+ All Categories
Home > Documents > Blue Track

Blue Track

Date post: 06-Apr-2018
Category:
Upload: reshmajose
View: 218 times
Download: 0 times
Share this document with a friend

of 25

Transcript
  • 8/3/2019 Blue Track

    1/25

    Microsofts

    BLUETRACK TECHNOLOGY

    SEMINAR REPORT

    Submitted in fulfilment of the requirements for the award of the Degree of Bachelor of

    Science in

    Electronics with computer hardware

    Of the M.G University

    By

    NITHIN THOMAS

    DEPARTMENT OF ELECTRONICS

    COLLEGE OF APPLIED SCIENCE, KATTAPANA

    2012

    Department of Electronics 1

  • 8/3/2019 Blue Track

    2/25

    DEPARTMENT OF ELECTRONICS

    COLLEGE OF APPLIED SCIENCE, KATTAPANA

    2012

    CERTIFICATE

    This is to certify that the seminar report entitled MICROSOFT BLUE TRACK

    TECHNOLOGYbeing submitted by NITHIN THOMAS in partial fulfillment of the requirements

    for the award of the Degree of Bachelor of Science in Electronics with Computer Hardware of theMahatma Gandhi University is a bonafide record of the work by her under our guidance and

    supervision and that this work has not been submitted for the award of any degree.

    Guided by

    Mr. Reji V.R Mrs. Sheeja K S

    Lecturer in Electronics Principal

    College of Applied Science College of Applied Science

    Kattapana Kattapana

    Department of Electronics 2

  • 8/3/2019 Blue Track

    3/25

    Acknowledgement

    I express outmost gratitude to my guide Mr. Reji V R, for his constant guidance, innovativethinking and meticulous help during the course of my seminar work. And also to Ms. Nimisha

    George and Ms. Mallu Liss Abraham who have extended all their help in presenting this seminar.

    I take immense pleasure in expressing my sincere gratitude to Smt. Sheeja ,principal

    College of Applied Science, Kattapana, for providing me the necessary facilities to carry out this

    work.

    Im also thankful to all the teachers of Electronics department who supported me throughoutthese days to present out my seminar. I also thank my parents and friends for their help and

    encouragement.

    Last but not least I thank God, the almighty for all the blessings bestowed upon me without

    which the seminar would not have been a reality.

    NITHIN THOMAS

    Department of Electronics 3

  • 8/3/2019 Blue Track

    4/25

    CONTENTS

    CHAPTER 1 INTRODUCTION

    CHAPTER 2 MICROSOFT HARDWARE: HISTORY OF

    LEADERSHIP

    2.1 UNDER THE HOOD

    CHAPTER 3 TYPES OF DEVICES ENABLED WITH BLUETRACK

    TECHNOLOGY

    3.1 EXPLORER MOUSE AND EXPLORER MINI MOUSE

    3.2 AVAILABILITY

    CHAPTER 4 ABOUT MICROSOFT HARDWARE AND MICROSOFT

    4.1 MICROSOFT HARDWARE

    4.2 ABOUT MICROSOFT

    CHAPTER 5 BLUETRACK CHIPSETS AND ITS TYPES

    5.1 CLASS 1 CHIPSETS

    5.2 CLASS 2 CHIPSETS

    5.3 CLASS 3 CHIPSETS

    CHAPTER 6 BLUE TRACK TECHNOLOGY MOUSE BY

    MICROSOFT AND ITS VARITIES

    CHAPTER 7 CIRCUIT DIAGRAMS

    CHAPTER 8 ADVANTAGES AND DISADVANTAGES

    CHAPTER 9 HOW TO GET OUT OF RISK?????

    CHAPTER 10 REQUIREMENTS

    CONCLUSION

    Department of Electronics 4

  • 8/3/2019 Blue Track

    5/25

    REFERENCE

    CHAPTER 1

    INTRODUCTION

    The worlds most advanced tracking technology, Microsoft Blue Track Technology,

    which allows consumers to take their mice anywhere and work with confidence on more surfaces

    than before. Microsofts new proprietary tracking technology combines the width and power of

    optical technology with the precision of laser tracking to allow consumers to mouse on virtually any

    surface1 from a granite kitchen countertop to the living room carpet.

    BlueTrack Technology will debut in two new top-of-the-line mice, Microsoft Explorer

    Mouse and Microsoft Explorer Mini Mouse, available this fall at BestBuy.com and in Best Buy

    stores. According to Microsoft, in a Blue Track technology mouse, the sensor, the light and the

    component configuration are optimized for the best possible surface image for a variety of

    conditions. BlueTrack Technology provides the mouse ASIC and the computerwith exceptionally

    accurate and detailed information for advanced tracking on almost any surface.

    A BlueTrack technology mouse uses a Microsoft-designed complementary metal-oxide-

    semiconductor (CMOS) chip with advanced algorithms and pixel architecture for more precisetracking. It is Microsoft's fourth-generation application-specific integrated circuit (ASIC) using

    CMOS technology.

    Department of Electronics 5

    http://www.webopedia.com/TERM/M/mouse.htmlhttp://www.webopedia.com/TERM/A/ASIC.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/S/semiconductor.htmlhttp://www.webopedia.com/TERM/C/CMOS.htmlhttp://www.webopedia.com/TERM/A/ASIC.htmlhttp://www.mousearena.com/wp-content/uploads/2011/08/Blue-Track-Technology-Mouse-by-Microsoft.jpghttp://www.webopedia.com/TERM/M/mouse.htmlhttp://www.webopedia.com/TERM/A/ASIC.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/S/semiconductor.htmlhttp://www.webopedia.com/TERM/C/CMOS.htmlhttp://www.webopedia.com/TERM/A/ASIC.html
  • 8/3/2019 Blue Track

    6/25

    Microsoft new technology called Blue track technology has become quite popular among computer

    users. This technology enables laser mouse tracking on virtually any surface type, whether its wood,

    granite or even a carpet. Blue track technology is the big innovation by Microsoft. Due to invention

    of Blue track technology mouse, mobility of computer users from one place to another has become

    easier. In fact 72 percent of computer sold in the market are notebook computer and users require a

    mouse that can be mobile or it can go with them anywhere. Blue track technology has cover up the

    areas where optical and laser technologies mouse were falling short. Microsoft blue track technology

    mouse outperforms laser and optical mouse.

    These mice are quite popular for their tracking accuracy, stylish design and mesmerizing blue glow.

    These features of Microsoft blue track technology mouse make it a good choice for avid gamers.

    Mice with blue track technology are perfect choice for people who love to play games on computer.

    Blue track uses a large blue beam and specular optics architecture combined with an image sensor

    and pixel geometry designed by Microsoft to generate high contrast image of the surface that permits

    extraordinary tracking accuracy beneath the mouse. The light beam in Microsoft blue track

    technology mouse is more than four times larger than the average laser beam of laser mouse. This

    will help you to track accurately. Mentioned below are some of the blue track technology mice by

    Microsoft.

    Department of Electronics 6

  • 8/3/2019 Blue Track

    7/25

    CHAPTER 2

    MICROSOFT HARDWARE: HISTORY OF LEADERSHIP

    Microsoft Hardware has consistently raised the bar in mouse tracking technology

    throughout its 26-year history, including the launch of the worlds first optical mouse in 1999. The

    LED light and sensor allowed consumers to mouse on more surfaces with ease, eliminating the old

    ball mouse for good. In 2005, Microsoft introduced High Definition Laser Technology, which

    allowed mice to work on many surfaces that optical technology did not. But now Microsofts in-

    house engineers have taken mouse tracking to the next level, creating an exclusive, groundbreaking

    technology to advance the way consumers use their computer mice.

    Research shows that people arent sitting at a desk all day, but theyve gone

    mobile. In fact, 72 percent of PCs sold are notebook PCs, and consumers need a mouse that can go

    with them anywhere, said Mark DePue, platforms engineering manager at Microsoft and co-

    inventor of Blue Track Technology. Blue Track Technology excels in areas where optical and laser

    technologies were falling short. Laser mice, for example, have a difficult time working on some

    common home surfaces, including granite and marble.

    According to David Bohn, senior engineering architect at Microsoft and BluE

    Track Technology co-inventor, Laser technology is also sensitive to dust and dirt accumulation

    during travel, which can lead to poor tracking performance. With Blue Track Technology you can

    rest easier about where your mouse will or wont track it works just about everywhere, just like

    you.

    2.1 Under the Hood

    Microsofts Blue Track Technology works on more surfaces than both optical and

    laser mice. The large, blue beam and specular optics architecture, in conjunction with a Microsoft-designed image sensor and proprietary pixel geometry, generates a high-contrast picture of the

    mousing surface that allows exceptional tracking accuracy. The Blue Track Technology light beam

    emanating from the bottom of the mouse is more than four times as large as the average laser beam

    used in todays mice, enabling reliable mouse tracking even on difficult surfaces such as carpet.

    Department of Electronics 7

  • 8/3/2019 Blue Track

    8/25

    This advanced technology creates a superior, more precise picture of the surface,

    allowing consumers to use their mouse virtually anywhere. To see a video on the making of Blue

    Track Technology and meet the inventors, consumers can visit

    http://www.microsoft.com/hardware/bluetrack.

    Department of Electronics 8

    http://www.microsoft.com/hardware/bluetrackhttp://www.microsoft.com/hardware/bluetrack
  • 8/3/2019 Blue Track

    9/25

  • 8/3/2019 Blue Track

    10/25

    CHAPTER 4

    ABOUT MICROSOFT HARDWARE AND MICROSOFT

    4.1 MICROSOFT HARDWARE

    For more than 25 years, the Hardware Group has employed innovative engineering, cutting-edge

    industrial design and extensive usability testing to create products of exceptional quality and

    durability that enhance the software experience and strengthen the connection between consumers

    and their PC. Microsoft Hardware leads the industry in ergonomic engineering, industrial design and

    hardware/software compatibility, offering consumers an easier, more convenient and more enjoyable

    computing experience. Microsoft IntelliMouse Explorer, which launched in 1999, earned a place on

    PCWorld.coms December 2005 list of The 50 Greatest Gadgets of the Past 50 Years as the first

    mainstream optical mouse that brought gunk-free pointing devices to a broad consumer base.

    More information about the Hardware Group is available at http://www.mshardwareguide.com.

    4.2 ABOUT MICROSOFT

    Founded in 1975, Microsoft (Nasdaq MSFT) is the worldwide leader in software, services and

    solutions that help people and businesses realize their full potential.

    1

    BlueTrack Technology does not work on clear glass or mirrored surfaces.2 The NPD Group Inc., based on U.S. retail unit sales from June 2007 to June 2008.

    3 Actual retail prices may vary

    A proprietary tracking technology from Microsoft that lets you use a mouse on virtually any

    surface, excluding clear glass and mirrored surfaces.

    According to Microsoft, in a Blue Track technology mouse, the sensor, the light and the component

    configuration are optimized for the best possible surface image for a variety of conditions.

    BlueTrack Technology provides the mouse ASIC and the computerwith exceptionally accurate and

    detailed information for advanced tracking on almost any surface.

    A BlueTrack technology mouse uses a Microsoft-designed complementary metal-oxide-

    semiconductor (CMOS) chip with advanced algorithms and pixel architecture for more precise

    Department of Electronics 10

    http://www.mshardwareguide.com/http://www.webopedia.com/TERM/P/proprietary.htmlhttp://www.webopedia.com/TERM/T/technology.htmlhttp://www.webopedia.com/TERM/M/Microsoft.htmlhttp://www.webopedia.com/TERM/M/mouse.htmlhttp://www.webopedia.com/TERM/A/ASIC.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/S/semiconductor.htmlhttp://www.webopedia.com/TERM/C/CMOS.htmlhttp://www.mshardwareguide.com/http://www.webopedia.com/TERM/P/proprietary.htmlhttp://www.webopedia.com/TERM/T/technology.htmlhttp://www.webopedia.com/TERM/M/Microsoft.htmlhttp://www.webopedia.com/TERM/M/mouse.htmlhttp://www.webopedia.com/TERM/A/ASIC.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/S/semiconductor.htmlhttp://www.webopedia.com/TERM/C/CMOS.html
  • 8/3/2019 Blue Track

    11/25

    tracking. It is Microsoft's fourth-generation application-specific integrated circuit (ASIC) using

    CMOS technology.

    Proprietary high-angle imaging optics generate more exact surface images - even of shiny surfaces

    such as granite and marble - instead of blurry, out-of-focus images, as can be produced by many of

    the leading laser mice. And blue light helps create high-resolution, high-contrast images for better

    navigation. The wider beam enables illumination of a larger surface area and allows more light to

    return to the sensor. This helps for tracking on irregular surfaces such as carpet, where a smaller

    beam could get lost between the individual fibers.

    BlueTrack Technology debuted on two Microsoft products in November 2008: the Explorer Mouse

    and the Explorer Mini Mouse.

    Department of Electronics 11

    http://www.webopedia.com/TERM/A/ASIC.htmlhttp://www.risedream.com/blog/wp-content/uploads/2010/09/Microsoft-Metro-mouse.jpghttp://www.webopedia.com/TERM/A/ASIC.html
  • 8/3/2019 Blue Track

    12/25

    CHAPTER 5

    BLUETRACK CHIPSETS AND ITS TYPES

    Tracking and location detection through Bluetooth is one of the foremost concerns for any

    user with a Bluetooth handset, and is able to give personal information about travel, personal

    whereabouts, habits and can even lead to other types of attacks including information interception

    and business attacks. The act of an attacker using a Bluetooth device to connect and track another

    Bluetooth device is called BlueTracking.

    The Blue Tracking attack is mostly used for espionage and can be used for blackmail but is

    less effective than a number of other Bluetooth attacks, mostly because of the Bluetooth chipset that

    is used in most phones and devices. Bluetooth chips come in three classes or types which mainly

    determine the range at which they are effective.

    5.1 CLASS 1 CHIPSETS

    Class 1, used in many Bluetooth dongles to be used on personal computers, have a range of

    about 100 meters. Because of the small form factor and portability of these types of devices,

    experiments have been done and successfully have extended the range of these devices up to 1

    kilometer with special equipment, the author of [2] confirmed that he could extend the range up to

    230 meters with an average 5 dbi antenna, and up to 500 meters with a 14dbi antenna, both being

    soldered to the antenna contacts. This means that it would be used as the primary attack media for

    such a Blue Tracking attack, mainly because it has the largest area it is able to cover. Because

    Bluetooth was meant to be a relatively close distance wireless technology, the attacker, even with a

    class 1 Bluetooth device, would have to be relatively close, but this topic will be covered later in this

    section.

    5.2 CLASS 2 CHIPSETS

    Class 2 chipsets are the chipsets that are used in most mobile phones and smaller devices,

    giving the user a range for communication of approximately 10 meters [2]. Using these devices in a

    BlueTracking attack implies that the attacker would have to be within a relatively close range to the

    Department of Electronics 12

  • 8/3/2019 Blue Track

    13/25

    victim, giving the attacker a larger likelihood of being seen or discovered. No attempts at extending

    the range of class two devices could be found in the given sources or within research.

    5.3 CLASS 3 CHIPSETS

    Class 3 chipsets follow in suit from the class 1 and class 2 chipsets, and are said to have the

    best range when used well within 10 m [3]. The same authors later estimate the best range for

    class 3 devices to be up to 3 meters, giving them the least likelihood to be victims of attack due to

    the attacker having to be right on the victims heals or only to detect them while the victim were

    walking by at a close distance. The types of devices that utilize the class 3 chipsets are mainly

    Bluetooth earpieces for wireless communication between the ear piece and phone.

    Department of Electronics 13

  • 8/3/2019 Blue Track

    14/25

    CHAPTER 6

    BLUE TRACK TECHNOLOGY MOUSE BY MICROSOFT AND ITS

    VARITIES

    1. Wireless Mobile mouse 4000 Studio Series: You can use this sporty mouse anywhere in your house. This

    mouse can be used on carpet, wood, or on your bed. This wireless mouse can be controlled from a distance of

    300 feet away form the computer. This mouse can be used up to 10 months without having to change

    batteries. This mouse includes battery indicator which will tell you when battery power of your mouse is low.

    2. Wireless Mobile Mouse 3500 Limited edition: This stylish designed mouse can be used anywhere in your

    house. You can use it even on a rough park bench or carpet or nay other thing. This mouse can be used up to 8months without having to change batteries. This mouse includes battery indicator which indicates when the

    battery power of your mouse is low

    3. Explorer touch mouse Limited edition: This mouse has strip on its top that acts as a scroll wheel. This

    stylish mouse includes five programmable buttons. This mouse has 100 MB internal storage and can be used

    up to 18 months without having to change batteries.

    If you wish to have mouse with excellent quality and blue track technology then you can definitely go forabove mentioned mouse. Along with these, there are many other blue track technology mice by Microsoft

    such as Microsoft comfort mouse 4500, wireless mobile mouse 3500, Wireless Mobile mouse 4000 studio

    series and many more. You can choose any of the blue track technology mouse that suits both your

    expectation and budget. Blue track technology mouse will provide you great control and accuracy.

    Department of Electronics 14

  • 8/3/2019 Blue Track

    15/25

    CHAPTER 7

    CIRCUIT DIAGRAMS

    Department of Electronics 15

  • 8/3/2019 Blue Track

    16/25

    Department of Electronics 16

  • 8/3/2019 Blue Track

    17/25

    CHAPTER 8

    ADVANTAGES AND DISADVANTAGES

    For any type of attack, using any class of Bluetooth chipset, the most common vulnerability

    and allowance for attackers to exploit the device is when the victim device is left in a discoverable

    mode. The first problem with leaving a device in discoverable mode is the fact that if a phone or

    similar device can be found, some of its basic Bluetooth abilities are not guarded and do not require

    that the user acknowledge them to be used. For example, the address book, calendar information

    and business card info are all stored in the phones memory as files, all with similar naming schemes

    among all phones . If an attacker gets within range for even a minute, the amount of time that it

    takes a person to check out in the grocery store or stand in line to get a ticket or board a train, theattacker can get their address book or calendar, two pieces of a personal nature which may not seem

    like an overly bad thing for others to see, but two files that can help the attacker plan further attacks

    or blackmail the owner of the victim device. A set of phone numbers for personal contacts can very

    easily contain information for relatives, coworkers and supervisors, all of which could be compared

    with the calendar.

    Overall, this vulnerability has been mostly corrected with newer phones, newer firmware for the

    phones, and an overall education being passed onto the consumer about how to change or fix thisproblem. At the same time, many people who get used a single phone or Bluetooth device and do

    not have the technical knowledge of how to switch it between discoverable Bluetooth mode and non-

    discoverable Bluetooth mode, do not want to switch to a newer phone or have the knowledge to

    upgrade the firmware. This seems to be one of the most vulnerable and dangerous parts of Blue

    Tracking.

    The main issue in tracking and in leaving a device in discoverable mode is the way Bluetooth

    actually works. Bluetooth is similar to other wireless networking schemas in that it works on aserver-client relationship. When the client, or victim device, is left in discoverable mode, it

    constantly allows for the broadcast and receipt of broadcasted messages, which allow for it to be

    seen in what seems like an endless sea of electromagnetic waves. When a message is received by

    the attacking devices and from the victim device, the victim device provides its hardware address,

    commonly referred to as its BD_ADDR, its internal clock, CLKN, and its frequency hop

    Department of Electronics 17

  • 8/3/2019 Blue Track

    18/25

    synchronization, FHS [3]. If an attacker has all three of these, they have the keys to the castle

    wherein they are able to now break any sort of encryption put on the phone by hacking the

    encryption based on the hardware address. It also does not have to listen and analyze the hop

    sequence that the victim device uses to avoid interference, but already has it to use for listening in on

    broadcasted or sent messages.

    The BD_ADDR or hardware address of a device is most important, to allow for accessing or

    cracking a device, even when a victim device is not in discoverable mode [7]. If an attacker, based

    on previous observation or other means, knows that a device is within range, even if the device is not

    in discoverable mode, the attacker can try to directly connect using the hardware address of the

    device. If the device has an access or personal identification number (PIN) that is required to access

    the information on the device, this can be found in a brute force attempt at hacking the code. Since

    most people only use the common 4 digit combination for a personal identification number on

    devices, this means that the brute force attack would take a maximum of 4^10 tries to discover a

    personal identification number and this has been developed to be done in parallel between a number

    of Bluetooth devices [7].

    A number of experiments have been done to prove most of the points given in this paper.

    The first, done by the author of [4] was a discovery experiment using 3 Bluetooth devices arranged

    in an overlapping triangular area to attempt to discover as many other devices in a crowded area as

    possible. It was conducted over a 6 month period and was done within a university setting, one time

    in a university building, and second at an exhibition stand for the CeBIT 2004 conference. This

    situation could be compared to a similar situation in which an attacker goes to a conference with

    malicious intent, rather than just an experimental detection. Within just the conference time period,

    a total of seven days, 5294 devices were detected as people merely walked by with their phones or

    other Bluetooth devices set on discoverable mode. The most frightening detail in the report on the

    results is that approximately 70% of all the devices found in the conference experiment were

    Vulnerable again SNARF attacks, SNARFing being the ability for the attacker to steal a victims

    phone numbers, calendar information and transmitted packets as defined above.

    Another disturbing fact within the [4] report was the sentence 1% of users chose their real

    name as [the] device name. At that point profound threats arise, because BlueTrack traces can be

    linked to natural persons. This furthers the main point of this section, being the idea that if these

    Department of Electronics 18

  • 8/3/2019 Blue Track

    19/25

    people walking by the exhibition were being tracked, rather than just recorded, one could associate

    their phones with times and, given enough sensors or calculations, successfully track the persons

    movements, having their device identity and real name to use for this purpose.

    A second experiment, as done by the author of [3] used the open connection ability of

    Bluetooth devices and a number Bluetooth nodes placed in an office building to triangulate positions

    of employees within the office building, down to the area of a specific office. Though the author

    comments that Bluetooth might be a viable technology for triangulations, but not for calculating or

    measuring accurate distance, the experiment shows the true danger of leaving a Bluetooth device in

    discoverable mode, being the idea that within a given range, i.e. a 10 meter radius in the case of a

    class 2 Bluetooth device, a person can be located, and when more than on sensor is used, for

    example 3 with over lapping radiuses of 3 meters each, a person can be even more accurately

    tracked.

    Though the concept may be different, this was similar to what a set of students did in a

    number of Dutch train stations, specifically the Amsterdam Amstel, Utrecht Central Station, and

    Amsterdam Central Station. The students in [5] set up a number of Bluetooth laptops within the

    train station, and eventually boarded the train to continue their journey and study, alike, onto

    Utrecht. While still in the station they began scanning for open Bluetooth devices. Their results

    were quite telling of the vulnerabilities and very real abilities for Bluetooth devices to be tracked.

    Over the course of their observations, within two hours and twenty minutes, on the train and in the

    station, they were able to pick up a total oh 1877 devices within the vicinity of the laptops. A

    frightening detail of only 1712 of these were unique was also presented in the paper, thus showing

    the audience that 165 devices could have their hardware addresses recorded and eventually tracked.

    With further studies into this, 44 of those devices were actually tracked between Amsterdam Amstel

    and Amsterdam Central Station, proving that without much effort, and without a real desire to do so,

    the hardware addresses could be tracked only based on how long and where they were picked up and

    eventually went out of range.

    In addition to the observations as to passengers that the authors made, they also discovered

    that all members of the Dutch railways staff have their phones set to constant discovery mode [5].

    Though the authors may not have been able to use this and this author cant use it any time soon, it

    can be pointed out that fare dodgers as they called them, could very easily go between one train

    Department of Electronics 19

  • 8/3/2019 Blue Track

    20/25

    station and another, using a similar Bluetooth device as what they were, and track the movements of

    train conductors. This would allow them to roughly time when the conductor would come by to

    check for tickets and allow them to hide so that a ticket would not be needed.

    This brings up an additional point that could be considered the worst case scenario of this

    section. Currently there are viruses and worms that are available for mobile devices, such as laptops,

    personal digital assistants and cell phones alike [2]. Dutch railway staff having their cell phones in

    discoverable mode at all times could possibly allow for the transmission of either of these malicious

    programs to be transferred the to the cell phone without the owners knowledge and, with the right

    coding, allow for it to be spread to any device that it was able to successfully contact over its

    Bluetooth link. Assuming that the conductors at some point all come within contact range of each

    other and then must check the tickets of each and every passenger on the train, this would mean that

    1877 devices could be infected with the virus or worm all within 2 hours and twenty minutes. This

    could feed a potential hacker, who decides to walk down the train on an innocent walk, every

    persons address books, calendars, or without even coming in contact with any of the users, could

    cause a denial of service. Another worst case scenario would be newer handsets which include GPS

    tracking devices, could have information sent to the hacker over mobile internet, thus tracking the

    user so long as they have their GPS enabled phone and no knowledge of the mobile virus.

    Tracking so far has been seen in a negative light, but there are positive uses for it. One of

    which has been implemented at Aalborg Zoo in Denmark, where parents can be issued Bluetooth

    tracking devices for children as they browse the zoo. Bluetooth sensor nodes are placed at different

    point within the zoo and allow for text messages to be sent to the parents phones when they fear

    they have lost their child. A message is sent to the phone based on a triangulated position from a

    number of nodes [3].

    Department of Electronics 20

  • 8/3/2019 Blue Track

    21/25

    CHAPTER 9

    HOW TO GET OUT OF RISK?????

    The question most will ask when reading this section is What can be done to protect the

    average person from BlueTracking? Thankfully a number of steps are already being taken by many

    device manufacturers, specifically phone manufactures, to prevent attackers from being able to track

    and steal data from users. The first is that most phones, such as the Motorola Razr v3xx, now come

    with a default setting of being non-discoverable, and only being discoverable when the user

    specifically tells the phone to be. In addition to this safety feature, the phone has one more in which

    it only allows itself to be discoverable for 3 minutes, and also requests that the user explicitly

    acknowledge the connection of any unknown device with a pin pairing technique.

    As safe as a pin pairing technique sounds, additional experiments have been done in crowded

    malls in which the author of [1] did an experiment to see how many devices he could connect to

    based on the error of users. The author sat in a mall with a device scanning open Bluetooth

    connections and attempted to connect every time he found one. The catch was that the devices

    name that he was using was pin1234, a name that users took to be literal and entered the pin of

    1234.

    Furthermore, the pin pairing technique and the algorithm to synchronize the two pins has

    been found to be flawed in the ways of a brute force attack on a four digit pin number would take

    just over 1 million tries, a feat that the average computer with a Bluetooth adapter could easily

    accomplish in a relatively short period of time. The author of [7] discusses the idea of Bluetooth

    having the problem of the pairing algorithm, and the idea that it will be the same code entered on

    both ends of the connection, creating a symmetrical link. In contrast, to defeat this vulnerability, as

    Wong puts it, could be relatively easily resolved by recourse to asymmetrical key establishment

    techniques at the cost of slightly increased computation. The algorithm could be developed in asimilar way to the authentication of WEP, in that the receiving device could send a response to a

    challenge sent by the sending device.

    Department of Electronics 21

  • 8/3/2019 Blue Track

    22/25

    CHAPTER 10

    REQUIREMENTS

    System Requirements

    For a Windows-based PC:-

    A PC that meets the requirements for and has installed the Windows Vista or

    Windows XP operating system

    100 MB of available hard drive space

    CD-ROM drive

    An available USB port

    Internet access for certain features

    For a Macintosh:

    Mac OS X 10.2x10.5x

    30 MB of available hard drive space

    CD-ROM drive

    An available USB port

    Internet access for certain features

    According to the following figs.

    The size of the actual

    mouse in height=4.58mm & in breadth=3.18mm

    Department of Electronics 22

  • 8/3/2019 Blue Track

    23/25

    There is an USB device to act it as the wireless mouse it s size in height=1.84 mm & in

    breadth=0.62 mm

    PowerRequirements

    Battery Type and Quantity -

    1 A2 alkaline battery (included)

    Battery Life -

    8 months typical

    Department of Electronics 23

  • 8/3/2019 Blue Track

    24/25

    CONCLUSION

    Microsoft Blue Track Technology the worlds most advanced tracking technology

    that allows consumers to take their mouse anywhere and work with confidence on

    virtually any surface.

    Microsofts proprietary tracking technology combines the width and power of optical

    technology with the precision of laser tracking to allow consumers to mouse on virtually

    any surface, from a granite kitchen countertop to the living room carpet.

    The Wireless Mouse 5000 offers full-sized comfort in either hand with an comfortable design

    and rubber side grips. The mouse also features 2.4GHz wireless technology and a snap-in

    mini transceiver for a reliable wireless connection from up to 30 feet away.

    Conclusion

    BlueTrack Technology does not work on clear glass but works on mirrored surfaces.

    Compared with leading laser and optical mice commercially available in fall 2008.

    Some advanced features require software installation.

    Actual retail price may vary.

    Use it on your carpet, hardwood floor, granite kitchen counter, microfiber couch and

    beach mat. Get creative!

    Department of Electronics 24

  • 8/3/2019 Blue Track

    25/25

    REFERENCE

    1. www.wikipedia.org

    2. www.ask.com

    3. www.scribd.com

    http://www.wikipedia.org/http://www.ask.com/http://www.wikipedia.org/http://www.ask.com/

Recommended