US 12,450,349 B2
Evaluating files for malicious and/or suspicious code
Michael Joseph Wiacek, Santa Clara, CA (US)
Assigned to Stairwell, Inc., Mountain View, CA (US)
Filed by Stairwell, Inc., Santa Clara, CA (US)
Filed on Sep. 30, 2022, as Appl. No. 17/958,269.
Claims priority of provisional application 63/251,542, filed on Oct. 1, 2021.
Prior Publication US 2023/0103536 A1, Apr. 6, 2023
Int. Cl. G06F 21/56 (2013.01)
CPC G06F 21/565 (2013.01) [G06F 2221/033 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising:
receiving a copy of a file from a customer of a software and/or data provider;
evaluating the copy of the file to determine a likelihood that the copy of the file contains a malicious code;
generating a report containing the likelihood that the file contains a malicious code;
providing the report to the customer of the software and/or data provider;
storing the copy of the file and the report in a data store;
performing iterative evaluations, based on existing file copies and reports in the data store, of the copy of the file to determine the likelihood that the file contains a malicious code;
determining, in one or more of the iterative evaluations, there has been a change in the likelihood that the copy of the file contains a malicious code based on at least the report and new information associated with contents of one or more files and reports included in the data store in one or more of the iterative evaluations;
in response to the change in the likelihood that the file contains the malicious code, generating a second report containing the likelihood that the file contains the malicious code; and
providing the second report to the customer of the software and/or data provider.