US 12,255,999 B2
Secure orbit communication
Jonathan Andrew Crockett Moore, Portland, OR (US)
Assigned to SpiderOak, Inc., Lenexa, KS (US)
Filed by SpiderOak, Inc., Lenexa, KS (US)
Filed on Apr. 7, 2021, as Appl. No. 17/225,044.
Claims priority of provisional application 63/150,898, filed on Feb. 18, 2021.
Prior Publication US 2022/0263656 A1, Aug. 18, 2022
Int. Cl. H04L 9/00 (2022.01); H04L 9/08 (2006.01); H04L 9/14 (2006.01); H04L 9/28 (2006.01); H04L 9/32 (2006.01)
CPC H04L 9/14 (2013.01) [H04L 9/0861 (2013.01); H04L 9/088 (2013.01); H04L 9/3215 (2013.01); H04L 9/3236 (2013.01); H04L 9/50 (2022.05)] 20 Claims
OG exemplary drawing
 
1. A method to encrypt a communication between a terrestrial operator and a satellite, the method comprising:
updating a policy of a block chain, wherein the policy of the block chain defines an authority of administrators on the block chain;
obtaining an initial cryptographic key and a procedure to iteratively calculate a sequence of cryptographic keys,
wherein the initial cryptographic key is distributed to the terrestrial operator and the satellite in response to determining that the terrestrial operator is an administrator of the block chain, and
wherein the initial cryptographic key is an administrative signing key for changing the permissions on the block chain;
encrypting a first communication between the terrestrial operator and the satellite using a first cryptographic key in the sequence of cryptographic keys,
wherein the first cryptographic key in the sequence of cryptographic keys is obtained based on the initial cryptographic key, and
wherein the first communication is transmitted via a communication channel based on a sensor type a country code, or a requester;
granting access to the communication channel based on the policy of the block chain;
enabling the first cryptographic key within a predetermined timeframe measured using a block chain clock;
upon receiving the first communication encrypted with the first cryptographic key, determining whether the first communication is received during the predetermined timeframe;
upon determining that the first communication is not received within the predetermined timeframe, disregarding the first communication;
calculating a second cryptographic key prior to sending a second communication between the terrestrial operator and the satellite, said calculating including:
using the procedure to calculate the second cryptographic key based on a cryptographic round indicator, and the initial cryptographic key,
wherein the cryptographic round indicator represents a place of the second cryptographic key in the sequence of cryptographic keys;
creating a sequence of communications including the first communication and the second communication, wherein a subsequent communication in the sequence of communications includes a hash of the sequence of communications;
receiving a third communication in the sequence of communications;
determining whether the third communication in the sequence of communications contains the hash of the sequence of communications;
upon determining that the third communication does not contain the hash of the sequence of communications, disregarding the third communication;
encrypting the second communication between the terrestrial operator and the satellite using the second cryptographic key in the sequence of cryptographic keys; and
sending the first communication and the second communication between the terrestrial operator and the satellite.