Date post: | 06-Apr-2018 |
Category: |
Documents |
Upload: | reshmajose |
View: | 218 times |
Download: | 0 times |
of 25
8/3/2019 Blue Track
1/25
Microsofts
BLUETRACK TECHNOLOGY
SEMINAR REPORT
Submitted in fulfilment of the requirements for the award of the Degree of Bachelor of
Science in
Electronics with computer hardware
Of the M.G University
By
NITHIN THOMAS
DEPARTMENT OF ELECTRONICS
COLLEGE OF APPLIED SCIENCE, KATTAPANA
2012
Department of Electronics 1
8/3/2019 Blue Track
2/25
DEPARTMENT OF ELECTRONICS
COLLEGE OF APPLIED SCIENCE, KATTAPANA
2012
CERTIFICATE
This is to certify that the seminar report entitled MICROSOFT BLUE TRACK
TECHNOLOGYbeing submitted by NITHIN THOMAS in partial fulfillment of the requirements
for the award of the Degree of Bachelor of Science in Electronics with Computer Hardware of theMahatma Gandhi University is a bonafide record of the work by her under our guidance and
supervision and that this work has not been submitted for the award of any degree.
Guided by
Mr. Reji V.R Mrs. Sheeja K S
Lecturer in Electronics Principal
College of Applied Science College of Applied Science
Kattapana Kattapana
Department of Electronics 2
8/3/2019 Blue Track
3/25
Acknowledgement
I express outmost gratitude to my guide Mr. Reji V R, for his constant guidance, innovativethinking and meticulous help during the course of my seminar work. And also to Ms. Nimisha
George and Ms. Mallu Liss Abraham who have extended all their help in presenting this seminar.
I take immense pleasure in expressing my sincere gratitude to Smt. Sheeja ,principal
College of Applied Science, Kattapana, for providing me the necessary facilities to carry out this
work.
Im also thankful to all the teachers of Electronics department who supported me throughoutthese days to present out my seminar. I also thank my parents and friends for their help and
encouragement.
Last but not least I thank God, the almighty for all the blessings bestowed upon me without
which the seminar would not have been a reality.
NITHIN THOMAS
Department of Electronics 3
8/3/2019 Blue Track
4/25
CONTENTS
CHAPTER 1 INTRODUCTION
CHAPTER 2 MICROSOFT HARDWARE: HISTORY OF
LEADERSHIP
2.1 UNDER THE HOOD
CHAPTER 3 TYPES OF DEVICES ENABLED WITH BLUETRACK
TECHNOLOGY
3.1 EXPLORER MOUSE AND EXPLORER MINI MOUSE
3.2 AVAILABILITY
CHAPTER 4 ABOUT MICROSOFT HARDWARE AND MICROSOFT
4.1 MICROSOFT HARDWARE
4.2 ABOUT MICROSOFT
CHAPTER 5 BLUETRACK CHIPSETS AND ITS TYPES
5.1 CLASS 1 CHIPSETS
5.2 CLASS 2 CHIPSETS
5.3 CLASS 3 CHIPSETS
CHAPTER 6 BLUE TRACK TECHNOLOGY MOUSE BY
MICROSOFT AND ITS VARITIES
CHAPTER 7 CIRCUIT DIAGRAMS
CHAPTER 8 ADVANTAGES AND DISADVANTAGES
CHAPTER 9 HOW TO GET OUT OF RISK?????
CHAPTER 10 REQUIREMENTS
CONCLUSION
Department of Electronics 4
8/3/2019 Blue Track
5/25
REFERENCE
CHAPTER 1
INTRODUCTION
The worlds most advanced tracking technology, Microsoft Blue Track Technology,
which allows consumers to take their mice anywhere and work with confidence on more surfaces
than before. Microsofts new proprietary tracking technology combines the width and power of
optical technology with the precision of laser tracking to allow consumers to mouse on virtually any
surface1 from a granite kitchen countertop to the living room carpet.
BlueTrack Technology will debut in two new top-of-the-line mice, Microsoft Explorer
Mouse and Microsoft Explorer Mini Mouse, available this fall at BestBuy.com and in Best Buy
stores. According to Microsoft, in a Blue Track technology mouse, the sensor, the light and the
component configuration are optimized for the best possible surface image for a variety of
conditions. BlueTrack Technology provides the mouse ASIC and the computerwith exceptionally
accurate and detailed information for advanced tracking on almost any surface.
A BlueTrack technology mouse uses a Microsoft-designed complementary metal-oxide-
semiconductor (CMOS) chip with advanced algorithms and pixel architecture for more precisetracking. It is Microsoft's fourth-generation application-specific integrated circuit (ASIC) using
CMOS technology.
Department of Electronics 5
http://www.webopedia.com/TERM/M/mouse.htmlhttp://www.webopedia.com/TERM/A/ASIC.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/S/semiconductor.htmlhttp://www.webopedia.com/TERM/C/CMOS.htmlhttp://www.webopedia.com/TERM/A/ASIC.htmlhttp://www.mousearena.com/wp-content/uploads/2011/08/Blue-Track-Technology-Mouse-by-Microsoft.jpghttp://www.webopedia.com/TERM/M/mouse.htmlhttp://www.webopedia.com/TERM/A/ASIC.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/S/semiconductor.htmlhttp://www.webopedia.com/TERM/C/CMOS.htmlhttp://www.webopedia.com/TERM/A/ASIC.html8/3/2019 Blue Track
6/25
Microsoft new technology called Blue track technology has become quite popular among computer
users. This technology enables laser mouse tracking on virtually any surface type, whether its wood,
granite or even a carpet. Blue track technology is the big innovation by Microsoft. Due to invention
of Blue track technology mouse, mobility of computer users from one place to another has become
easier. In fact 72 percent of computer sold in the market are notebook computer and users require a
mouse that can be mobile or it can go with them anywhere. Blue track technology has cover up the
areas where optical and laser technologies mouse were falling short. Microsoft blue track technology
mouse outperforms laser and optical mouse.
These mice are quite popular for their tracking accuracy, stylish design and mesmerizing blue glow.
These features of Microsoft blue track technology mouse make it a good choice for avid gamers.
Mice with blue track technology are perfect choice for people who love to play games on computer.
Blue track uses a large blue beam and specular optics architecture combined with an image sensor
and pixel geometry designed by Microsoft to generate high contrast image of the surface that permits
extraordinary tracking accuracy beneath the mouse. The light beam in Microsoft blue track
technology mouse is more than four times larger than the average laser beam of laser mouse. This
will help you to track accurately. Mentioned below are some of the blue track technology mice by
Microsoft.
Department of Electronics 6
8/3/2019 Blue Track
7/25
CHAPTER 2
MICROSOFT HARDWARE: HISTORY OF LEADERSHIP
Microsoft Hardware has consistently raised the bar in mouse tracking technology
throughout its 26-year history, including the launch of the worlds first optical mouse in 1999. The
LED light and sensor allowed consumers to mouse on more surfaces with ease, eliminating the old
ball mouse for good. In 2005, Microsoft introduced High Definition Laser Technology, which
allowed mice to work on many surfaces that optical technology did not. But now Microsofts in-
house engineers have taken mouse tracking to the next level, creating an exclusive, groundbreaking
technology to advance the way consumers use their computer mice.
Research shows that people arent sitting at a desk all day, but theyve gone
mobile. In fact, 72 percent of PCs sold are notebook PCs, and consumers need a mouse that can go
with them anywhere, said Mark DePue, platforms engineering manager at Microsoft and co-
inventor of Blue Track Technology. Blue Track Technology excels in areas where optical and laser
technologies were falling short. Laser mice, for example, have a difficult time working on some
common home surfaces, including granite and marble.
According to David Bohn, senior engineering architect at Microsoft and BluE
Track Technology co-inventor, Laser technology is also sensitive to dust and dirt accumulation
during travel, which can lead to poor tracking performance. With Blue Track Technology you can
rest easier about where your mouse will or wont track it works just about everywhere, just like
you.
2.1 Under the Hood
Microsofts Blue Track Technology works on more surfaces than both optical and
laser mice. The large, blue beam and specular optics architecture, in conjunction with a Microsoft-designed image sensor and proprietary pixel geometry, generates a high-contrast picture of the
mousing surface that allows exceptional tracking accuracy. The Blue Track Technology light beam
emanating from the bottom of the mouse is more than four times as large as the average laser beam
used in todays mice, enabling reliable mouse tracking even on difficult surfaces such as carpet.
Department of Electronics 7
8/3/2019 Blue Track
8/25
This advanced technology creates a superior, more precise picture of the surface,
allowing consumers to use their mouse virtually anywhere. To see a video on the making of Blue
Track Technology and meet the inventors, consumers can visit
http://www.microsoft.com/hardware/bluetrack.
Department of Electronics 8
http://www.microsoft.com/hardware/bluetrackhttp://www.microsoft.com/hardware/bluetrack8/3/2019 Blue Track
9/25
8/3/2019 Blue Track
10/25
CHAPTER 4
ABOUT MICROSOFT HARDWARE AND MICROSOFT
4.1 MICROSOFT HARDWARE
For more than 25 years, the Hardware Group has employed innovative engineering, cutting-edge
industrial design and extensive usability testing to create products of exceptional quality and
durability that enhance the software experience and strengthen the connection between consumers
and their PC. Microsoft Hardware leads the industry in ergonomic engineering, industrial design and
hardware/software compatibility, offering consumers an easier, more convenient and more enjoyable
computing experience. Microsoft IntelliMouse Explorer, which launched in 1999, earned a place on
PCWorld.coms December 2005 list of The 50 Greatest Gadgets of the Past 50 Years as the first
mainstream optical mouse that brought gunk-free pointing devices to a broad consumer base.
More information about the Hardware Group is available at http://www.mshardwareguide.com.
4.2 ABOUT MICROSOFT
Founded in 1975, Microsoft (Nasdaq MSFT) is the worldwide leader in software, services and
solutions that help people and businesses realize their full potential.
1
BlueTrack Technology does not work on clear glass or mirrored surfaces.2 The NPD Group Inc., based on U.S. retail unit sales from June 2007 to June 2008.
3 Actual retail prices may vary
A proprietary tracking technology from Microsoft that lets you use a mouse on virtually any
surface, excluding clear glass and mirrored surfaces.
According to Microsoft, in a Blue Track technology mouse, the sensor, the light and the component
configuration are optimized for the best possible surface image for a variety of conditions.
BlueTrack Technology provides the mouse ASIC and the computerwith exceptionally accurate and
detailed information for advanced tracking on almost any surface.
A BlueTrack technology mouse uses a Microsoft-designed complementary metal-oxide-
semiconductor (CMOS) chip with advanced algorithms and pixel architecture for more precise
Department of Electronics 10
http://www.mshardwareguide.com/http://www.webopedia.com/TERM/P/proprietary.htmlhttp://www.webopedia.com/TERM/T/technology.htmlhttp://www.webopedia.com/TERM/M/Microsoft.htmlhttp://www.webopedia.com/TERM/M/mouse.htmlhttp://www.webopedia.com/TERM/A/ASIC.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/S/semiconductor.htmlhttp://www.webopedia.com/TERM/C/CMOS.htmlhttp://www.mshardwareguide.com/http://www.webopedia.com/TERM/P/proprietary.htmlhttp://www.webopedia.com/TERM/T/technology.htmlhttp://www.webopedia.com/TERM/M/Microsoft.htmlhttp://www.webopedia.com/TERM/M/mouse.htmlhttp://www.webopedia.com/TERM/A/ASIC.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/S/semiconductor.htmlhttp://www.webopedia.com/TERM/C/CMOS.html8/3/2019 Blue Track
11/25
tracking. It is Microsoft's fourth-generation application-specific integrated circuit (ASIC) using
CMOS technology.
Proprietary high-angle imaging optics generate more exact surface images - even of shiny surfaces
such as granite and marble - instead of blurry, out-of-focus images, as can be produced by many of
the leading laser mice. And blue light helps create high-resolution, high-contrast images for better
navigation. The wider beam enables illumination of a larger surface area and allows more light to
return to the sensor. This helps for tracking on irregular surfaces such as carpet, where a smaller
beam could get lost between the individual fibers.
BlueTrack Technology debuted on two Microsoft products in November 2008: the Explorer Mouse
and the Explorer Mini Mouse.
Department of Electronics 11
http://www.webopedia.com/TERM/A/ASIC.htmlhttp://www.risedream.com/blog/wp-content/uploads/2010/09/Microsoft-Metro-mouse.jpghttp://www.webopedia.com/TERM/A/ASIC.html8/3/2019 Blue Track
12/25
CHAPTER 5
BLUETRACK CHIPSETS AND ITS TYPES
Tracking and location detection through Bluetooth is one of the foremost concerns for any
user with a Bluetooth handset, and is able to give personal information about travel, personal
whereabouts, habits and can even lead to other types of attacks including information interception
and business attacks. The act of an attacker using a Bluetooth device to connect and track another
Bluetooth device is called BlueTracking.
The Blue Tracking attack is mostly used for espionage and can be used for blackmail but is
less effective than a number of other Bluetooth attacks, mostly because of the Bluetooth chipset that
is used in most phones and devices. Bluetooth chips come in three classes or types which mainly
determine the range at which they are effective.
5.1 CLASS 1 CHIPSETS
Class 1, used in many Bluetooth dongles to be used on personal computers, have a range of
about 100 meters. Because of the small form factor and portability of these types of devices,
experiments have been done and successfully have extended the range of these devices up to 1
kilometer with special equipment, the author of [2] confirmed that he could extend the range up to
230 meters with an average 5 dbi antenna, and up to 500 meters with a 14dbi antenna, both being
soldered to the antenna contacts. This means that it would be used as the primary attack media for
such a Blue Tracking attack, mainly because it has the largest area it is able to cover. Because
Bluetooth was meant to be a relatively close distance wireless technology, the attacker, even with a
class 1 Bluetooth device, would have to be relatively close, but this topic will be covered later in this
section.
5.2 CLASS 2 CHIPSETS
Class 2 chipsets are the chipsets that are used in most mobile phones and smaller devices,
giving the user a range for communication of approximately 10 meters [2]. Using these devices in a
BlueTracking attack implies that the attacker would have to be within a relatively close range to the
Department of Electronics 12
8/3/2019 Blue Track
13/25
victim, giving the attacker a larger likelihood of being seen or discovered. No attempts at extending
the range of class two devices could be found in the given sources or within research.
5.3 CLASS 3 CHIPSETS
Class 3 chipsets follow in suit from the class 1 and class 2 chipsets, and are said to have the
best range when used well within 10 m [3]. The same authors later estimate the best range for
class 3 devices to be up to 3 meters, giving them the least likelihood to be victims of attack due to
the attacker having to be right on the victims heals or only to detect them while the victim were
walking by at a close distance. The types of devices that utilize the class 3 chipsets are mainly
Bluetooth earpieces for wireless communication between the ear piece and phone.
Department of Electronics 13
8/3/2019 Blue Track
14/25
CHAPTER 6
BLUE TRACK TECHNOLOGY MOUSE BY MICROSOFT AND ITS
VARITIES
1. Wireless Mobile mouse 4000 Studio Series: You can use this sporty mouse anywhere in your house. This
mouse can be used on carpet, wood, or on your bed. This wireless mouse can be controlled from a distance of
300 feet away form the computer. This mouse can be used up to 10 months without having to change
batteries. This mouse includes battery indicator which will tell you when battery power of your mouse is low.
2. Wireless Mobile Mouse 3500 Limited edition: This stylish designed mouse can be used anywhere in your
house. You can use it even on a rough park bench or carpet or nay other thing. This mouse can be used up to 8months without having to change batteries. This mouse includes battery indicator which indicates when the
battery power of your mouse is low
3. Explorer touch mouse Limited edition: This mouse has strip on its top that acts as a scroll wheel. This
stylish mouse includes five programmable buttons. This mouse has 100 MB internal storage and can be used
up to 18 months without having to change batteries.
If you wish to have mouse with excellent quality and blue track technology then you can definitely go forabove mentioned mouse. Along with these, there are many other blue track technology mice by Microsoft
such as Microsoft comfort mouse 4500, wireless mobile mouse 3500, Wireless Mobile mouse 4000 studio
series and many more. You can choose any of the blue track technology mouse that suits both your
expectation and budget. Blue track technology mouse will provide you great control and accuracy.
Department of Electronics 14
8/3/2019 Blue Track
15/25
CHAPTER 7
CIRCUIT DIAGRAMS
Department of Electronics 15
8/3/2019 Blue Track
16/25
Department of Electronics 16
8/3/2019 Blue Track
17/25
CHAPTER 8
ADVANTAGES AND DISADVANTAGES
For any type of attack, using any class of Bluetooth chipset, the most common vulnerability
and allowance for attackers to exploit the device is when the victim device is left in a discoverable
mode. The first problem with leaving a device in discoverable mode is the fact that if a phone or
similar device can be found, some of its basic Bluetooth abilities are not guarded and do not require
that the user acknowledge them to be used. For example, the address book, calendar information
and business card info are all stored in the phones memory as files, all with similar naming schemes
among all phones . If an attacker gets within range for even a minute, the amount of time that it
takes a person to check out in the grocery store or stand in line to get a ticket or board a train, theattacker can get their address book or calendar, two pieces of a personal nature which may not seem
like an overly bad thing for others to see, but two files that can help the attacker plan further attacks
or blackmail the owner of the victim device. A set of phone numbers for personal contacts can very
easily contain information for relatives, coworkers and supervisors, all of which could be compared
with the calendar.
Overall, this vulnerability has been mostly corrected with newer phones, newer firmware for the
phones, and an overall education being passed onto the consumer about how to change or fix thisproblem. At the same time, many people who get used a single phone or Bluetooth device and do
not have the technical knowledge of how to switch it between discoverable Bluetooth mode and non-
discoverable Bluetooth mode, do not want to switch to a newer phone or have the knowledge to
upgrade the firmware. This seems to be one of the most vulnerable and dangerous parts of Blue
Tracking.
The main issue in tracking and in leaving a device in discoverable mode is the way Bluetooth
actually works. Bluetooth is similar to other wireless networking schemas in that it works on aserver-client relationship. When the client, or victim device, is left in discoverable mode, it
constantly allows for the broadcast and receipt of broadcasted messages, which allow for it to be
seen in what seems like an endless sea of electromagnetic waves. When a message is received by
the attacking devices and from the victim device, the victim device provides its hardware address,
commonly referred to as its BD_ADDR, its internal clock, CLKN, and its frequency hop
Department of Electronics 17
8/3/2019 Blue Track
18/25
synchronization, FHS [3]. If an attacker has all three of these, they have the keys to the castle
wherein they are able to now break any sort of encryption put on the phone by hacking the
encryption based on the hardware address. It also does not have to listen and analyze the hop
sequence that the victim device uses to avoid interference, but already has it to use for listening in on
broadcasted or sent messages.
The BD_ADDR or hardware address of a device is most important, to allow for accessing or
cracking a device, even when a victim device is not in discoverable mode [7]. If an attacker, based
on previous observation or other means, knows that a device is within range, even if the device is not
in discoverable mode, the attacker can try to directly connect using the hardware address of the
device. If the device has an access or personal identification number (PIN) that is required to access
the information on the device, this can be found in a brute force attempt at hacking the code. Since
most people only use the common 4 digit combination for a personal identification number on
devices, this means that the brute force attack would take a maximum of 4^10 tries to discover a
personal identification number and this has been developed to be done in parallel between a number
of Bluetooth devices [7].
A number of experiments have been done to prove most of the points given in this paper.
The first, done by the author of [4] was a discovery experiment using 3 Bluetooth devices arranged
in an overlapping triangular area to attempt to discover as many other devices in a crowded area as
possible. It was conducted over a 6 month period and was done within a university setting, one time
in a university building, and second at an exhibition stand for the CeBIT 2004 conference. This
situation could be compared to a similar situation in which an attacker goes to a conference with
malicious intent, rather than just an experimental detection. Within just the conference time period,
a total of seven days, 5294 devices were detected as people merely walked by with their phones or
other Bluetooth devices set on discoverable mode. The most frightening detail in the report on the
results is that approximately 70% of all the devices found in the conference experiment were
Vulnerable again SNARF attacks, SNARFing being the ability for the attacker to steal a victims
phone numbers, calendar information and transmitted packets as defined above.
Another disturbing fact within the [4] report was the sentence 1% of users chose their real
name as [the] device name. At that point profound threats arise, because BlueTrack traces can be
linked to natural persons. This furthers the main point of this section, being the idea that if these
Department of Electronics 18
8/3/2019 Blue Track
19/25
people walking by the exhibition were being tracked, rather than just recorded, one could associate
their phones with times and, given enough sensors or calculations, successfully track the persons
movements, having their device identity and real name to use for this purpose.
A second experiment, as done by the author of [3] used the open connection ability of
Bluetooth devices and a number Bluetooth nodes placed in an office building to triangulate positions
of employees within the office building, down to the area of a specific office. Though the author
comments that Bluetooth might be a viable technology for triangulations, but not for calculating or
measuring accurate distance, the experiment shows the true danger of leaving a Bluetooth device in
discoverable mode, being the idea that within a given range, i.e. a 10 meter radius in the case of a
class 2 Bluetooth device, a person can be located, and when more than on sensor is used, for
example 3 with over lapping radiuses of 3 meters each, a person can be even more accurately
tracked.
Though the concept may be different, this was similar to what a set of students did in a
number of Dutch train stations, specifically the Amsterdam Amstel, Utrecht Central Station, and
Amsterdam Central Station. The students in [5] set up a number of Bluetooth laptops within the
train station, and eventually boarded the train to continue their journey and study, alike, onto
Utrecht. While still in the station they began scanning for open Bluetooth devices. Their results
were quite telling of the vulnerabilities and very real abilities for Bluetooth devices to be tracked.
Over the course of their observations, within two hours and twenty minutes, on the train and in the
station, they were able to pick up a total oh 1877 devices within the vicinity of the laptops. A
frightening detail of only 1712 of these were unique was also presented in the paper, thus showing
the audience that 165 devices could have their hardware addresses recorded and eventually tracked.
With further studies into this, 44 of those devices were actually tracked between Amsterdam Amstel
and Amsterdam Central Station, proving that without much effort, and without a real desire to do so,
the hardware addresses could be tracked only based on how long and where they were picked up and
eventually went out of range.
In addition to the observations as to passengers that the authors made, they also discovered
that all members of the Dutch railways staff have their phones set to constant discovery mode [5].
Though the authors may not have been able to use this and this author cant use it any time soon, it
can be pointed out that fare dodgers as they called them, could very easily go between one train
Department of Electronics 19
8/3/2019 Blue Track
20/25
station and another, using a similar Bluetooth device as what they were, and track the movements of
train conductors. This would allow them to roughly time when the conductor would come by to
check for tickets and allow them to hide so that a ticket would not be needed.
This brings up an additional point that could be considered the worst case scenario of this
section. Currently there are viruses and worms that are available for mobile devices, such as laptops,
personal digital assistants and cell phones alike [2]. Dutch railway staff having their cell phones in
discoverable mode at all times could possibly allow for the transmission of either of these malicious
programs to be transferred the to the cell phone without the owners knowledge and, with the right
coding, allow for it to be spread to any device that it was able to successfully contact over its
Bluetooth link. Assuming that the conductors at some point all come within contact range of each
other and then must check the tickets of each and every passenger on the train, this would mean that
1877 devices could be infected with the virus or worm all within 2 hours and twenty minutes. This
could feed a potential hacker, who decides to walk down the train on an innocent walk, every
persons address books, calendars, or without even coming in contact with any of the users, could
cause a denial of service. Another worst case scenario would be newer handsets which include GPS
tracking devices, could have information sent to the hacker over mobile internet, thus tracking the
user so long as they have their GPS enabled phone and no knowledge of the mobile virus.
Tracking so far has been seen in a negative light, but there are positive uses for it. One of
which has been implemented at Aalborg Zoo in Denmark, where parents can be issued Bluetooth
tracking devices for children as they browse the zoo. Bluetooth sensor nodes are placed at different
point within the zoo and allow for text messages to be sent to the parents phones when they fear
they have lost their child. A message is sent to the phone based on a triangulated position from a
number of nodes [3].
Department of Electronics 20
8/3/2019 Blue Track
21/25
CHAPTER 9
HOW TO GET OUT OF RISK?????
The question most will ask when reading this section is What can be done to protect the
average person from BlueTracking? Thankfully a number of steps are already being taken by many
device manufacturers, specifically phone manufactures, to prevent attackers from being able to track
and steal data from users. The first is that most phones, such as the Motorola Razr v3xx, now come
with a default setting of being non-discoverable, and only being discoverable when the user
specifically tells the phone to be. In addition to this safety feature, the phone has one more in which
it only allows itself to be discoverable for 3 minutes, and also requests that the user explicitly
acknowledge the connection of any unknown device with a pin pairing technique.
As safe as a pin pairing technique sounds, additional experiments have been done in crowded
malls in which the author of [1] did an experiment to see how many devices he could connect to
based on the error of users. The author sat in a mall with a device scanning open Bluetooth
connections and attempted to connect every time he found one. The catch was that the devices
name that he was using was pin1234, a name that users took to be literal and entered the pin of
1234.
Furthermore, the pin pairing technique and the algorithm to synchronize the two pins has
been found to be flawed in the ways of a brute force attack on a four digit pin number would take
just over 1 million tries, a feat that the average computer with a Bluetooth adapter could easily
accomplish in a relatively short period of time. The author of [7] discusses the idea of Bluetooth
having the problem of the pairing algorithm, and the idea that it will be the same code entered on
both ends of the connection, creating a symmetrical link. In contrast, to defeat this vulnerability, as
Wong puts it, could be relatively easily resolved by recourse to asymmetrical key establishment
techniques at the cost of slightly increased computation. The algorithm could be developed in asimilar way to the authentication of WEP, in that the receiving device could send a response to a
challenge sent by the sending device.
Department of Electronics 21
8/3/2019 Blue Track
22/25
CHAPTER 10
REQUIREMENTS
System Requirements
For a Windows-based PC:-
A PC that meets the requirements for and has installed the Windows Vista or
Windows XP operating system
100 MB of available hard drive space
CD-ROM drive
An available USB port
Internet access for certain features
For a Macintosh:
Mac OS X 10.2x10.5x
30 MB of available hard drive space
CD-ROM drive
An available USB port
Internet access for certain features
According to the following figs.
The size of the actual
mouse in height=4.58mm & in breadth=3.18mm
Department of Electronics 22
8/3/2019 Blue Track
23/25
There is an USB device to act it as the wireless mouse it s size in height=1.84 mm & in
breadth=0.62 mm
PowerRequirements
Battery Type and Quantity -
1 A2 alkaline battery (included)
Battery Life -
8 months typical
Department of Electronics 23
8/3/2019 Blue Track
24/25
CONCLUSION
Microsoft Blue Track Technology the worlds most advanced tracking technology
that allows consumers to take their mouse anywhere and work with confidence on
virtually any surface.
Microsofts proprietary tracking technology combines the width and power of optical
technology with the precision of laser tracking to allow consumers to mouse on virtually
any surface, from a granite kitchen countertop to the living room carpet.
The Wireless Mouse 5000 offers full-sized comfort in either hand with an comfortable design
and rubber side grips. The mouse also features 2.4GHz wireless technology and a snap-in
mini transceiver for a reliable wireless connection from up to 30 feet away.
Conclusion
BlueTrack Technology does not work on clear glass but works on mirrored surfaces.
Compared with leading laser and optical mice commercially available in fall 2008.
Some advanced features require software installation.
Actual retail price may vary.
Use it on your carpet, hardwood floor, granite kitchen counter, microfiber couch and
beach mat. Get creative!
Department of Electronics 24
8/3/2019 Blue Track
25/25
REFERENCE
1. www.wikipedia.org
2. www.ask.com
3. www.scribd.com
http://www.wikipedia.org/http://www.ask.com/http://www.wikipedia.org/http://www.ask.com/