US 11,748,149 B2
Systems and methods for adversary detection and threat hunting
Nathan Bahr, Eden Prairie, MN (US); and Robert A. Joyce, Eden Prairie, MN (US)
Assigned to ARCHITECTURE TECHNOLOGY CORPORATION, Eden Prairie, MN (US)
Filed by Architecture Technology Corporation, Eden Prairie, MN (US)
Filed on Sep. 13, 2022, as Appl. No. 17/943,896.
Application 17/943,896 is a continuation of application No. 16/780,547, filed on Feb. 3, 2020, granted, now 11,442,766.
Prior Publication US 2023/0004422 A1, Jan. 5, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 15/16 (2006.01); G06F 9/455 (2018.01); H04L 9/40 (2022.01); G06F 9/50 (2006.01); H04L 67/568 (2022.01)
CPC G06F 9/45558 (2013.01) [G06F 9/5077 (2013.01); H04L 63/1441 (2013.01); H04L 67/568 (2022.05); G06F 2009/45587 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
receiving from an at-risk network, by a server, status data for the at-risk network via a collection virtual machine hosted by a hypervisor of the server;
caching, by the server, the status data for the at-risk network into a data repository accessible to a plurality of client virtual machines hosted by the hypervisor of the server, wherein the collection virtual machine is isolated from the plurality of client virtual machines; and
transmitting, by the server, the status data for the at-risk network to a client device via a client virtual machine of the plurality of client virtual machines, the server transmitting the status data via an inter-domain communication channel hosted by the hypervisor of the server.