Sei sulla pagina 1di 25

Microsofts BLUETRACK TECHNOLOGY

SEMINAR REPORT

Submitted in fulfilment of the requirements for the award of the Degree of Bachelor of Science in

Electronics with computer hardware


Of the M.G University By

NITHIN THOMAS

DEPARTMENT OF ELECTRONICS

COLLEGE OF APPLIED SCIENCE, KATTAPANA

2012

Department of Electronics

DEPARTMENT OF ELECTRONICS

COLLEGE OF APPLIED SCIENCE, KATTAPANA

2012

CERTIFICATE
This is to certify that the seminar report entitled MICROSOFT BLUE TRACK TECHNOLOGY being submitted by NITHIN THOMAS in partial fulfillment of the requirements for the award of the Degree of Bachelor of Science in Electronics with Computer Hardware of the Mahatma Gandhi University is a bonafide record of the work by her under our guidance and supervision and that this work has not been submitted for the award of any degree. Guided by

Mr. Reji V.R Lecturer in Electronics College of Applied Science Kattapana

Mrs. Sheeja K S Principal College of Applied Science Kattapana

Department of Electronics

Acknowledgement
I express outmost gratitude to my guide Mr. Reji V R, for his constant guidance, innovative thinking and meticulous help during the course of my seminar work. And also to Ms. Nimisha George and Ms. Mallu Liss Abraham who have extended all their help in presenting this seminar. I take immense pleasure in expressing my sincere gratitude to Smt. Sheeja , principal College of Applied Science, Kattapana, for providing me the necessary facilities to carry out this work. Im also thankful to all the teachers of Electronics department who supported me throughout these days to present out my seminar. I also thank my parents and friends for their help and encouragement. Last but not least I thank God, the almighty for all the blessings bestowed upon me without which the seminar would not have been a reality.

NITHIN THOMAS

Department of Electronics

CONTENTS
CHAPTER 1 CHAPTER 2 INTRODUCTION MICROSOFT LEADERSHIP 2.1 UNDER THE HOOD CHAPTER 3 TYPES OF DEVICES ENABLED WITH TECHNOLOGY 3.1 EXPLORER MOUSE AND EXPLORER MINI MOUSE 3.2 AVAILABILITY CHAPTER 4 ABOUT MICROSOFT HARDWARE AND MICROSOFT 4.1 MICROSOFT HARDWARE 4.2 ABOUT MICROSOFT CHAPTER 5 BLUETRACK CHIPSETS AND ITS TYPES 5.1 CLASS 1 CHIPSETS 5.2 CLASS 2 CHIPSETS 5.3 CLASS 3 CHIPSETS CHAPTER 6 BLUE TRACK TECHNOLOGY MOUSE BY MICROSOFT AND ITS VARITIES CHAPTER 7 CHAPTER 8 CHAPTER 9 CHAPTER 10 CONCLUSION
Department of Electronics 4

HARDWARE:

HISTORY

OF

BLUETRACK

CIRCUIT DIAGRAMS ADVANTAGES AND DISADVANTAGES HOW TO GET OUT OF RISK????? REQUIREMENTS

REFERENCE

CHAPTER 1 INTRODUCTION
The worlds most advanced tracking technology, Microsoft Blue Track Technology, which allows consumers to take their mice anywhere and work with confidence on more surfaces than before. Microsofts new proprietary tracking technology combines the width and power of optical technology with the precision of laser tracking to allow consumers to mouse on virtually any surface1 from a granite kitchen countertop to the living room carpet. BlueTrack Technology will debut in two new top-of-the-line mice, Microsoft Explorer Mouse and Microsoft Explorer Mini Mouse, available this fall at BestBuy.com and in Best Buy stores. According to Microsoft, in a Blue Track technology mouse, the sensor, the light and the component configuration are optimized for the best possible surface image for a variety of conditions. BlueTrack Technology provides the mouse ASIC and the computer with exceptionally accurate and detailed information for advanced tracking on almost any surface. A BlueTrack technology mouse uses a Microsoft-designed complementary metal-oxidesemiconductor (CMOS) chip with advanced algorithms and pixel architecture for more precise tracking. It is Microsoft's fourth-generation application-specific integrated circuit (ASIC) using CMOS technology.

Department of Electronics

Microsoft new technology called Blue track technology has become quite popular among computer users. This technology enables laser mouse tracking on virtually any surface type, whether its wood, granite or even a carpet. Blue track technology is the big innovation by Microsoft. Due to invention of Blue track technology mouse, mobility of computer users from one place to another has become easier. In fact 72 percent of computer sold in the market are notebook computer and users require a mouse that can be mobile or it can go with them anywhere. Blue track technology has cover up the areas where optical and laser technologies mouse were falling short. Microsoft blue track technology mouse outperforms laser and optical mouse.

These mice are quite popular for their tracking accuracy, stylish design and mesmerizing blue glow. These features of Microsoft blue track technology mouse make it a good choice for avid gamers. Mice with blue track technology are perfect choice for people who love to play games on computer. Blue track uses a large blue beam and specular optics architecture combined with an image sensor and pixel geometry designed by Microsoft to generate high contrast image of the surface that permits extraordinary tracking accuracy beneath the mouse. The light beam in Microsoft blue track technology mouse is more than four times larger than the average laser beam of laser mouse. This will help you to track accurately. Mentioned below are some of the blue track technology mice by Microsoft.

Department of Electronics

CHAPTER 2 MICROSOFT HARDWARE: HISTORY OF LEADERSHIP

Microsoft Hardware has consistently raised the bar in mouse tracking technology throughout its 26-year history, including the launch of the worlds first optical mouse in 1999. The LED light and sensor allowed consumers to mouse on more surfaces with ease, eliminating the old ball mouse for good. In 2005, Microsoft introduced High Definition Laser Technology, which allowed mice to work on many surfaces that optical technology did not. But now Microsofts inhouse engineers have taken mouse tracking to the next level, creating an exclusive, groundbreaking technology to advance the way consumers use their computer mice. Research shows that people arent sitting at a desk all day, but theyve gone mobile. In fact, 72 percent of PCs sold are notebook PCs, and consumers need a mouse that can go with them anywhere, said Mark DePue, platforms engineering manager at Microsoft and coinventor of Blue Track Technology. Blue Track Technology excels in areas where optical and laser technologies were falling short. Laser mice, for example, have a difficult time working on some common home surfaces, including granite and marble. According to David Bohn, senior engineering architect at Microsoft and BluE Track Technology co-inventor, Laser technology is also sensitive to dust and dirt accumulation during travel, which can lead to poor tracking performance. With Blue Track Technology you can rest easier about where your mouse will or wont track it works just about everywhere, just like you.

2.1 Under the Hood


Microsofts Blue Track Technology works on more surfaces than both optical and laser mice. The large, blue beam and specular optics architecture, in conjunction with a Microsoftdesigned image sensor and proprietary pixel geometry, generates a high-contrast picture of the mousing surface that allows exceptional tracking accuracy. The Blue Track Technology light beam emanating from the bottom of the mouse is more than four times as large as the average laser beam used in todays mice, enabling reliable mouse tracking even on difficult surfaces such as carpet.

Department of Electronics

This advanced technology creates a superior, more precise picture of the surface, allowing consumers to use their mouse virtually anywhere. To see a video on the making of Blue Track Technology and meet the inventors, consumers can visit http://www.microsoft.com/hardware/bluetrack.

Department of Electronics

CHAPTER 3 TYPES OF DEVICES ENABLED WITH BLUETRACK TECHNOLOGY


3.1 EXPLORER MOUSE AND EXPLORER MINI MOUSE
Blue Track Technology will debut in two new high-end Microsoft mouse products this fall the full-size Explorer Mouse and the smaller Explorer Mini Mouse. These mice pair revolutionary tracking technology with a sophisticated design that brings the mice to life. A chrome trim and blue lighting around the bottom rim of the mouse create a soft glow and set the device apart from anything else on the market. A right-handed, ergonomist-approved design offers hours of comfortable use, and 2.4GHz wireless technology delivers a reliable connection up to 30 feet away. The snap-in mini-transceiver offers easy storage and mobility, allowing consumers to take their fullsize mouse with them wherever they need it. The full-size Explorer Mouse features easy recharging with a battery status indicator and a small charging base, while the Explorer Mini Mouse uses two AA batteries.

3.2 AVAILABILITY The Explorer Mouse with BlueTrack Technology and the Explorer Mini Mouse with BlueTrack Technology will be available at BestBuy.com and Best Buy stores in November for the estimated retail price of $99.95 and $79.95 (U.S.), respectively.3 At Best Buy we offer our customers the latest and greatest in consumer technology, said Steve Guild, senior merchant, computing peripherals at Best Buy. We are excited to enter into our relationship with Microsoft BlueTrack Technology, as the products truly map to where our customers are using their computers everywhere. Both mice will be backed by a worldwide three-year limited hardware warranty from Microsoft. More information about these and other Microsoft Hardware products can be found at http://www.microsoft.com/hardware.

Department of Electronics

CHAPTER 4 ABOUT MICROSOFT HARDWARE AND MICROSOFT


4.1 MICROSOFT HARDWARE
For more than 25 years, the Hardware Group has employed innovative engineering, cutting-edge industrial design and extensive usability testing to create products of exceptional quality and durability that enhance the software experience and strengthen the connection between consumers and their PC. Microsoft Hardware leads the industry in ergonomic engineering, industrial design and hardware/software compatibility, offering consumers an easier, more convenient and more enjoyable computing experience. Microsoft IntelliMouse Explorer, which launched in 1999, earned a place on PCWorld.coms December 2005 list of The 50 Greatest Gadgets of the Past 50 Years as the first mainstream optical mouse that brought gunk-free pointing devices to a broad consumer base. More information about the Hardware Group is available at http://www.mshardwareguide.com. 4.2 ABOUT MICROSOFT Founded in 1975, Microsoft (Nasdaq MSFT) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.
1 2 3

BlueTrack Technology does not work on clear glass or mirrored surfaces. The NPD Group Inc., based on U.S. retail unit sales from June 2007 to June 2008. Actual retail prices may vary

A proprietary tracking technology from Microsoft that lets you use a mouse on virtually any surface, excluding clear glass and mirrored surfaces. According to Microsoft, in a Blue Track technology mouse, the sensor, the light and the component configuration are optimized for the best possible surface image for a variety of conditions. BlueTrack Technology provides the mouse ASIC and the computer with exceptionally accurate and detailed information for advanced tracking on almost any surface. A BlueTrack technology mouse uses a Microsoft-designed complementary metal-oxidesemiconductor (CMOS) chip with advanced algorithms and pixel architecture for more precise
Department of Electronics 10

tracking. It is Microsoft's fourth-generation application-specific integrated circuit (ASIC) using CMOS technology. Proprietary high-angle imaging optics generate more exact surface images - even of shiny surfaces such as granite and marble - instead of blurry, out-of-focus images, as can be produced by many of the leading laser mice. And blue light helps create high-resolution, high-contrast images for better navigation. The wider beam enables illumination of a larger surface area and allows more light to return to the sensor. This helps for tracking on irregular surfaces such as carpet, where a smaller beam could get lost between the individual fibers. BlueTrack Technology debuted on two Microsoft products in November 2008: the Explorer Mouse and the Explorer Mini Mouse.

Department of Electronics

11

CHAPTER 5 BLUETRACK CHIPSETS AND ITS TYPES


Tracking and location detection through Bluetooth is one of the foremost concerns for any user with a Bluetooth handset, and is able to give personal information about travel, personal whereabouts, habits and can even lead to other types of attacks including information interception and business attacks. The act of an attacker using a Bluetooth device to connect and track another Bluetooth device is called BlueTracking. The Blue Tracking attack is mostly used for espionage and can be used for blackmail but is less effective than a number of other Bluetooth attacks, mostly because of the Bluetooth chipset that is used in most phones and devices. Bluetooth chips come in three classes or types which mainly determine the range at which they are effective.

5.1 CLASS 1 CHIPSETS


Class 1, used in many Bluetooth dongles to be used on personal computers, have a range of about 100 meters. Because of the small form factor and portability of these types of devices, experiments have been done and successfully have extended the range of these devices up to 1 kilometer with special equipment, the author of [2] confirmed that he could extend the range up to 230 meters with an average 5 dbi antenna, and up to 500 meters with a 14dbi antenna, both being soldered to the antenna contacts. This means that it would be used as the primary attack media for such a Blue Tracking attack, mainly because it has the largest area it is able to cover. Because Bluetooth was meant to be a relatively close distance wireless technology, the attacker, even with a class 1 Bluetooth device, would have to be relatively close, but this topic will be covered later in this section.

5.2 CLASS 2 CHIPSETS


Class 2 chipsets are the chipsets that are used in most mobile phones and smaller devices, giving the user a range for communication of approximately 10 meters [2]. Using these devices in a BlueTracking attack implies that the attacker would have to be within a relatively close range to the

Department of Electronics

12

victim, giving the attacker a larger likelihood of being seen or discovered. No attempts at extending the range of class two devices could be found in the given sources or within research. 5.3 CLASS 3 CHIPSETS Class 3 chipsets follow in suit from the class 1 and class 2 chipsets, and are said to have the best range when used well within 10 m [3]. The same authors later estimate the best range for class 3 devices to be up to 3 meters, giving them the least likelihood to be victims of attack due to the attacker having to be right on the victims heals or only to detect them while the victim were walking by at a close distance. The types of devices that utilize the class 3 chipsets are mainly Bluetooth earpieces for wireless communication between the ear piece and phone.

Department of Electronics

13

CHAPTER 6 BLUE TRACK TECHNOLOGY MOUSE BY MICROSOFT AND ITS VARITIES

1. Wireless Mobile mouse 4000 Studio Series: You can use this sporty mouse anywhere in your house. This mouse can be used on carpet, wood, or on your bed. This wireless mouse can be controlled from a distance of 300 feet away form the computer. This mouse can be used up to 10 months without having to change batteries. This mouse includes battery indicator which will tell you when battery power of your mouse is low. 2. Wireless Mobile Mouse 3500 Limited edition: This stylish designed mouse can be used anywhere in your house. You can use it even on a rough park bench or carpet or nay other thing. This mouse can be used up to 8 months without having to change batteries. This mouse includes battery indicator which indicates when the battery power of your mouse is low.

3. Explorer touch mouse Limited edition: This mouse has strip on its top that acts as a scroll wheel. This stylish mouse includes five programmable buttons. This mouse has 100 MB internal storage and can be used up to 18 months without having to change batteries.

If you wish to have mouse with excellent quality and blue track technology then you can definitely go for above mentioned mouse. Along with these, there are many other blue track technology mice by Microsoft such as Microsoft comfort mouse 4500, wireless mobile mouse 3500, Wireless Mobile mouse 4000 studio series and many more. You can choose any of the blue track technology mouse that suits both your expectation and budget. Blue track technology mouse will provide you great control and accuracy.

Department of Electronics

14

CHAPTER 7 CIRCUIT DIAGRAMS

Department of Electronics

15

Department of Electronics

16

CHAPTER 8 ADVANTAGES AND DISADVANTAGES


For any type of attack, using any class of Bluetooth chipset, the most common vulnerability and allowance for attackers to exploit the device is when the victim device is left in a discoverable mode. The first problem with leaving a device in discoverable mode is the fact that if a phone or similar device can be found, some of its basic Bluetooth abilities are not guarded and do not require that the user acknowledge them to be used. For example, the address book, calendar information and business card info are all stored in the phones memory as files, all with similar naming schemes among all phones . If an attacker gets within range for even a minute, the amount of time that it takes a person to check out in the grocery store or stand in line to get a ticket or board a train, the attacker can get their address book or calendar, two pieces of a personal nature which may not seem like an overly bad thing for others to see, but two files that can help the attacker plan further attacks or blackmail the owner of the victim device. A set of phone numbers for personal contacts can very easily contain information for relatives, coworkers and supervisors, all of which could be compared with the calendar. Overall, this vulnerability has been mostly corrected with newer phones, newer firmware for the phones, and an overall education being passed onto the consumer about how to change or fix this problem. At the same time, many people who get used a single phone or Bluetooth device and do not have the technical knowledge of how to switch it between discoverable Bluetooth mode and nondiscoverable Bluetooth mode, do not want to switch to a newer phone or have the knowledge to upgrade the firmware. This seems to be one of the most vulnerable and dangerous parts of Blue Tracking. The main issue in tracking and in leaving a device in discoverable mode is the way Bluetooth actually works. Bluetooth is similar to other wireless networking schemas in that it works on a server-client relationship. When the client, or victim device, is left in discoverable mode, it constantly allows for the broadcast and receipt of broadcasted messages, which allow for it to be seen in what seems like an endless sea of electromagnetic waves. When a message is received by the attacking devices and from the victim device, the victim device provides its hardware address, commonly referred to as its BD_ADDR, its internal clock, CLKN, and its frequency hop
Department of Electronics 17

synchronization, FHS [3]. If an attacker has all three of these, they have the keys to the castle wherein they are able to now break any sort of encryption put on the phone by hacking the encryption based on the hardware address. It also does not have to listen and analyze the hop sequence that the victim device uses to avoid interference, but already has it to use for listening in on broadcasted or sent messages. The BD_ADDR or hardware address of a device is most important, to allow for accessing or cracking a device, even when a victim device is not in discoverable mode [7]. If an attacker, based on previous observation or other means, knows that a device is within range, even if the device is not in discoverable mode, the attacker can try to directly connect using the hardware address of the device. If the device has an access or personal identification number (PIN) that is required to access the information on the device, this can be found in a brute force attempt at hacking the code. Since most people only use the common 4 digit combination for a personal identification number on devices, this means that the brute force attack would take a maximum of 4^10 tries to discover a personal identification number and this has been developed to be done in parallel between a number of Bluetooth devices [7]. A number of experiments have been done to prove most of the points given in this paper. The first, done by the author of [4] was a discovery experiment using 3 Bluetooth devices arranged in an overlapping triangular area to attempt to discover as many other devices in a crowded area as possible. It was conducted over a 6 month period and was done within a university setting, one time in a university building, and second at an exhibition stand for the CeBIT 2004 conference. This situation could be compared to a similar situation in which an attacker goes to a conference with malicious intent, rather than just an experimental detection. Within just the conference time period, a total of seven days, 5294 devices were detected as people merely walked by with their phones or other Bluetooth devices set on discoverable mode. The most frightening detail in the report on the results is that approximately 70% of all the devices found in the conference experiment were Vulnerable again SNARF attacks, SNARFing being the ability for the attacker to steal a victims phone numbers, calendar information and transmitted packets as defined above. Another disturbing fact within the [4] report was the sentence 1% of users chose their real name as [the] device name. At that point profound threats arise, because BlueTrack traces can be linked to natural persons. This furthers the main point of this section, being the idea that if these
Department of Electronics 18

people walking by the exhibition were being tracked, rather than just recorded, one could associate their phones with times and, given enough sensors or calculations, successfully track the persons movements, having their device identity and real name to use for this purpose. A second experiment, as done by the author of [3] used the open connection ability of Bluetooth devices and a number Bluetooth nodes placed in an office building to triangulate positions of employees within the office building, down to the area of a specific office. Though the author comments that Bluetooth might be a viable technology for triangulations, but not for calculating or measuring accurate distance, the experiment shows the true danger of leaving a Bluetooth device in discoverable mode, being the idea that within a given range, i.e. a 10 meter radius in the case of a class 2 Bluetooth device, a person can be located, and when more than on sensor is used, for example 3 with over lapping radiuses of 3 meters each, a person can be even more accurately tracked. Though the concept may be different, this was similar to what a set of students did in a number of Dutch train stations, specifically the Amsterdam Amstel, Utrecht Central Station, and Amsterdam Central Station. The students in [5] set up a number of Bluetooth laptops within the train station, and eventually boarded the train to continue their journey and study, alike, onto Utrecht. While still in the station they began scanning for open Bluetooth devices. Their results were quite telling of the vulnerabilities and very real abilities for Bluetooth devices to be tracked. Over the course of their observations, within two hours and twenty minutes, on the train and in the station, they were able to pick up a total oh 1877 devices within the vicinity of the laptops. A frightening detail of only 1712 of these were unique was also presented in the paper, thus showing the audience that 165 devices could have their hardware addresses recorded and eventually tracked. With further studies into this, 44 of those devices were actually tracked between Amsterdam Amstel and Amsterdam Central Station, proving that without much effort, and without a real desire to do so, the hardware addresses could be tracked only based on how long and where they were picked up and eventually went out of range. In addition to the observations as to passengers that the authors made, they also discovered that all members of the Dutch railways staff have their phones set to constant discovery mode [5]. Though the authors may not have been able to use this and this author cant use it any time soon, it can be pointed out that fare dodgers as they called them, could very easily go between one train
Department of Electronics 19

station and another, using a similar Bluetooth device as what they were, and track the movements of train conductors. This would allow them to roughly time when the conductor would come by to check for tickets and allow them to hide so that a ticket would not be needed. This brings up an additional point that could be considered the worst case scenario of this section. Currently there are viruses and worms that are available for mobile devices, such as laptops, personal digital assistants and cell phones alike [2]. Dutch railway staff having their cell phones in discoverable mode at all times could possibly allow for the transmission of either of these malicious programs to be transferred the to the cell phone without the owners knowledge and, with the right coding, allow for it to be spread to any device that it was able to successfully contact over its Bluetooth link. Assuming that the conductors at some point all come within contact range of each other and then must check the tickets of each and every passenger on the train, this would mean that 1877 devices could be infected with the virus or worm all within 2 hours and twenty minutes. This could feed a potential hacker, who decides to walk down the train on an innocent walk, every persons address books, calendars, or without even coming in contact with any of the users, could cause a denial of service. Another worst case scenario would be newer handsets which include GPS tracking devices, could have information sent to the hacker over mobile internet, thus tracking the user so long as they have their GPS enabled phone and no knowledge of the mobile virus. Tracking so far has been seen in a negative light, but there are positive uses for it. One of which has been implemented at Aalborg Zoo in Denmark, where parents can be issued Bluetooth tracking devices for children as they browse the zoo. Bluetooth sensor nodes are placed at different point within the zoo and allow for text messages to be sent to the parents phones when they fear they have lost their child. A message is sent to the phone based on a triangulated position from a number of nodes [3].

Department of Electronics

20

CHAPTER 9 HOW TO GET OUT OF RISK?????


The question most will ask when reading this section is What can be done to protect the average person from BlueTracking? Thankfully a number of steps are already being taken by many device manufacturers, specifically phone manufactures, to prevent attackers from being able to track and steal data from users. The first is that most phones, such as the Motorola Razr v3xx, now come with a default setting of being non-discoverable, and only being discoverable when the user specifically tells the phone to be. In addition to this safety feature, the phone has one more in which it only allows itself to be discoverable for 3 minutes, and also requests that the user explicitly acknowledge the connection of any unknown device with a pin pairing technique. As safe as a pin pairing technique sounds, additional experiments have been done in crowded malls in which the author of [1] did an experiment to see how many devices he could connect to based on the error of users. The author sat in a mall with a device scanning open Bluetooth connections and attempted to connect every time he found one. The catch was that the devices name that he was using was pin1234, a name that users took to be literal and entered the pin of 1234. Furthermore, the pin pairing technique and the algorithm to synchronize the two pins has been found to be flawed in the ways of a brute force attack on a four digit pin number would take just over 1 million tries, a feat that the average computer with a Bluetooth adapter could easily accomplish in a relatively short period of time. The author of [7] discusses the idea of Bluetooth having the problem of the pairing algorithm, and the idea that it will be the same code entered on both ends of the connection, creating a symmetrical link. In contrast, to defeat this vulnerability, as Wong puts it, could be relatively easily resolved by recourse to asymmetrical key establishment techniques at the cost of slightly increased computation. The algorithm could be developed in a similar way to the authentication of WEP, in that the receiving device could send a response to a challenge sent by the sending device.

Department of Electronics

21

CHAPTER 10 REQUIREMENTS
System Requirements For a Windows-based PC:-

A PC that meets the requirements for and has installed the Windows Vista or Windows XP operating system 100 MB of available hard drive space CD-ROM drive An available USB port Internet access for certain features For a Macintosh: Mac OS X 10.2x10.5x 30 MB of available hard drive space CD-ROM drive An available USB port Internet access for certain features According to the following figs. The size of the actual mouse in height=4.58mm & in breadth=3.18mm

Department of Electronics

22

There is an USB device to act it as the wireless mouse it`s size in height=1.84 mm & in breadth=0.62 mm

PowerRequirements

Battery Type and Quantity

1 A2 alkaline battery (included)

Battery Life 8 months typical

Department of Electronics

23

CONCLUSION
Microsoft Blue Track Technology the worlds most advanced tracking technology that allows consumers to take their mouse anywhere and work with confidence on virtually any surface. Microsofts proprietary tracking technology combines the width and power of optical technology with the precision of laser tracking to allow consumers to mouse on virtually any surface, from a granite kitchen countertop to the living room carpet.

The Wireless Mouse 5000 offers full-sized comfort in either hand with an comfortable design and rubber side grips. The mouse also features 2.4GHz wireless technology and a snap-in mini transceiver for a reliable wireless connection from up to 30 feet away.

Conclusion BlueTrack Technology does not work on clear glass but works on mirrored surfaces. Compared with leading laser and optical mice commercially available in fall 2008. Some advanced features require software installation. Actual retail price may vary. Use it on your carpet, hardwood floor, granite kitchen counter, microfiber couch and beach mat. Get creative!

Department of Electronics

24

REFERENCE
1. 2.

www.wikipedia.org www.ask.com

3. www.scribd.com

Department of Electronics

25

Potrebbero piacerti anche