| Number | Name | Date | Kind |
|---|---|---|---|
| 5765152 | Erickson | Jun 1998 | A |
| 6081893 | Grawrock et al. | Jun 2000 | A |
| 6085321 | Gibbs et al. | Jul 2000 | A |
| 6085322 | Rommey et al. | Jul 2000 | A |
| 6094731 | Waldin et al. | Jul 2000 | A |
| 6141752 | Dancs et al. | Oct 2000 | A |
| 6158007 | Moreh et al. | Dec 2000 | A |
| 6170744 | Lee et al. | Jan 2001 | B1 |
| 6189097 | Tycksen, Jr. et al. | Feb 2001 | B1 |
| 6226743 | Naor et al. | May 2001 | B1 |
| Entry |
|---|
| Gupta et al., Identity Authentication Based on Keystroke Latencies, Feb. 1990, Communications of ACM, vol. 33, pp.168-176.* |
| Stiller man et al., Intrusion Detection for Distributed Applications, Jul. 1999, Communications of the ACM, vol. 42, No. 7, pp. 62-69. |