USPTO Examiner LI MENG - Art Unit 2437

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19169111PARTIALLY HOMOMORPHIC ENCRYPTION (PHE) IN DISTRIBUTED 1-BIT LARGE LANGUAGE MODEL (LLM) ARCHITECTUREApril 2025October 2025Allow620NoNo
19080000SYSTEM AND METHOD FOR SECURE KNOWLEDGE DISTILLATION USING HOMOMORPHIC ENCRYPTION IN MACHINE LEARNING ENVIRONMENTSMarch 2025August 2025Allow510NoNo
19056084COMPUTING SYSTEM FOR FULLY HOMOMORPHIC ENCRYPTION APPLICATIONS USING PARALLELIZABLE HYBRID BOOTSTRAPPINGFebruary 2025April 2025Allow200NoNo
19006173HIGH-TEMPORAL-ACCURACY ELECTROMAGNETIC FAULT INJECTION METHOD AND APPARATUS FOR CRYPTOGRAPHIC CHIPDecember 2024May 2025Allow400NoNo
19004215CONFIDENTIAL COMPUTING-BASED METHOD FOR CUSTOMIZEDLY BALANCING BETWEEN SECURITY AND PERFORMANCE OF HOMOMORPHIC ENCRYPTIONDecember 2024July 2025Allow610NoNo
18946352ADAPTIVE HOMOMORPHIC ENCRYPTION METHOD BASED ON TRUSTED EXECUTION ENVIRONMENTNovember 2024March 2025Allow400NoNo
18941347COMPUTER-IMPLEMENTED METHOD FOR DETERMINING A FREQUENCY CONTENT OF AN ENCRYPTED RAW AUDIO SIGNALNovember 2024June 2025Allow710YesNo
18807438System and Method for Real-time Detection of Unrestricted File Upload Vulnerabilities in Node.js ApplicationsAugust 2024November 2024Allow310NoNo
18796250METHOD AND AN ELECTRONIC DEVICE FOR DECODING INFORMATION IN A MULTI-DIMENSIONAL ENCRYPTED CODEAugust 2024July 2025Allow1120NoNo
18789018A METHOD OF OPTIMIZING LINEAR TRANSFORMATIONJuly 2024March 2026Allow1910YesNo
18744901ENHANCED ENCRYPTION FOR FACE-RELATED DATAJune 2024February 2026Allow2010NoNo
18737485INTEGRATED SECURITY ANALYSIS DATA STRUCTURE AND METHOD FOR MULTI-CONTAINER SOFTWARE PROJECTSJune 2024October 2025Allow1600NoNo
18662448AGENTLESS RUNTIME CYBERSECURITY ANALYSISMay 2024March 2026Allow2210NoNo
18627259Managing Implementation Of Application-Code Scanning ProcessesApril 2024February 2026Allow2210YesNo
18613785Object Movement Method, Apparatus and Electronic DeviceMarch 2024February 2026Allow2210NoNo
18607279GENERATING REMEDIATION STRATEGIES FOR RESPONDING TO SECURITY DEFICIENCIES USING GENERATIVE MACHINE LEARNING MODELSMarch 2024February 2026Allow2310YesNo
18606839METHOD AND SYSTEM FOR ASSESING RISK ASSOCIATED WITH AI MODELSMarch 2024February 2026Allow2310NoNo
18436862AGENTLESS RUNTIME CYBERSECURITY ANALYSISFebruary 2024June 2024Allow410NoNo
18430355Container Image Deduplication for Vulnerability Detection and Management in IT SystemsFebruary 2024August 2024Allow600NoNo
18429388CRYPTOGRAPHIC METHOD TO CERTIFY RETENTION LOCK STATUS WITH AN EMBEDDED VERIFICATION LOG IN A BACKUP SYSTEMJanuary 2024December 2025Allow2210YesNo
18426038HIERARCHICAL RISK SCORING FOR SAAS APPLICATIONSJanuary 2024August 2024Allow710NoNo
18418938CRYPTOGRAPHIC METHOD TO CERTIFY RETENTION LOCK STATUS FOR OPAQUE DATA IN A BACKUP SYSTEMJanuary 2024December 2025Allow2210YesNo
18414325SYSTEMS AND METHODS FOR THE SECURING DATA WHILE IN TRANSIT BETWEEN DISPARATE SYSTEMS AND WHILE AT RESTJanuary 2024April 2024Allow310NoNo
18400689METHODS AND APPARATUSES FOR JOINTLY PROCESSING DATA BY TWO PARTIES FOR DATA PRIVACY PROTECTIONDecember 2023February 2026Allow2620NoNo
18394419Homomorphic Encryption-Based Image Encryption And Decryption Method And DeviceDecember 2023November 2025Allow2310NoNo
18528247Counting Machine for Manufacturing and Validating Event-Relevant Identities via an Ensemble NetworkDecember 2023August 2024Allow920YesNo
18519270FACILITATING MODIFICATION OF COMPONENTS OF ARTIFICIAL INTELLIGENCE COMPUTING APPLICATIONS VIA AGGREGATED RISK SCORESNovember 2023January 2026Allow2610NoNo
18520394INFORMATION PROCESSING METHOD AND APPARATUS, TERMINAL, AND STORAGE MEDIUMNovember 2023April 2025Allow1630YesNo
18501895TECHNIQUES TO PROCESS THREE-DIMENSIONAL OBJECT FILES WHILE MAINTAINING PRIVACYNovember 2023January 2026Allow2610YesNo
18499684Location Aware Authorization SystemNovember 2023December 2025Allow2610YesNo
18380512SYSTEMS AND METHODS FOR PROVIDING NETWORK-BASED PERMISSIONING USING SECURITY NODE HASH IDENTIFIERSOctober 2023November 2025Allow2510YesNo
18376138Artificial Intelligence (AI) Based Cloud Architecture Segmentation Leveraging Homomorphic EncryptionOctober 2023October 2025Allow2410NoNo
18478610CRYPTOGRAPHIC METHOD TO CERTIFY RETENTION LOCK STATUS FOR AUDITING IN A BACKUP SYSTEMSeptember 2023December 2025Allow2610YesNo
18283008SECURE SEARCH METHOD, SYSTEM THEREOF, APPARATUS THEREOF, ENCRYPTION APPARATUS, SEARCHER TERMINAL, AND PROGRAMSeptember 2023February 2026Abandon2920NoNo
18368572MACHINE LEARNING DEVICE, MACHINE LEARNING SYSTEM, AND MACHINE LEARNING METHODSeptember 2023February 2024Allow510NoNo
18465859OFFLINE PLATFORM INFORMATION TECHNOLOGY CYBER-PHYSICAL RISK MITIGATIONSeptember 2023September 2025Allow2410NoNo
18241550Timeline Building SystemSeptember 2023November 2024Allow1530YesNo
18456427SYSTEMS AND METHODS FOR THE SECURING DATA WHILE IN TRANSIT BETWEEN DISPARATE SYSTEMS AND WHILE AT RESTAugust 2023November 2023Allow310NoNo
18547421ENCRYPTED SCALAR MULTIPLICATIONAugust 2023July 2024Allow1111YesNo
18361144SYSTEMS AND METHODS FOR PERFORMING VULNERABILITY ASSESSMENT ON PARTIALLY FUNCTIONAL APPLICATIONSJuly 2023June 2025Allow2310NoNo
18274136SECURE COMPUTATION SYSTEM, SECURE COMPUTATION SERVER APPARATUS, SECURE COMPUTATION METHOD, AND SECURE COMPUTATION PROGRAMJuly 2023November 2025Abandon2710NoNo
18351538SECURE MULTI-ENDPOINT CIPHER NEGOTIATIONJuly 2023May 2025Allow2200NoNo
18348747Predicting and Quantifying Weaponization of Software WeaknessesJuly 2023February 2026Allow3210YesNo
18340510SYSTEMS AND METHODS FOR A DATA-DRIVEN WORKFLOW PLATFORMJune 2023August 2024Allow1420YesNo
18339690APPARATUS AND METHOD FOR MONITORING OF DATA FOR ATTACK DETECTION AND PREVENTIONJune 2023May 2025Allow2310NoNo
18318882DYNAMIC NETWORK RISK PREDICTING METHOD BASED ON A GRAPH NEURAL NETWORKMay 2023December 2023Allow710NoNo
18318945INTERACTIVE WEB APPLICATION SCANNINGMay 2023May 2024Allow1200YesNo
18317512DEFENSE METHOD OF DEEP LEARNING MODEL AIMING AT ADVERSARIAL ATTACKSMay 2023August 2023Allow300NoNo
18314471TRANSACTION DATA PROCESSING METHOD AND APPARATUS, COMPUTER DEVICE AND STORAGE MEDIUMMay 2023September 2025Allow2910YesNo
18143420SECURE ELECTRONIC CIRCUITRY WITH TAMPER DETECTIONMay 2023February 2025Allow2110YesNo
18250809FULLY HOMOMORPHIC CRYPTOGRAPHY WITH IMPROVED DATA ITEM REPRESENTATIONApril 2023January 2024Allow910NoNo
18303545SYSTEMS AND METHODS FOR PERFORMING VULNERABILITY ASSESSMENT ON PARTIALLY FUNCTIONAL APPLICATIONSApril 2023July 2023Allow300NoNo
18295959HOMOMORPHIC ENCRYPTIONApril 2023July 2025Allow2820NoNo
18194891TOKEN BASED ONE-TIME PASSWORD SECURITYApril 2023September 2025Allow3030YesNo
18029030REDISTRIBUTION OF SECRET SHARINGSMarch 2023September 2025Allow2910YesNo
18122101GRAPHICAL QUERY BUILDER FOR CLOUD DATA ATTACK DETECTIONMarch 2023July 2024Allow1710YesNo
18181972Data Processing Method Based on Secure Multi-Party Computation, Electronic Device, and Storage MediumMarch 2023September 2023Allow610NoNo
18114682Copy-and-Recurse Operations for Fully Homomorphic Encrypted Database Query ProcessingFebruary 2023June 2025Allow2810NoNo
18113803FLEXIBLE RISK ASSESSMENT AND MANAGEMENT SYSTEM FOR INTEGRATED RISK AND VALUE ANALYSISFebruary 2023January 2026Allow3430YesNo
18172998METHOD AND SYSTEM FOR CONFIDENTIAL REPOSITORY SEARCHING AND RETRIEVALFebruary 2023August 2023Allow510YesNo
18111096SYSTEM AND METHOD FOR SECURING DATA FILESFebruary 2023January 2024Allow1110YesNo
18167490Private Information Retrieval with Sublinear Public-Key OperationsFebruary 2023July 2024Allow1710YesNo
18165693SYSTEMS AND METHODS FOR LINKING REMOTE FILE STORAGEFebruary 2023October 2025Allow3320YesNo
18089646CONTINUOUS RISK ASSESSMENT FOR ELECTRONIC PROTECTED HEALTH INFORMATIONDecember 2022August 2024Allow1910NoNo
18145790MALICIOUS ENTERPRISE BEHAVIOR DETECTION TOOLDecember 2022October 2024Allow2220YesNo
18068470SECURE COMMUNICATION SESSION RESUMPTION IN A SERVICE FUNCTION CHAINDecember 2022March 2024Allow1510YesNo
18080294THIRD PARTY BIOMETRIC HOMOMORPHIC ENCRYPTION MATCHING FOR PRIVACY PROTECTIONDecember 2022October 2023Allow1020NoNo
18080416METHOD FOR TRAINING MODEL BASED ON HOMOMORPHIC ENCRYPTION, DEVICE, AND STORAGE MEDIUMDecember 2022October 2023Abandon1010NoNo
18009048MANAGEMENT DEVICE, ENCRYPTION TERMINAL, USER TERMINAL, ENCRYPTION SYSTEM, MANAGEMENT METHOD, ENCRYPTION METHOD, AND COMPUTER-READABLE MEDIUMDecember 2022November 2025Abandon3520NoNo
18075091METHODS AND SYSTEMS FOR EVALUATING EFFECTS OF CYBER ATTACKS ON CYBER-PHYSICAL SYSTEMSDecember 2022January 2025Allow2620YesNo
18074260ADVERSARIAL ATTACK PREVENTION AND MALWARE DETECTION SYSTEMDecember 2022February 2025Abandon2720YesNo
18052747Method and System for Detecting Two-Factor AuthenticationNovember 2022March 2024Allow1710YesNo
18050398APPARATUS AND METHOD FOR MONITORING OF DATA FOR ATTACK DETECTION AND PREVENTIONOctober 2022May 2023Allow710NoNo
17967570APPARATUS AND METHODS FOR VERIFYING LOST USER DATAOctober 2022August 2024Allow2210NoNo
17963886APPARATUS AND METHOD FOR PROVIDING CYBER SECURITY DEFENSE IN DIGITAL ENVIRONMENTSOctober 2022September 2023Allow1140YesNo
17937026ENHANCED ENCRYPTION FOR FACE-RELATED DATASeptember 2022March 2024Allow1710NoNo
17936770LOGGING FROM USER-DEFINED FUNCTIONSSeptember 2022March 2024Allow1710NoNo
17956001BIOMETRIC DATA SECURITY SYSTEM AND METHODSeptember 2022December 2023Allow1410NoNo
17952550Product Traceability ProcessingSeptember 2022July 2024Allow2111YesNo
17932405TRAINING METHOD AND APPARATUS FOR A DISTRIBUTED MACHINE LEARNING MODEL AND MEDIUMSeptember 2022June 2023Allow910NoNo
17939489CLOUD DATA ATTACK DETECTION QUERY BUILDERSeptember 2022November 2022Allow200YesNo
17929676INTELLIGENT VULNERABILITY LIFECYCLE MANAGEMENT SYSTEMSeptember 2022May 2024Allow2010NoNo
17887027TWO-DIMENSIONALITY DETECTION METHOD FOR INDUSTRIAL CONTROL SYSTEM ATTACKSAugust 2022March 2023Allow710NoNo
17885330SOFTWARE VULNERABILITY DETECTION IN MANAGED NETWORKSAugust 2022April 2024Allow2020YesNo
17882929SYSTEM AND METHOD FOR SENDING AND/OR RECEIVING ENTROPY AND ENTROPY EXPANSIONAugust 2022October 2024Allow2611YesNo
17872447SYSTEM AND METHOD FOR EXECUTING DATA ACCESS TRANSACTIONJuly 2022July 2024Abandon2310NoNo
17868894SYSTEM AND METHOD FOR EXECUTING DATA ACCESS TRANSACTIONJuly 2022July 2024Abandon2310NoNo
17862504System, Method, and Computer Program Product for Maintaining User Privacy in Advertisement NetworksJuly 2022October 2023Allow1610NoNo
17810666SYSTEM AND METHOD FOR FACILITATING DISTRIBUTED PEER TO PEER STORAGE OF DATAJuly 2022January 2023Allow600NoNo
17840848CLUSTER SECURITY BASED ON VIRTUAL MACHINE CONTENTJune 2022April 2025Allow3430YesNo
17785235SIMULATION DEVICE AND METHOD FOR HOMOMORPHIC CRYPTOSYSTEMJune 2022July 2023Allow1300YesNo
17738666LARGE-WORD APPROXIMATE HOMOMORPHIC ENCRYPTIONMay 2022September 2024Allow2810YesNo
17735101SYSTEMS AND METHODS FOR IMPLEMENTING CYBERSECURITY USING BLOCKCHAIN VALIDATIONMay 2022November 2023Allow1910NoNo
17735087DATA STRUCTURE FOR TRUST STOREMay 2022July 2023Allow1410NoNo
17716424ENHANCED ENCRYPTION FOR FACE-RELATED DATAApril 2022June 2022Allow300NoNo
17715075Adaptive Cyber-Attack EmulationApril 2022October 2022Allow620YesNo
17709673Entity Behavior Catalog ArchitectureMarch 2022June 2023Allow1410NoNo
17695049APPARATUS AND METHODS FOR VERIFYING LOST USER DATAMarch 2022June 2022Allow300NoNo
17691474SECURING SOFTWARE PACKAGE COMPOSITION INFORMATIONMarch 2022March 2024Allow2510YesNo
17688878SYSTEMS AND METHODS FOR IMPLEMENTING CYBERSECURITY USING TRUST BINARIESMarch 2022April 2025Allow3830YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner LI, MENG.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
3
Examiner Affirmed
3
(100.0%)
Examiner Reversed
0
(0.0%)
Reversal Percentile
6.3%
Lower than average

What This Means

With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
12
Allowed After Appeal Filing
4
(33.3%)
Not Allowed After Appeal Filing
8
(66.7%)
Filing Benefit Percentile
52.2%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 33.3% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner LI, MENG - Prosecution Strategy Guide

Executive Summary

Examiner LI, MENG works in Art Unit 2437 and has examined 456 patent applications in our dataset. With an allowance rate of 90.6%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 26 months.

Allowance Patterns

Examiner LI, MENG's allowance rate of 90.6% places them in the 74% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by LI, MENG receive 1.75 office actions before reaching final disposition. This places the examiner in the 38% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by LI, MENG is 26 months. This places the examiner in the 75% percentile for prosecution speed. Applications move through prosecution relatively quickly with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +16.4% benefit to allowance rate for applications examined by LI, MENG. This interview benefit is in the 57% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 34.7% of applications are subsequently allowed. This success rate is in the 77% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 26.4% of cases where such amendments are filed. This entry rate is in the 37% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 142.9% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 88% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences are highly effective with this examiner compared to others. Before filing a full appeal brief, strongly consider requesting a PAC. The PAC provides an opportunity for the examiner and supervisory personnel to reconsider the rejection before the case proceeds to the PTAB.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 75.0% of appeals filed. This is in the 64% percentile among all examiners. Of these withdrawals, 77.8% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.

Petition Practice

When applicants file petitions regarding this examiner's actions, 22.2% are granted (fully or in part). This grant rate is in the 11% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 14% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.5% of allowed cases (in the 55% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • RCEs are effective: This examiner has a high allowance rate after RCE compared to others. If you receive a final rejection and have substantive amendments or arguments, an RCE is likely to be successful.
  • Request pre-appeal conferences: PACs are highly effective with this examiner. Before filing a full appeal brief, request a PAC to potentially resolve issues without full PTAB review.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.