USPTO Examiner LI MENG - Art Unit 2437

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18946352ADAPTIVE HOMOMORPHIC ENCRYPTION METHOD BASED ON TRUSTED EXECUTION ENVIRONMENTNovember 2024March 2025Allow400NoNo
18807438System and Method for Real-time Detection of Unrestricted File Upload Vulnerabilities in Node.js ApplicationsAugust 2024November 2024Allow310NoNo
18436862AGENTLESS RUNTIME CYBERSECURITY ANALYSISFebruary 2024June 2024Allow410NoNo
18430355Container Image Deduplication for Vulnerability Detection and Management in IT SystemsFebruary 2024August 2024Allow600NoNo
18426038HIERARCHICAL RISK SCORING FOR SAAS APPLICATIONSJanuary 2024August 2024Allow710NoNo
18414325SYSTEMS AND METHODS FOR THE SECURING DATA WHILE IN TRANSIT BETWEEN DISPARATE SYSTEMS AND WHILE AT RESTJanuary 2024April 2024Allow310NoNo
18528247Counting Machine for Manufacturing and Validating Event-Relevant Identities via an Ensemble NetworkDecember 2023August 2024Allow920YesNo
18520394INFORMATION PROCESSING METHOD AND APPARATUS, TERMINAL, AND STORAGE MEDIUMNovember 2023April 2025Allow1630YesNo
18368572MACHINE LEARNING DEVICE, MACHINE LEARNING SYSTEM, AND MACHINE LEARNING METHODSeptember 2023February 2024Allow510NoNo
18241550Timeline Building SystemSeptember 2023November 2024Allow1530YesNo
18456427SYSTEMS AND METHODS FOR THE SECURING DATA WHILE IN TRANSIT BETWEEN DISPARATE SYSTEMS AND WHILE AT RESTAugust 2023November 2023Allow310NoNo
18547421ENCRYPTED SCALAR MULTIPLICATIONAugust 2023July 2024Allow1111YesNo
18361144SYSTEMS AND METHODS FOR PERFORMING VULNERABILITY ASSESSMENT ON PARTIALLY FUNCTIONAL APPLICATIONSJuly 2023June 2025Allow2310NoNo
18351538SECURE MULTI-ENDPOINT CIPHER NEGOTIATIONJuly 2023May 2025Allow2200NoNo
18340510SYSTEMS AND METHODS FOR A DATA-DRIVEN WORKFLOW PLATFORMJune 2023August 2024Allow1420YesNo
18339690APPARATUS AND METHOD FOR MONITORING OF DATA FOR ATTACK DETECTION AND PREVENTIONJune 2023May 2025Allow2310NoNo
18318882DYNAMIC NETWORK RISK PREDICTING METHOD BASED ON A GRAPH NEURAL NETWORKMay 2023December 2023Allow710NoNo
18318945INTERACTIVE WEB APPLICATION SCANNINGMay 2023May 2024Allow1200YesNo
18317512DEFENSE METHOD OF DEEP LEARNING MODEL AIMING AT ADVERSARIAL ATTACKSMay 2023August 2023Allow300NoNo
18143420SECURE ELECTRONIC CIRCUITRY WITH TAMPER DETECTIONMay 2023February 2025Allow2110YesNo
18250809FULLY HOMOMORPHIC CRYPTOGRAPHY WITH IMPROVED DATA ITEM REPRESENTATIONApril 2023January 2024Allow910NoNo
18303545SYSTEMS AND METHODS FOR PERFORMING VULNERABILITY ASSESSMENT ON PARTIALLY FUNCTIONAL APPLICATIONSApril 2023July 2023Allow300NoNo
18122101GRAPHICAL QUERY BUILDER FOR CLOUD DATA ATTACK DETECTIONMarch 2023July 2024Allow1710YesNo
18181972Data Processing Method Based on Secure Multi-Party Computation, Electronic Device, and Storage MediumMarch 2023September 2023Allow610NoNo
18114682Copy-and-Recurse Operations for Fully Homomorphic Encrypted Database Query ProcessingFebruary 2023June 2025Allow2810NoNo
18172998METHOD AND SYSTEM FOR CONFIDENTIAL REPOSITORY SEARCHING AND RETRIEVALFebruary 2023August 2023Allow510YesNo
18111096SYSTEM AND METHOD FOR SECURING DATA FILESFebruary 2023January 2024Allow1110YesNo
18167490Private Information Retrieval with Sublinear Public-Key OperationsFebruary 2023July 2024Allow1710YesNo
18089646CONTINUOUS RISK ASSESSMENT FOR ELECTRONIC PROTECTED HEALTH INFORMATIONDecember 2022August 2024Allow1910NoNo
18145790MALICIOUS ENTERPRISE BEHAVIOR DETECTION TOOLDecember 2022October 2024Allow2220YesNo
18068470SECURE COMMUNICATION SESSION RESUMPTION IN A SERVICE FUNCTION CHAINDecember 2022March 2024Allow1510YesNo
18080294THIRD PARTY BIOMETRIC HOMOMORPHIC ENCRYPTION MATCHING FOR PRIVACY PROTECTIONDecember 2022October 2023Allow1020NoNo
18080416METHOD FOR TRAINING MODEL BASED ON HOMOMORPHIC ENCRYPTION, DEVICE, AND STORAGE MEDIUMDecember 2022October 2023Abandon1010NoNo
18075091METHODS AND SYSTEMS FOR EVALUATING EFFECTS OF CYBER ATTACKS ON CYBER-PHYSICAL SYSTEMSDecember 2022January 2025Allow2620YesNo
18074260ADVERSARIAL ATTACK PREVENTION AND MALWARE DETECTION SYSTEMDecember 2022February 2025Abandon2720YesNo
18052747Method and System for Detecting Two-Factor AuthenticationNovember 2022March 2024Allow1710YesNo
18050398APPARATUS AND METHOD FOR MONITORING OF DATA FOR ATTACK DETECTION AND PREVENTIONOctober 2022May 2023Allow710NoNo
17967570APPARATUS AND METHODS FOR VERIFYING LOST USER DATAOctober 2022August 2024Allow2210NoNo
17963886APPARATUS AND METHOD FOR PROVIDING CYBER SECURITY DEFENSE IN DIGITAL ENVIRONMENTSOctober 2022September 2023Allow1140YesNo
17937026ENHANCED ENCRYPTION FOR FACE-RELATED DATASeptember 2022March 2024Allow1710NoNo
17956001BIOMETRIC DATA SECURITY SYSTEM AND METHODSeptember 2022December 2023Allow1410NoNo
17936770LOGGING FROM USER-DEFINED FUNCTIONSSeptember 2022March 2024Allow1710NoNo
17952550Product Traceability ProcessingSeptember 2022July 2024Allow2111YesNo
17932405TRAINING METHOD AND APPARATUS FOR A DISTRIBUTED MACHINE LEARNING MODEL AND MEDIUMSeptember 2022June 2023Allow910NoNo
17939489CLOUD DATA ATTACK DETECTION QUERY BUILDERSeptember 2022November 2022Allow200YesNo
17929676INTELLIGENT VULNERABILITY LIFECYCLE MANAGEMENT SYSTEMSeptember 2022May 2024Allow2010NoNo
17887027TWO-DIMENSIONALITY DETECTION METHOD FOR INDUSTRIAL CONTROL SYSTEM ATTACKSAugust 2022March 2023Allow710NoNo
17885330SOFTWARE VULNERABILITY DETECTION IN MANAGED NETWORKSAugust 2022April 2024Allow2020YesNo
17882929SYSTEM AND METHOD FOR SENDING AND/OR RECEIVING ENTROPY AND ENTROPY EXPANSIONAugust 2022October 2024Allow2611YesNo
17872447SYSTEM AND METHOD FOR EXECUTING DATA ACCESS TRANSACTIONJuly 2022July 2024Abandon2310NoNo
17868894SYSTEM AND METHOD FOR EXECUTING DATA ACCESS TRANSACTIONJuly 2022July 2024Abandon2310NoNo
17862504System, Method, and Computer Program Product for Maintaining User Privacy in Advertisement NetworksJuly 2022October 2023Allow1610NoNo
17810666SYSTEM AND METHOD FOR FACILITATING DISTRIBUTED PEER TO PEER STORAGE OF DATAJuly 2022January 2023Allow600NoNo
17840848CLUSTER SECURITY BASED ON VIRTUAL MACHINE CONTENTJune 2022April 2025Allow3430YesNo
17785235SIMULATION DEVICE AND METHOD FOR HOMOMORPHIC CRYPTOSYSTEMJune 2022July 2023Allow1300YesNo
17738666LARGE-WORD APPROXIMATE HOMOMORPHIC ENCRYPTIONMay 2022September 2024Allow2810YesNo
17735087DATA STRUCTURE FOR TRUST STOREMay 2022July 2023Allow1410NoNo
17735101SYSTEMS AND METHODS FOR IMPLEMENTING CYBERSECURITY USING BLOCKCHAIN VALIDATIONMay 2022November 2023Allow1910NoNo
17716424ENHANCED ENCRYPTION FOR FACE-RELATED DATAApril 2022June 2022Allow300NoNo
17715075Adaptive Cyber-Attack EmulationApril 2022October 2022Allow620YesNo
17709673Entity Behavior Catalog ArchitectureMarch 2022June 2023Allow1410NoNo
17695049APPARATUS AND METHODS FOR VERIFYING LOST USER DATAMarch 2022June 2022Allow300NoNo
17691474SECURING SOFTWARE PACKAGE COMPOSITION INFORMATIONMarch 2022March 2024Allow2510YesNo
17688878SYSTEMS AND METHODS FOR IMPLEMENTING CYBERSECURITY USING TRUST BINARIESMarch 2022April 2025Allow3830YesNo
17684363SYSTEMS AND METHODS FOR GENERATING TRUST BINARIESMarch 2022August 2022Allow510YesNo
17668294COMPREHENSIVE RISK ASSESSMENTFebruary 2022April 2025Allow3840YesNo
17582139SYSTEMS AND METHODS FOR PROVIDING NETWORK-BASED PERMISSIONING USING SECURITY NODE HASH IDENTIFIERSJanuary 2022July 2023Allow1710NoNo
17582492Location Aware Authorization SystemJanuary 2022August 2023Allow1810YesNo
17578022Web Attack SimulatorJanuary 2022September 2024Allow3210NoNo
17555462SYSTEMS AND METHODS FOR ADJUSTING DATA PROTECTION LEVELS BASED ON SYSTEM METADATADecember 2021October 2023Allow2200NoNo
17644503GENERATING ATTACK GRAPHS IN AGILE SECURITY PLATFORMSDecember 2021December 2023Allow2420YesNo
17551759SYSTEM FOR STATIC ANALYSIS OF BINARY EXECUTABLE CODE AND SOURCE CODE USING FUZZY LOGIC AND METHOD THEREOFDecember 2021December 2023Allow2410YesNo
17551763SYSTEM AND PROCESS USING HOMOMORPHIC ENCRYPTION TO SECURE NEURAL NETWORK PARAMETERS FOR A MOTOR VEHICLEDecember 2021October 2024Abandon3420YesNo
17549705SECURE RESOLUTION OF EMAIL-BASED QUERIES INVOLVING CONFIDENTIAL THIRD-PARTY DATADecember 2021July 2024Allow3111YesNo
17539136DETECTING SECURITY VULNERABILITIES IN QUERIES VIA AN INFORMATION FLOW GRAPHNovember 2021October 2023Allow2200NoNo
17614451Device and Method for Certifying Reliability of Public Key, and Program for SameNovember 2021April 2024Allow2910YesNo
17533374Partial Cryptographic Key Transport Using One-Time Pad EncryptionNovember 2021September 2023Allow2210NoNo
17454789DYNAMIC CERTIFICATE GENERATION ON A CERTIFICATE AUTHORITY CLOUDNovember 2021March 2023Allow1610NoNo
17511219QUANTIFIED SOCIAL MEDIA PRIVACYOctober 2021April 2025Allow4231YesNo
17452195ARTIFICIAL INTELLIGENCE (AI) BASED PRIVACY AMPLIFICATIONOctober 2021November 2023Allow2410NoNo
17605836METHODS AND SYSTEMS FOR PRIVACY PRESERVING EVALUATION OF MACHINE LEARNING MODELSOctober 2021September 2024Abandon3410NoNo
17506114TRANSMITTING ENCODED DATA ALONG TRANSMISSION MEDIUMS BASED ON COLORSPACE SCHEMESOctober 2021July 2023Allow2110YesNo
17496806INFORMATION TECHNOLOGY SECURITY ASSESSMENT MODEL FOR PROCESS FLOWS AND ASSOCIATED AUTOMATED REMEDIATIONOctober 2021June 2023Allow2010YesNo
17493316SYSTEM AND METHOD FOR VULNERABILITY DETECTION IN COMPUTER CODEOctober 2021December 2023Allow2610NoNo
17491234DETECTING SECOND-ORDER SECURITY VULNERABILITIES VIA MODELLING INFORMATION FLOW THROUGH PERSISTENT STORAGESeptember 2021April 2023Allow1910NoNo
17477222SYSTEM AND METHOD FOR EXECUTING DATA ACCESS TRANSACTIONSeptember 2021April 2022Allow710YesNo
17459415SYSTEM AND METHOD FOR ANOMALOUS DATABASE ACCESS MONITORINGAugust 2021March 2024Allow3010NoNo
17460004Automated Application Vulnerability And Risk AssessmentAugust 2021December 2023Allow2810NoNo
17445363CREDENTIAL-BASED DATA ACCESS AND SYNTHESISAugust 2021April 2024Allow3220YesNo
17402544Automatic identification of flaws in software systemsAugust 2021August 2024Allow3630YesNo
17385589METHODS AND APPARATUS TO DETECT SIDE-CHANNEL ATTACKSJuly 2021December 2023Allow2920YesNo
17384052INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUMJuly 2021November 2024Abandon3920YesNo
17382886METHOD AND SYSTEM TO PLACE RESOURCES IN A KNOWN STATE TO BE USED IN A COMPOSED INFORMATION HANDLING SYSTEMJuly 2021January 2024Allow3010NoNo
17382390Detecting exploitable paths in application software that uses third-party librariesJuly 2021September 2023Allow2610NoNo
17371977THREAT IDENTIFICATION-BASED COLLECTION OF FORENSIC DATA FROM ENDPOINT DEVICESJuly 2021April 2023Allow2110NoNo
17364458METHODS AND SYSTEMS FOR PROCESSING CONTENT RIGHTSJune 2021March 2025Allow4440YesNo
17361375METHOD AND SYSTEM FOR ENABLING PRIVACY IN AN APPLICATION USING FULLY HOMOMORPHIC ENCRYPTIONJune 2021March 2023Allow2000NoNo
17305018METHOD AND APPARATUS FOR SYSTEM PROTECTION MAINTENANCE ANALYSISJune 2021April 2023Allow2110NoNo
17305005METHOD AND APPARATUS FOR SYSTEM INFORMATION PROTECTION PROCESSES AND PROCEDURES ANALYSISJune 2021April 2023Allow2110YesNo
17358765SYSTEMS AND METHODS FOR DYNAMIC DETECTION OF VULNERABLE CREDENTIALSJune 2021March 2024Allow3320YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner LI, MENG.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
3
Examiner Affirmed
3
(100.0%)
Examiner Reversed
0
(0.0%)
Reversal Percentile
5.7%
Lower than average

What This Means

With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
12
Allowed After Appeal Filing
4
(33.3%)
Not Allowed After Appeal Filing
8
(66.7%)
Filing Benefit Percentile
49.3%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 33.3% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner LI, MENG - Prosecution Strategy Guide

Executive Summary

Examiner LI, MENG works in Art Unit 2437 and has examined 516 patent applications in our dataset. With an allowance rate of 91.5%, this examiner allows applications at a higher rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 25 months.

Allowance Patterns

Examiner LI, MENG's allowance rate of 91.5% places them in the 75% percentile among all USPTO examiners. This examiner is more likely to allow applications than most examiners at the USPTO.

Office Action Patterns

On average, applications examined by LI, MENG receive 1.67 office actions before reaching final disposition. This places the examiner in the 47% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by LI, MENG is 25 months. This places the examiner in the 66% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +14.0% benefit to allowance rate for applications examined by LI, MENG. This interview benefit is in the 56% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 35.5% of applications are subsequently allowed. This success rate is in the 75% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 27.7% of cases where such amendments are filed. This entry rate is in the 31% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 142.9% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 87% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences are highly effective with this examiner compared to others. Before filing a full appeal brief, strongly consider requesting a PAC. The PAC provides an opportunity for the examiner and supervisory personnel to reconsider the rejection before the case proceeds to the PTAB.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 75.0% of appeals filed. This is in the 60% percentile among all examiners. Of these withdrawals, 77.8% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.

Petition Practice

When applicants file petitions regarding this examiner's actions, 22.0% are granted (fully or in part). This grant rate is in the 12% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 13% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.4% of allowed cases (in the 48% percentile). This examiner issues Quayle actions less often than average. Allowances may come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • RCEs are effective: This examiner has a high allowance rate after RCE compared to others. If you receive a final rejection and have substantive amendments or arguments, an RCE is likely to be successful.
  • Request pre-appeal conferences: PACs are highly effective with this examiner. Before filing a full appeal brief, request a PAC to potentially resolve issues without full PTAB review.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.