COMPUTER-IMPLEMENTED METHODS, SYSTEMS COMPRISING COMPUTER-READABLE MEDIA, AND ELECTRONIC DEVICES FOR RESOURCE PRESERVATION AND INTERVENTION WITHIN A NETWORK COMPUTING ENVIRONMENT

    公开(公告)号:US20220191211A1

    公开(公告)日:2022-06-16

    申请号:US17551605

    申请日:2021-12-15

    申请人: ClearVector, Inc.

    发明人: John N. Laliberte

    摘要: A computer-implemented method for resource preservation and intervention. The method may include: enumerating a plurality of resources within a network computing environment based on data elements relating to activities and/or resources in the environment; classifying the resources under one of a plurality of pre-defined categories; based on the classification, assigning a plurality of enabled action programs to each of the resources, wherein execution of the enabled action programs causes pre-determined changes in the behavior and/or capabilities of the corresponding one of the resources; based on the classification of the resources, applying one of a plurality of data preservation programs to resources within the environment, wherein execution of the data preservation programs causes collection of corresponding pre-defined resource data; and, for each of the resources, exposing the corresponding pre-defined resource data and the assigned enabled action programs to and for use via a client device.

    SYSTEMS AND METHODS FOR VERIFYING ACTIVITY COMPUTER-IMPLEMENTED METHODS, SYSTEMS COMPRISING COMPUTER-READABLE MEDIA, AND ELECTRONIC DEVICES FOR ACTIVITY VERIFICATION WITHIN A NETWORK COMPUTING ENVIRONMENT

    公开(公告)号:US20220191210A1

    公开(公告)日:2022-06-16

    申请号:US17551518

    申请日:2021-12-15

    申请人: ClearVector, Inc.

    发明人: John N. Laliberte

    IPC分类号: H04L9/40

    摘要: A computer-implemented method for activity verification within a network computing environment. The method may include: retrieving a verification requirement defining an activity within the network computing environment, a candidate verifier, and contact information for the candidate verifier; transmitting a request for participation to the candidate verifier; upon confirmation, enrolling the confirmed verifier to the verification requirement; receiving a post-enrollment data record relating to an observed activity within the network computing environment; matching the observed activity to the verification requirement; transmitting a verification request to the enrolled confirmed verifier; receiving a verification response from the enrolled confirmed verifier; based on the verification response, generating a command to restrict or permit the observed activity within the network computing environment.