Skip to main content

从H-1B到EB-2/EB-3(工作绿卡)的流程

发信人: mandman (贪嘴的加菲猫 (Man Law)), 信区: JobHunting
标  题: 从H-1B到EB-2/EB-3(工作绿卡)的流程
发信站: BBS 未名空间站 (Mon Jun 26 07:55:34 2006)

Work Authorization指的是工作许可, 申请绿卡的第一阶段.
You are usually Unauthorized when you apply for H-1B.

-----------------------------------------------------------------------
下面是一个从H-1B到EB-2/EB-3(工作绿卡)的简单流程:

(1) H1-B for applicant [family members optional].
申请人的签证是H1-B签证(可带家属)。

(2) US Government processing time approximately 1-3 months.
美国政府审批签证的时间大约为1-3个月。

(3) Initially for 3 years with extension for additional 3 years.
签证期限:第一次为三年,三年满后可再续三年。

(4) Application made within the first year for EB-2/EB-3 Permanent Residency
Visa [Green Card] if performance acceptable to employer.
如资方满意,可在第一年内申请EB-2/EB-3永久居留签证(绿卡)。

(5) Work authorization under EB-2/EB-3 after first step of application (Labor
Certification Approval)
申请EB-3签证的第一阶段是得到工作许可(劳工许可证)。

(6) After Labor Certification Approval, File I-140 and I-485 with BCIS to get
Final Permanent Residency Approval [2-3 years for US Government Processing].
在获得工作许可后,向美国政府递交I-140 和I-485申请,从而获准最
终永久居留(美国政府审批时间大约为2-3年)。


发信人: heing (Bless everyone who re my posts), 信区: JobHunting
标  题: Re: Green Card
发信站: BBS 未名空间站 (Fri Jul 28 09:33:22 2006), 转信

好吧,今天给你科普一下:

关键词:Priority Date (PD), PERM,140, 485,绿卡排期(485排期)

EB2(non NIW)申请绿卡过程:

1. 取得劳工卡,labor certificate,即大家耳熟能详的PERM。PERM的准备过程大约需
要两个月,包括wage determination,广告(需要花钱)等等。你有律师,律师会协助
你。向劳工部的系统提交PERM申请的那天,称为PD,这个PD将在绿卡排期中起到重要作
用。PERM的批准时间官方数据说是平均45-60天,但实际中很多人两周内被批准,但同时
又有一部分人花了几个月,乃至一年等待PERM的批准。

2. 提交140。新的移民法允许同时提交140和485,但由于目前的绿卡排期使得485无法提
交,大部分人选择先提交140,同时等待排期进展。140的批准时间通常为3-4个月,USCIS
那个大家查H1批准的网页上也有140,485的批准进度。

3. 当你的PD早于每月公布的cutoff dates in the visa bulletin,恭喜你,你可以提
交485了,并同时申请EAD卡。当你的485 pending 180天后,你就可以更换雇主而不影响
绿卡申请了。这个时候,你可以选择用H1工作,也可以选择用EAD卡工作。最近的绿卡排
期对于EB2的cut off date 是03/01/2005。对了,到了这个阶段,回国可以申请AP(回
乡证),无需再到五大使馆前去排队预约签证了。

但485的批准过程也是很复杂的,有的人几个月获得批准,取得绿卡,有的人花费了几年
的时间。所以,谨记:绿卡申请不是H1申请,毫无规律可循,更没有公平可言,一切看
你的运气和RP!呵呵

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...