| CPC G06F 21/565 (2013.01) [G06F 2221/033 (2013.01)] | 20 Claims |

|
1. A computer-implemented method, comprising:
receiving a copy of a file from a customer of a software and/or data provider;
evaluating the copy of the file to determine a likelihood that the copy of the file contains a malicious code;
generating a report containing the likelihood that the file contains a malicious code;
providing the report to the customer of the software and/or data provider;
storing the copy of the file and the report in a data store;
performing iterative evaluations, based on existing file copies and reports in the data store, of the copy of the file to determine the likelihood that the file contains a malicious code;
determining, in one or more of the iterative evaluations, there has been a change in the likelihood that the copy of the file contains a malicious code based on at least the report and new information associated with contents of one or more files and reports included in the data store in one or more of the iterative evaluations;
in response to the change in the likelihood that the file contains the malicious code, generating a second report containing the likelihood that the file contains the malicious code; and
providing the second report to the customer of the software and/or data provider.
|