utilizing inband telemetry for the hostuser and the hosted user being transmitted to a host receiving antennaand a hosted receiving antenna, where the telemetry is encryptedutilizing a single COMSEC variety, in accordance with at least oneembodiment of the present disclosure. At the start 900 of the method, ahosted payload (HoP) operation center (HOC) encrypts unencrypted hostedcommands by utilizing a second COMSEC variety to produce encryptedhosted commands 905. Then, the HOC transmits the encrypted hostedcommands to a host spacecraft operations center (SOC) 910. The host SOCencrypts unencrypted host commands by utilizing a first COMSEC varietyto produce encrypted host commands 915. Then, the host SOC transmits(out-of-band) the encrypted host commands and the encrypted hostedcommands to a vehicle 920.

Then, a host command receiver on the vehicle receives the encrypted hostcommands 925. And, a hosted command receiver on the vehicle receives theencrypted hosted commands 930. The host command receiver transmits theencrypted host commands to a first communication security module 935.The hosted command receiver transmits the encrypted hosted commands to asecond communication security module 940. The first communicationsecurity module then decrypts the encrypted host commands utilizing thefirst COMSEC variety to generate the unencrypted host commands 945. Thesecond communication security module then decrypts the encrypted hostedcommands utilizing the second COMSEC variety to generate the unencryptedhosted commands 950.

The first communication security module then transmits the unencryptedhost commands to the payload 955. The second communication securitymodule then transmits the unencrypted hosted commands to the payload960. Then, the payload is reconfigured according to the unencrypted hostcommands and/or the unencrypted hosted commands 965. A payload antennaon the vehicle then transmits payload data to a host receiving antennaand/or a hosted receiving antenna 970.

Then, the payload transmits to the first communication security moduleunencrypted telemetry 975. The first communication security moduleencrypts the unencrypted telemetry utilizing the first COMSEC variety togenerate encrypted telemetry 980.

Then, the first communication security module transmits the encryptedtelemetry to the payload 985. The payload antenna then transmits theencrypted telemetry to the host receiving antenna 990. Then, the hostreceiving antenna transmits the encrypted telemetry to the host SOC 991.The host SOC then decrypts the encrypted telemetry utilizing the firstCOMSEC variety to generate the unencrypted telemetry 992. Then, the hostSOC determines the telemetry data related to a portion of the payloadutilized by the host SOC by using a database without hosted decommutatedinformation to read the encrypted telemetry 993.

The payload antenna transmits the encrypted telemetry to the hostedreceiving antenna 994. The hosted receiving antenna then transmits theencrypted telemetry to the HOC 995. Then, the HOC decrypts the encryptedtelemetry utilizing the first COMSEC variety to generate the unencryptedtelemetry 996. Then, the HOC determines the telemetry data related to aportion of the payload utilized by the HOC by using a database withouthost decommutated information to read the encrypted telemetry 997. Then,the method ends 998.

FIGS. 9E, 9F, 9G, and 9H together show a flow chart for the disclosedmethod for a virtual transponder utilizing inband telemetry for the hostuser and the hosted user being transmitted to a host receiving antenna,where the telemetry is encrypted utilizing a single COMSEC variety, inaccordance with at least one embodiment of the present disclosure. Atthe start 9000 of the method, a hosted payload (HoP) operation center(HOC) encrypts unencrypted hosted commands by utilizing a second COMSECvariety to produce encrypted hosted commands 9005. Then, the HOCtransmits the encrypted hosted commands to a host spacecraft operationscenter (SOC) 9010. The host SOC encrypts unencrypted host commands byutilizing a first COMSEC variety to produce encrypted host commands9015. Then, the host SOC transmits (out-of-band) the encrypted hostcommands and the encrypted hosted commands to a vehicle 9020.

Then, a host command receiver on the vehicle receives the encrypted hostcommands 9025. And, a hosted command receiver on the vehicle receivesthe encrypted hosted commands 9030. The host command receiver transmitsthe encrypted host commands to a first communication security module9035. The hosted command receiver transmits the encrypted hostedcommands to a second communication security module 9040. The firstcommunication security module then decrypts the encrypted host commandsutilizing the first COMSEC variety to generate the unencrypted hostcommands 9045. The second communication security module then decryptsthe encrypted hosted commands utilizing the second COMSEC variety togenerate the unencrypted hosted commands 9050.

The first communication security module then transmits the unencryptedhost commands to the payload 9055. The second communication securitymodule then transmits the unencrypted hosted commands to the payload9060. Then, the payload is reconfigured according to the unencryptedhost commands and/or the unencrypted hosted commands 9065. A payloadantenna on the vehicle then transmits payload data to a host receivingantenna and/or a hosted receiving antenna 9070.

Then, the payload transmits to the first communication security moduleunencrypted telemetry 9075. The first communication security moduleencrypts the unencrypted telemetry utilizing the first COMSEC variety togenerate encrypted telemetry 9080.

Then, the first communication security module transmits the encryptedtelemetry to the payload 9085. The payload antenna then transmits theencrypted telemetry to the host receiving antenna 9090. Then, the hostreceiving antenna transmits the encrypted telemetry to the host SOC9091. The host SOC then decrypts the encrypted telemetry utilizing thefirst COMSEC variety to generate the unencrypted telemetry 9092. Then,the host SOC determines the telemetry data related to a portion of thepayload utilized by the host SOC by using a database without hosteddecommutated information to read the encrypted telemetry 9093.

The host SOC then transmits the encrypted telemetry to the HOC 9095.Then, the HOC decrypts the encrypted telemetry utilizing the firstCOMSEC variety to generate the unencrypted telemetry 9096. Then, the HOCdetermines the telemetry data related to a portion of the payloadutilized by the HOC by using a database without host decommutatedinformation to read the encrypted telemetry 9097. Then, the method ends9098.

FIG. 10 is a diagram 1000 showing the disclosed system for a virtualtransponder on a vehicle 1210, in accordance with at least oneembodiment of the present disclosure. In this figure, a computing device1010 is shown. The computing device 1010 may be located at a station(e.g., a host station or a hosted station). When the computing device1010 is located at a host station (i.e. a station operated by a hostuser (Host SOC)), the computing device 1010 is referred to as a hostcomputing device. And, when the computing device 1010 is located at ahosted station (i.e. a station operated by a hosted user (HOC)), thecomputing device 1010 is referred to as a hosted computing device. Inone or more embodiments, the station is a ground station 1015, aterrestrial vehicle (e.g., a military jeep) 1020, an airborne vehicle(e.g., an aircraft) 1025, or a marine vehicle (e.g., a ship) 1030.

During operation, a user (e.g., a host user or a hosted user) 1005selects, via a graphical user interface (GUI) (e.g., a host GUI or ahosted GUI) 1035 displayed on a screen of the computing device 1010(e.g., a host computing device or a hosted computing device), an option(e.g., a value) for each of at least one different variable for aportion of the payload 1280 on the vehicle 1210 utilized by the user1005. It should be noted that the details of payload 1280 as isillustrated in FIG. 12 is depicted on the GUI 1035, which is displayedon the screen of the computing device 1010.

Refer FIG. 12 to view the different variables of the payload 1280 on thevehicle 1210 that may be selected by the user 1005 by using the GUI 1035that is displayed to the user 1005. Also, refer to FIG. 13 to view thedifferent variables of the digital channelizer 1270 of the payload 1280that may be selected by the user 1005 by using the GUI 1035 that isdisplayed to the user 1005. In one or more embodiments, variousdifferent variables may be presented by the GUI 1035 to be selectedincluding, but not limited to, at least one transponder power, at leastone transponder spectrum, at least one transponder gain setting, atleast one transponder limiter setting, at least one transponderautomatic level control setting, at least one transponder phase setting,at least one internal gain generation, bandwidth for at least one beam,at least one frequency band for at least one beam, at least onetransponder beamforming setting, effective isotropic radiation power(EIRP) for at least one beam, at least one transponder channel, and/orbeam steering for at least one beam. It should be noted that the user1005 may select an option by clicking on the associated variable (e.g.,clicking on one of the mixers 1265 to change the frequency band of themixer's associated transmit antenna 1255) in the payload 1280 by usingthe GUI 1035, and by either typing in a value or selecting a value froma drop down menu (e.g., by typing in a desired transmission frequencyband for the associated transmit antenna 1255). It should be noted thatthe payload 1280 depicted in FIG. 12 is an exemplary payload, and thedepiction does not show all possible different variables that may beselected by user 1005 by using the GUI 1035.

After the user 1005 has selected, via the GUI 1035 displayed on thecomputing device 1010, an option for each of at least one variable forthe portion of the payload 1280 on the vehicle 1210 utilized by the user1005, the option(s) is transmitted 1040 to a configuration algorithm(CA) 1045 (e.g., an algorithm contained in an XML file, such asCAConfig.xml 1050). The CA 1045 then generates a configuration for theportion of the payload 1280 on the vehicle 1210 utilized by the user1005 by using the option(s). Then, the CA 1045 transmits 1055 theconfiguration to a command generator (e.g., a host command generator ora hosted command generator) 1060. Optionally, the CA 1045 also storesthe configuration in a report file 1065.

After the command generator 1060 has received the configuration, thecommand generator 1060 generates commands (e.g., host commands or hostedcommands) for reconfiguring the portion of the payload 1280 on thevehicle 1210 utilized by the user 1005 by using the configuration. Then,the commands are transmitted 1070 to an encryption module 1075. Afterreceiving the commands, the encryption module 1075 then encrypts thecommands (e.g., by utilizing a first COMSEC variety or a second COMSECvariety) to generate encrypted commands (e.g., host encrypted commandsor hosted encrypted commands).

Then, the encrypted commands are transmitted 1080 from the station(e.g., a ground station 1015, a terrestrial vehicle (e.g., a militaryjeep) 1020, an airborne vehicle (e.g., an aircraft) 1025, or a marinevehicle (e.g., a ship) 1030) to the vehicle 1210. It should be notedthat, in one or more embodiments, the computing device 1010, the CA1045, the command generator 1060, and the encryption module 1075 are alllocated at the station (e.g., the host station or the hosted station).In other embodiments, some or more of these items may be located indifferent locations. In addition, in one or more embodiments, thevehicle 1210 is an airborne vehicle (e.g., a satellite, an aircraft, anunmanned vehicle (UAV), or a space plane).

After the vehicle 1210 has received the encrypted commands, the vehicledecrypts the commands to generated unencrypted commands (e.g., hostunencrypted commands or hosted unencrypted commands). Then, the portionof the payload 1280 on the vehicle 1210 utilized by the user 1005 isreconfigured by using the unencrypted commands. In one or moreembodiments, the reconfiguring of the payload 1280 may comprisereconfiguring at least one antenna 1215, 1255 (refer to FIG. 12), atleast one analog-to-digital converter, at least one digital-to-analogconverter, at least one beamformer, at least one digital channelizer1310 (refer to FIG. 13), at least one demodulator, at least onemodulator, at least one digital switch matrix 1320 (refer to FIG. 13),and/or at least one digital combiner 1330 (refer to FIG. 13). It shouldbe noted that in other embodiments, the reconfiguring of the payload1280 may comprise reconfiguring at least one analog switch matrix.

FIG. 11 is a diagram 1100 showing an exemplary allocation of bandwidthamongst a plurality of beams (U1-U45) when utilizing the disclosedvirtual transponder, in accordance with at least one embodiment of thepresent disclosure. In this figure, the bandwidth of each of the beams(U1-U45) is illustrated as a bar.

On the left side 1110 of the diagram 1100, a portion of the bandwidth ofeach of the beams (U1-U45) is shown to be utilized by only the host user(i.e. the owner of the vehicle). For this example, the host user is notleasing out any portion of the payload to a hosted user (i.e. acustomer).

On the right side 1120 of the diagram 1100, a portion of the bandwidthof each of the beams is shown to be utilized by the host user (i.e. theowner of the vehicle). Also, at least some (if not all) of the portionof the bandwidth of each of the beams (U1-U45) not utilized by the hostuser, is shown to be utilized by the hosted user (i.e. a customer). Forthis example, the host user is leasing out a portion of the payload to ahosted user (i.e. a customer). Specifically, the host user is leasingout a portion the bandwidth of each of the beams (U1-U45) to the hosteduser.

It should be noted that in other embodiments, the host user may leaseout the entire bandwidth of some (if not all) of beam(s) to the hosteduser. For these, embodiments, the hosted user alone will utilize thebandwidth of these leased beam(s).

FIG. 12 is a diagram 1200 showing the switch architecture for a flexibleallocation of bandwidth amongst a plurality of beams (U1-UN) (i.e.including uplink and downlink beams) when utilizing the disclosedvirtual transponder, in accordance with at least one embodiment of thepresent disclosure. In this figure, details of a payload 1280 on avehicle 1210 are shown. In particular, each of a plurality (i.e. Nnumber) of receive antennas 1215, on the vehicle 1210, is shown to bereceiving one of the uplink beams (U1-UN). As such, for example, receiveantenna 1215 connected to input port 1 receives uplink beam U6, receiveantenna 1215 connected to input port 2 receives uplink beam U14, andreceive antenna 1215 connected to input port N receives uplink beam U34.Each receive antenna 1215 is shown to be followed by a polarizer (i.e.pol) 1220 and a waveguide filter (i.e. WG Filter) 1225.

Also, in this figure, each of a plurality (i.e. N number) of transmitantennas 1255, on the vehicle 1210, is shown to be receiving one of thedownlink beams (U1-UN). As such, for example, transmit antenna 1255connected to output port 1 receives downlink beam U19, transmit antenna1255 connected to output port 2 receives downlink beam U6, and transmitantenna 1255 connected to output port N receives downlink beam U1. Eachtransmit antenna 1255 is shown to be preceded by a polarizer (i.e. pol)1245 and a waveguide filter (i.e. WG Filter) 1250.

It should be noted that, in one or more embodiments, various differenttypes of antennas may be employed for the receive antennas 1215 and thetransmit antennas 1255 including, but not limited to, parabolicreflector antennas, shaped reflector antennas, multifeed array antennas,phase array antennas, and/or any combination thereof.

During operation, a host user 1205 encrypts unencrypted host commands toproduce encrypted host commands. Also, a hosted user 1230 encryptsunencrypted hosted commands to produce encrypted hosted commands. Thehosted user 1230 transmits 1235 the encrypted hosted commands to thehost user 1205. The host user 1205 transmits 1240 the encrypted hostcommands and the encrypted hosted commands to the vehicle 1210. Theencrypted host commands and encrypted hosted commands are decrypted onthe vehicle 1210 to produce the unencrypted host commands andunencrypted hosted commands.

Then, the payload on the vehicle 1210 receives the unencrypted hostcommands and unencrypted hosted commands. The digital channelizer 1270then reconfigures the channels of the uplink beams (U1-UN) and downlinkbeams (U1-UN) according to the unencrypted host commands and unencryptedhosted commands. The configuring of the channels allocates the bandwidthof the uplink beams (U1-UN) and downlink beams (U1-UN) amongst the hostuser 1205 and the hosted user 1230.

Also, the transmit antennas 1255 and the receive antennas 1215 areconfigured according to the unencrypted host commands and unencryptedhosted commands. For example, some, if not all, of the transmit antennas1255 and/or the receive antennas 1215 may be gimbaled to project theirbeams on different locations on the ground. Also, for example, some, ifnot all, of the transmit antennas 1255 and/or the receive antennas 1215may have their phase changed such that (1) the shape of the beam ischanged (e.g., has the effect of changing the coverage area of the beam,changing the peak(s) amplitude of the beam, and/or the changing thepeak(s) amplitude location on the ground), and/or (2) the beam isprojected on a different location on the ground (i.e. has the sameeffect as gimbaling the antenna 1215, 1255).

Additionally, the mixers 1260 on the input ports and/or the mixers 1265on the output ports are configured according to the unencrypted hostcommands and/or unencrypted hosted commands. For example, some, if notall, of the mixers 1260 on the input ports and/or the mixers 1265 on theoutput ports may mix in different frequency bands to change thefrequency band(s) of the beams (U1-UN).

FIG. 13 is a diagram 1300 showing details of the digital channelizer1270 of FIG. 12, in accordance with at least one embodiment of thepresent disclosure. In this figure, the digital channelizer 1270 isshown to include three main parts, which are the channelizer 1310, theswitch matrix 1320, and the combiner 1330. The digital channelizer 1310divides the input beam spectrum (i.e. frequency band) from each inputport into input subchannels (i.e. frequency slices). In this figure,each beam spectrum (i.e. frequency band) is shown to be divided intotwelve (12) input subchannels (i.e. frequency slices). It should benoted that in other embodiments, each input beam spectrum may be dividedinto more or less than twelve (12) input subchannels, as is shown inFIG. 13.

The switch matrix 1320 routes the input subchannels from the input portsto their assigned respective output ports, where they are referred to asoutput subchannels. In this figure, five (5) exemplary types of routingthat may be utilized by the switch matrix 1320 are shown, which includedirect mapping 1340, in-beam multicast 1350, cross-beam multicast 1360,cross-beam mapping 1370, and cross-beam point-to-point routing 1380. Thecombiner 1330 combines the output subchannels to create an output beamspectrum for each output port. As previously mentioned above, during thereconfiguring of the payload 1280, the channelizer 1310, the switchmatrix 1320, and/or the combiner 1330 of the digital channelizer 1270may be reconfigured a various different number of ways (e.g., changingthe dividing of the input beam spectrums into input subchannels,changing the routing of the input subchannels, and/or changing thecombining of the output subchannels to create the output beamspectrums).

FIG. 14 is a diagram 1400 showing exemplary components on the vehicle(e.g., satellite) 1410 that may be utilized by the disclosed virtualtransponder, in accordance with at least one embodiment of the presentdisclosure. In this figure, various components, on the vehicle 1410, areshown that may be configured according to the unencrypted host commands(e.g., the host channel 1430) and/or unencrypted hosted commands (e.g.,the hosted channel 1420).

In this figure, the uplink antenna 1440, the downlink antenna 1450, andvarious components of the all-digital payload 1460 (including theanalog-to-digital (ND) converter 1465, the digital channelizer 1475, thedigital switch matrix 1495, the digital combiner 1415, and thedigital-to-analog (D/A) converter 1435) are shown that may be configuredaccording to the unencrypted host commands (e.g., the host channel 1430)and/or unencrypted hosted commands (e.g., the hosted channel 1420). Inaddition, some other components of the all-digital payload 1460(including the uplink beamforming 1470, the demodulator 1480, themodulator 1490, and the downlink beamforming 1425) may optionally beconfigured according to the unencrypted host commands (e.g., the hostchannel 1430) and/or unencrypted hosted commands (e.g., the hostedchannel 1420).

FIGS. 15A and 15B together show a flow chart for the disclosed methodfor a virtual transponder on a vehicle, in accordance with at least oneembodiment of the present disclosure. At the start 1500 of the method, ahost user, with a host graphical user interface (GUI) on a hostcomputing device, selects an option for each of at least one variablefor a portion of a payload on the vehicle utilized by the host user1505. Also, a hosted user, with a hosted GUI on a hosted computingdevice, selects an option for each of at least one variable for aportion of the payload on the vehicle utilized by the hosted user 1510.Then, a configuration algorithm (CA), generates a configuration for theportion of the payload on the vehicle utilized by the host user by usingthe option for each of at least one variable for the portion of thepayload on the vehicle utilized by the host user 1515. Also, the CA,generates a configuration for the portion of the payload on the vehicleutilized by the hosted user by using an option for each of at least onevariable for the portion of the payload on the vehicle utilized by thehosted user 1520.

A host command generator then generates host commands for reconfiguringthe portion of the payload on the vehicle utilized by the host user byusing the configuration for the portion of the payload on the vehicleutilized by the host user 1525. And, a hosted command generatorgenerates hosted commands for reconfiguring the portion of the payloadon the vehicle utilized by the hosted user by using the configurationfor the portion of the payload on the vehicle utilized by the hosteduser 1530. Then, the host commands and the hosted commands aretransmitted to the vehicle 1535. The portion of the payload on thevehicle utilized by the host user is then reconfigured by using the hostcommands 1540. Also, the portion of the payload on the vehicle utilizedby the hosted user is reconfigured by using the hosted commands 1545.Then, the method ends 1550.

FIG. 16 is a diagram showing an exemplary script 1600 for inbandtelemetry for the hosted user, in accordance with at least oneembodiment of the present disclosure. In particular, this exemplaryscript 1600 may be used for the inband telemetry for the hosted user asshown in the system of FIG. 2 and the method of FIGS. 3A-3D (e.g., theinband telemetry is the encrypted hosted telemetry that is transmitted297 within a hosted telemetry signal, utilizing an inband frequencyband(s), by the payload antenna 280 to a hosted receiving antenna 290).

In this figure, the script 1600 is shown to run for a duration of timethat is equal to the master cycle time of N milliseconds (msec), and thescript 1600 is repeated within the hosted telemetry signal. The script1600 may be transmitted on a single stream modulated onto a spectrummonitoring system 1 (SMS1) signal. The inband telemetry data may beencoded for security.

Referring to the script 1600, the script 1600 begins with a start/syncsignal minor frame start 1610. Then, the SMS1 master script 1620 begins.Then, the SMS1 spectrum monitoring configuration scripts 1630, whichmonitor the various portions of the payload that are configured for thehosted user, run. Then, the hosted fixed time collection scripts 1640,which collect the telemetry from the various portions of the payloadthat are configured for the hosted user for a fixed amount of time, run.

Then, the hosted stream switch, subchannel power (SCP), limiter,subchannel automatic level control (SALC), subchannel gain (SCG)collection scripts 1650 run. These scripts 1650 collect telemetry dataregarding the switching configuration, SCP, limiter configuration, SALC,and SCG. These scripts 1650 repeat in a loop of Y number of times.

Then, the analog spectrum monitoring configuration (ASMS)/analog randomaccess memory (ANARAM) collection scripts run 1660. These scripts 1660collect telemetry data regarding the ASMS and the ANARAM.

Then, the SMS1 collection script start/sync signal minor frame ends1670. It should be noted that the monitoring of each different type oftelemetry data (e.g., switching configuration, SCP, limiterconfiguration, SALC, SCG, ASMS and ANARAM) may have an associatedrefresh rate and may have an associated number of times it is repeatedduring the script master cycle time of N msec.

FIG. 17 is a diagram showing an exemplary script 1700 for inbandtelemetry for the host user, in accordance with at least one embodimentof the present disclosure. In particular, this exemplary script 1700 maybe used for the inband telemetry for the host user as shown in thesystem of FIG. 4 and the method of FIGS. 5A-5D (e.g., the inbandtelemetry is the encrypted host telemetry that is transmitted 497 withina host telemetry signal, utilizing an inband frequency band(s), by thepayload antenna 480 to a hosted receiving antenna 485).

In this figure, the script 1700 is shown to run for a duration of timethat is equal to the master cycle time of M milliseconds (msec), and thescript 1700 is repeated within the host telemetry signal. The script1700 may be transmitted on a single stream modulated onto a spectrummonitoring system 1 (SMS1) signal. The inband telemetry data may beencoded for security.

Referring to the script 1700, the script 1700 begins with a start/syncsignal minor frame start 1710. Then, the SMS1 master script 1720 begins.Then, the SMS1 spectrum monitoring configuration scripts 1730, whichmonitor the various portions of the payload that are configured for thehost user, run. Then, the host fixed time collection scripts 1740, whichcollect the telemetry from the various portions of the payload that areconfigured for the host user for a fixed amount of time, run.

Then, the host stream switch, SCP, limiter, SALC, SCG collection scripts1750 run. These scripts 1750 collect telemetry data regarding theswitching configuration, SCP, limiter configuration, SALC, and SCG.These scripts 1750 repeat in a loop of X number of times.

Then, the ASMS/ANARAM collection scripts run 1760. These scripts 1760collect telemetry data regarding the ASMS and the ANARAM.

Then, the SMS1 collection script start/sync signal minor frame ends1770. It should be noted that the monitoring of each different type oftelemetry data (e.g., switching configuration, SCP, limiterconfiguration, SALC, SCG, ASMS and the ANARAM) may have an associatedrefresh rate and may have an associated number of times it is repeatedduring the script master cycle time of M msec.

FIG. 18 is a diagram showing an exemplary script 1800 for inbandtelemetry for the host user and the hosted user, in accordance with atleast one embodiment of the present disclosure. In particular, thisexemplary script 1800 may be used for the inband telemetry for the hostuser and the hosted user as shown in the system of FIG. 6 and the methodof FIGS. 7A-7D (e.g., the inband telemetry is: (1) the encrypted hosttelemetry that is transmitted 697 within a host/hosted telemetry signal,utilizing an inband frequency band(s), by the payload antenna 680 to ahost receiving antenna 685, and (2) the encrypted hosted telemetry thatis transmitted 696 within the host/hosted telemetry signal, utilizingthe inband frequency band(s), by the payload antenna 680 to a hostedreceiving antenna 690).

In this figure, the script 1800 is shown to run for a duration of timethat is equal to the master cycle time of Z milliseconds (msec), and thescript 1800 is repeated within the host/hosted telemetry signal. Thescript 1800 may be transmitted on a single stream modulated onto aspectrum monitoring system 1 (SMS1) signal. The inband telemetry datamay be encoded for security. Referring to the script 1800, the script1800 begins with a start/sync signal minor frame start 1810. Then, theSMS1 master script 1820 begins. Then, the SMS1 spectrum monitoringconfiguration scripts 1830, which monitor the various portions of thepayload that are configured for the host user and the hosted user, run.Then, the host fixed time collection scripts 1840, which collect thetelemetry from the various portions of the payload that are configuredfor the host user for a fixed amount of time, run.

Then, the host stream switch, SCP, limiter, SALC, SCG collection scripts1850 run. These scripts 1850 collect telemetry data regarding theswitching configuration, SCP, limiter configuration, SALC, and SCG.These scripts 1850 repeat in a loop of X number of times.

Then, the hosted fixed time collection scripts 1860, which collect thetelemetry from the various portions of the payload that are configuredfor the hosted user for a fixed amount of time, run.

Then, the hosted stream switch, SCP, limiter, SALC, SCG collectionscripts 1870 run. These scripts 1870 collect telemetry data regardingthe switching configuration, SCP, limiter configuration, SALC, and SCG.These scripts 1870 repeat in a loop of Y number of times.

Then, the analog spectrum monitoring configuration (ASMS)/analog randomaccess memory (ANARAM) collection scripts run 1880. These scripts 1880collect telemetry data regarding the ASMS and the ANARAM.

Then, the SMS1 collection script start/sync signal minor frame ends1890. It should be noted that the monitoring of each different type oftelemetry data (e.g., switching configuration, SCP, limiterconfiguration, SALC, SCG, ASMS and ANARAM) may have an associatedrefresh rate and may have an associated number of times it is repeatedduring the script master cycle time of Z msec.

FIG. 19 is a diagram 1900 showing two exemplary scripts (Script 1 andScript 2) for inband telemetry for the host user and the hosted user, inaccordance with at least one embodiment of the present disclosure. Inparticular, exemplary Script 1 may be used for the inband telemetry forthe host user as shown in the system of FIG. 6 and the method of FIGS.7A-7D (e.g., the inband telemetry the encrypted host telemetry that istransmitted 697 within a host telemetry signal, utilizing an inbandfrequency band(s), by the payload antenna 680 to a host receivingantenna 685). And, exemplary Script 2 may be used for the inbandtelemetry for the hosted user as shown in the system of FIG. 6 and themethod of FIGS. 7A-7D (e.g., the inband telemetry is the encryptedhosted telemetry that is transmitted 696 within a hosted telemetrysignal, utilizing the inband frequency band(s), by the payload antenna680 to a hosted receiving antenna 690).

In this figure, the Script 1 is shown to run for a duration of time thatis equal to the master cycle time of N milliseconds (msec), and Script 1is repeated within the host telemetry signal. Script 1 may betransmitted on a single stream modulated onto a spectrum monitoringsystem 1 (SMS1) signal. The inband telemetry data may be encoded forsecurity.

Also in this figure, the Script 2 is shown to run for a duration of timethat is equal to the master cycle time of M milliseconds (msec), andScript 2 is repeated within the hosted telemetry signal. Script 2 may betransmitted on a single stream modulated onto a spectrum monitoringsystem 2 (SMS2) signal. The inband telemetry data may be encoded forsecurity.

Referring to Script 1, the Script 1 starts 1910. Then, the spectrummonitoring configuration scripts 1920, which monitor the variousportions of the payload that are configured for the host user, run.Then, the host telemetry collection scripts 1930, which collect thetelemetry from the various portions of the payload that are configuredfor the host user, run. These scripts 1930 may collect telemetryrelating to the switching configuration, SCP, limiter configuration,SALC, SCG, ASMS, and ANARAM. These scripts 1930 may repeat in a loop Xnumber of times. Then, Script 1 ends 1940. It should be noted that themonitoring of each different type of telemetry data (e.g., switchingconfiguration, SCP, limiter configuration, SALC, SCG, ASMS and theANARAM) may have an associated refresh rate and may have an associatednumber of times it is repeated during the script master cycle time of Nmsec.

Referring to Script 2, the Script 2 starts 1950. Then, the spectrummonitoring configuration scripts 1960, which monitor the variousportions of the payload that are configured for the hosted user, run.Then, the hosted telemetry collection scripts 1970, which collect thetelemetry from the various portions of the payload that are configuredfor the hosted user, run. These scripts 1970 may collect telemetryrelating to the switching configuration, SCP, limiter configuration,SALC, SCG, ASMS, and ANARAM. These scripts 1970 may repeat in a loop Ynumber of times. Then, Script 2 ends 1980. It should be noted that themonitoring of each different type of telemetry data (e.g., switchingconfiguration, SCP, limiter configuration, SALC, SCG, ASMS and theANARAM) may have an associated refresh rate and may have an associatednumber of times it is repeated during the script master cycle time of Mmsec.

Although particular embodiments have been shown and described, it shouldbe understood that the above discussion is not intended to limit thescope of these embodiments. While embodiments and variations of the manyaspects of the invention have been disclosed and described herein, suchdisclosure is provided for purposes of explanation and illustrationonly. Thus, various changes and modifications may be made withoutdeparting from the scope of the claims.

Where methods described above indicate certain events occurring incertain order, those of ordinary skill in the art having the benefit ofthis disclosure would recognize that the ordering may be modified andthat such modifications are in accordance with the variations of thepresent disclosure. Additionally, parts of methods may be performedconcurrently in a parallel process when possible, as well as performedsequentially. In addition, more parts or less part of the methods may beperformed.

Accordingly, embodiments are intended to exemplify alternatives,modifications, and equivalents that may fall within the scope of theclaims.

Although certain illustrative embodiments and methods have beendisclosed herein, it can be apparent from the foregoing disclosure tothose skilled in the art that variations and modifications of suchembodiments and methods can be made without departing from the truespirit and scope of the art disclosed. Many other examples of the artdisclosed exist, each differing from others in matters of detail only.Accordingly, it is intended that the art disclosed shall be limited onlyto the extent required by the appended claims and the rules andprinciples of applicable law.

We claim:
 1. A method for a virtual transponder utilizing inbandtelemetry, the method comprising: receiving, by a vehicle, encryptedhost commands from a host spacecraft operations center (SOC), whereinthe encrypted host commands are encrypted utilizing a firstcommunication security (COMSEC) variety; receiving, by the vehicle viathe host SOC, encrypted hosted commands from a hosted payload (HoP)operation center (HOC), wherein the encrypted hosted commands areencrypted utilizing a second COMSEC variety; decrypting, by a firstcommunication security module on the vehicle, the encrypted hostcommands utilizing the first COMSEC variety to generate unencrypted hostcommands; decrypting, by a second communication security module on thevehicle, the encrypted hosted commands utilizing the second COMSECvariety to generate unencrypted hosted commands; reconfiguring a payloadon the vehicle according to at least one of the unencrypted hostcommands or the unencrypted hosted commands; transmitting, by a payloadantenna on the vehicle, payload data to at least one of a host receivingantenna or a hosted receiving antenna; encrypting, by the firstcommunication security module, unencrypted host telemetry from thepayload by utilizing the first COMSEC variety to generate encrypted hosttelemetry; encrypting, by the second communication security module,unencrypted hosted telemetry from the payload by utilizing the secondCOMSEC variety to generate encrypted hosted telemetry; transmitting, bya host telemetry transmitter on the vehicle, the encrypted hosttelemetry to the host SOC; and transmitting, by the payload antenna, theencrypted hosted telemetry to the HOC.
 2. The method of claim 1, whereinthe encrypted hosted telemetry is transmitted by the payload antenna tothe HOC one of via the hosted receiving antenna or via the hostreceiving antenna and the host SOC.
 3. The method of claim 1, whereinthe reconfiguring of the payload according to at least one of theunencrypted host commands or the unencrypted hosted commands comprisesadjusting at least one of: transponder power, transponder spectrummonitoring, transponder connectivity, transponder gain settings,transponder limiter settings, transponder automatic level controlsettings, transponder phase settings, internal gain generation,bandwidth for at least one beam, at least one frequency band for atleast one of the at least one beam, transponder beamforming settings,effective isotropic radiation power (EIRP) for at least one of the atleast one beam, transponder channels, or beam steering.
 4. The method ofclaim 1, wherein the reconfiguring of the payload according to at leastone of the unencrypted host commands or the unencrypted hosted commandscomprises reconfiguring at least one of: at least one antenna, at leastone analog-to-digital converter, at least one digital-to-analogconverter, at least one beamformer, at least one digital channelizer, atleast one demodulator, at least one modulator, at least one digitalswitch matrix, at least one digital combiner, or at least one analogswitch matrix.
 5. The method of claim 1, wherein the vehicle is anairborne vehicle.
 6. The method of claim 5, wherein the airborne vehicleis one of satellite, aircraft, unmanned aerial vehicle (UAV), or spaceplane.
 7. The method of claim 1, wherein the unencrypted host commandsare encrypted utilizing the first COMSEC variety to produce theencrypted host commands; and the unencrypted hosted commands areencrypted utilizing the second COMSEC variety to produce the encryptedhosted commands.
 8. The method of claim 1, wherein the method furthercomprises: receiving, by a host command receiver on the vehicle, theencrypted host commands; receiving, by a hosted command receiver on thevehicle, the encrypted hosted commands; transmitting, by the hostcommand receiver, the encrypted host commands to the first communicationsecurity module; and transmitting, by the hosted command receiver, theencrypted hosted commands to the second communication security module.9. The method of claim 1, wherein the method further comprises:transmitting, by the first communication security module, theunencrypted host commands to the payload; and transmitting, by thesecond communication security module, the unencrypted hosted commands tothe payload.
 10. The method of claim 1, wherein the method furthercomprises: transmitting, by the payload, to the first communicationsecurity module the unencrypted host telemetry; and transmitting, by thepayload, to the second communication security module the unencryptedhosted telemetry.
 11. The method of claim 1, wherein the method furthercomprises: transmitting, by the first communication security module, theencrypted host telemetry to a host telemetry transmitter; andtransmitting, by the second communication security module, the encryptedhosted telemetry to the payload.
 12. The method of claim 1, wherein theencrypted host telemetry is decrypted utilizing the first COMSEC varietyto generate the unencrypted host telemetry; and the encrypted hostedtelemetry is decrypted utilizing the second COMSEC variety to generatethe unencrypted hosted telemetry.
 13. A method for a virtual transponderutilizing inband telemetry, the method comprising: receiving, by avehicle, encrypted host commands from a host spacecraft operationscenter (SOC), wherein the encrypted host commands are encryptedutilizing a first communication security (COMSEC) variety; receiving, bythe vehicle via the host SOC, encrypted hosted commands from a hostedpayload (HoP) operation center (HOC), wherein the encrypted hostedcommands are encrypted utilizing a second COMSEC variety; decrypting, bya first communication security module on the vehicle, the encrypted hostcommands utilizing the first COMSEC variety to generate unencrypted hostcommands; decrypting, by a second communication security module on thevehicle, the encrypted hosted commands utilizing the second COMSECvariety to generate unencrypted hosted commands; reconfiguring a payloadon the vehicle according to at least one of the unencrypted hostcommands or the unencrypted hosted commands; transmitting, by a payloadantenna on the vehicle, payload data to at least one of a host receivingantenna or a hosted receiving antenna; encrypting, by the firstcommunication security module, unencrypted host telemetry from thepayload by utilizing the first COMSEC variety to generate encrypted hosttelemetry; encrypting, by the second communication security module,unencrypted hosted telemetry from the payload by utilizing the secondCOMSEC variety to generate encrypted hosted telemetry; transmitting, bythe payload antenna via the host receiving antenna, the encrypted hosttelemetry to the host SOC; and transmitting, by a hosted telemetrytransmitter on the vehicle via the host SOC, the encrypted hostedtelemetry to the HOC.
 14. The method of claim 13, wherein thereconfiguring of the payload according to at least one of theunencrypted host commands or the unencrypted hosted commands comprisesadjusting at least one of: transponder power, transponder spectrummonitoring, transponder connectivity, transponder gain settings,transponder limiter settings, transponder automatic level controlsettings, transponder phase settings, internal gain generation,bandwidth for at least one beam, at least one frequency band for atleast one of the at least one beam, transponder beamforming settings,effective isotropic radiation power (EIRP) for at least one of the atleast one beam, transponder channels, or beam steering.
 15. The methodof claim 13, wherein the reconfiguring of the payload according to atleast one of the unencrypted host commands or the unencrypted hostedcommands comprises reconfiguring at least one of: at least one antenna,at least one analog-to-digital converter, at least one digital-to-analogconverter, at least one beamformer, at least one digital channelizer, atleast one demodulator, at least one modulator, at least one digitalswitch matrix, at least one digital combiner, or at least one analogswitch matrix.
 16. The method of claim 13, wherein the vehicle is anairborne vehicle.
 17. A method for a virtual transponder utilizinginband telemetry, the method comprising: receiving, by a vehicle,encrypted host commands from a host spacecraft operations center (SOC),wherein the encrypted host commands are encrypted utilizing a firstcommunication security (COMSEC) variety; receiving, by the vehicle viathe host SOC, encrypted hosted commands from a hosted payload (HoP)operation center (HOC), wherein the encrypted hosted commands areencrypted utilizing a second COMSEC variety; decrypting, by a firstcommunication security module on the vehicle, the encrypted hostcommands utilizing the first COMSEC variety to generate unencrypted hostcommands; decrypting, by a second communication security module on thevehicle, the encrypted hosted commands utilizing the second COMSECvariety to generate unencrypted hosted commands; reconfiguring a payloadon the vehicle according to at least one of the unencrypted hostcommands or the unencrypted hosted commands; transmitting, by a payloadantenna on the vehicle, payload data to at least one of a host receivingantenna or a hosted receiving antenna; encrypting, by the firstcommunication security module, unencrypted host telemetry from thepayload by utilizing the first COMSEC variety to generate encrypted hosttelemetry; encrypting, by the second communication security module,unencrypted hosted telemetry from the payload by utilizing the secondCOMSEC variety to generate encrypted hosted telemetry; transmitting, bythe payload antenna via the host receiving antenna, the encrypted hosttelemetry to the host SOC; and transmitting, by the payload antenna, theencrypted hosted telemetry to the HOC.
 18. The method of claim 17,wherein the encrypted hosted telemetry is transmitted by payload antennato the HOC one of via the hosted receiving antenna or via the hostreceiving antenna and the host SOC.
 19. A method for a virtualtransponder utilizing inband telemetry, the method comprising:receiving, by a vehicle, encrypted host commands from a host spacecraftoperations center (SOC); receiving, by the vehicle via the host SOC,encrypted hosted commands from a hosted payload (HoP) operation center(HOC); decrypting, by a first communication security module, theencrypted host commands utilizing a first communication security(COMSEC) variety to generate unencrypted host commands; decrypting, by asecond communication security module, the encrypted hosted commandsutilizing a second COMSEC variety to generate unencrypted hostedcommands; reconfiguring the payload according to at least one of theunencrypted host commands or the unencrypted hosted commands;transmitting, by a payload antenna on the vehicle, payload data to atleast one of a host receiving antenna or a hosted receiving antenna;encrypting, by the first communication security module, unencryptedtelemetry utilizing the first COMSEC variety to generate encryptedtelemetry; transmitting, by the payload antenna via the host receivingantenna, the encrypted telemetry to the host SOC; and transmitting, bythe payload antenna, the encrypted telemetry to the HOC.
 20. The methodof claim 19, wherein the encrypted telemetry is transmitted by thepayload antenna to the HOC one of via the hosted receiving antenna orvia the host receiving antenna and the host SOC.