logo资料库

HOGP_SPEC_V10.pdf

第1页 / 共38页
第2页 / 共38页
第3页 / 共38页
第4页 / 共38页
第5页 / 共38页
第6页 / 共38页
第7页 / 共38页
第8页 / 共38页
资料共38页,剩余部分请下载后查看
BLUETOOTH® DOC Prepared By HID WG Date / Year-Month-Day Approved Revision Document No 2011-12-27 E-mail Address hid-main@bluetooth.org Adopted V10r00 HOGP_SPEC N.B. HID OVER GATT PROFILE SPECIFICATION Abstract This profile defines how a device with Bluetooth low energy wireless communications can support HID services over the Bluetooth low energy protocol stack using the Generic Attribute Profile.
BLUETOOTH PROFILE SPECIFICATION HID over GATT Profile Specification Revision History Revision Date Comments Page 2 of 38 D09r01 D09r02 D09r03 D09r04 2011-06-30 2011-07-05 2011-07-08 2011-07-15 First Draft of LE HID Profile Review comments from Alain Michaud and Jacques Chassot Updated the review comments, HID Flags and added Appendix A Revised section 0 to clarify device-initiated and D09r05 2011-07-15 Sandeep Kamath updated text in sections 5.1.2 and 5.2.6, fixed Idle Connection Timeout references host-initiated connection establishment D09r06 D09r07 D09r08 D09r09 D09r10 D09r11 D09r12 D09r13 D09r14 D09r15 D09r16 D09r17 D09r18 D09r19 D09r20 D09r21 D09r22 D09r23 D09r24 2011-07-21 2011-08-04 2011-08-09 2011-08-10 2011-08-11 2011-08-11 2011-08-12 2011-08-17 2011-08-17 2011-08-19 2011-08-22 2011-08-26 2011-08-29 2011-09-05 2011-09-06 2011-09-07 2011-09-08 2011-09-10 2011-09-12 D09r25 2001-09-13 D09r26 D09r27 2011-09-13 2011-09-14 D09r28 2011-09-14 Updated at HID WG F2F, Malmö Changes for Option 1a Added section 4.3.1.5 Added review comments and renamed “Flags” to “Information” Added review comments Added more comments Updates from HID WG CC, 2011-08-11 Removed addressed comments, added a few editorial changes Added comments from Chris Church and Mike Tsai Resolved comments Removed soft/hard reset commands Updated section 5.1.3, removed addressed comments Revision Revoked Clean version Changed Boot Mode only Hosts Added more details on Boot Mode only Hosts Added recommendation for DIS C1 values. Added review comments Accepted review comments and changed Tables 4-1 and 4-2 to accommodate clarified requirements. Added to sections 3.1 through 3.4 to clarify additional security requirements beyond Service Specs Changes to accommodate HID Boot Report Mapping as a characteristic, including updating Tables 4-1 and Table 4-2, adding new characteristic and GATT sub-proc. Rationalized conditionals in Tables 4-1 and 4-2. Updated section 4.2 updated Security Considerations in s6.1. Updated table 6-1. Updated references section Added new subsections to 3.1, 3.2, 3.3, 3.4 to define Service Types & reformatted subsections Addressed review comments, changed all instances of Report Mode to Report Protocol Mode and all instances of Boot Mode to Boot Protocol Mode. Inserted table of Figures and List of Tables. Changed section 4.2.2.1 to separate Service & Characteristic discovery for Boot Protocol Mode Hosts. Issued clean version D09r29 D09r30 2011-09-16 2011-09-16 Updates from HID WG CC 2011-09-15 Formatting edits, changed HID Report to HID Control Point in section 4.8
BLUETOOTH PROFILE SPECIFICATION HID over GATT Profile Specification Revision Date Comments Page 3 of 38 D09r31 D09r32 D09r33 D09r34 D09r35 2011-09-17 2011-09-19 2011-09-20 2011-09-26 2011-09-29 D09r36 2011-09-29 D09r37 D09r38 2011-10-09 2011-10-15 D09r39 2011-10-15 D09r40 2011-10-25 D09r41 2011-11-02 D09r42 2011-11-08 D10r00 2011-11-23 D10r01 2011-12-07 Updated section 4.8 for Get Protocol Mode Addressed review comments from Jacques Chassot Corrected references column in Table 4-1 Renamed to HID over GATT Reverted some low energy deletions, added HID State, addressed Tim and Randy’s comments. Added HID Protocol Mode, removed get/set protocol from HID Control Point. Comments addressed from HID WG CC Updates from the Budapest F2F Added details on Translation Layer, Report Instance characteristic descriptor and External Report Reference characteristic descriptor. Updated following redesign of HID Service after BARB review. Removed Report Reference characteristic descriptor from Report Map characteristic and into Report (or non-HID Service characteristics). Added External Report Reference characteristic descriptor. Multiple HID Services allowed. Mandated including external services with characteristics described in Report Map. Updated to match HID Service r38 (removed Boot Report Reference characteristic, added Boot Keyboard Input Report, Boot Keyboard Output Report, and Boot Mouse Input Report). Addressed BARB review comments, reinstated mandatory HID service discovery for Boot Mode Hosts, and optional DIS and Battery service discovery. Added optional characteristic discovery for Boot Mode hosts. Updated section 5.1.6 to refer to Scan Parameters Profile/Service. Added behavior sections for Boot mode characteristics. Added exchange MTU sub-procedure requirement for Report Hosts. Added information sharing for bonding and service changed requirement for HID Hosts. Addressed BARB review comments. Removed optional support of Report and non-HID Service characteristic in Table 4-2. Added clarification in Section 3.1.1 regarding external service characteristics’ mandatory requirements for characteristic properties. Submitted as v1.0 voting object to BARB Added note in Section 4.5.3 regarding multiple Battery Service instances & use of the characteristic presentation format descriptor. Resubmitted as v1.0 V10r00 2011-12-27 Adopted by the Bluetooth SIG Board of Directors Contributors Name Company Krishnan Nair Simon Finch Robin Heydon Joe Decuir Amit Gupta Chris Church Alain Michaud CSR CSR CSR CSR CSR CSR Microsoft
Page 4 of 38 BLUETOOTH PROFILE SPECIFICATION HID over GATT Profile Specification Name Jacques Chassot David Edwin Sandeep Kamath Karl Torvmark Len Ott Mike Tsai Rob Hulvey Company Logitech Nordic TI TI Socket Mobile Qualcomm Atheros Broadcom Disclaimer and Copyright Notice The copyright in this specification is owned by the Promoter Members of Bluetooth® Special Interest Group (SIG), Inc. (“Bluetooth SIG”). Use of these specifications and any related intellectual property (collectively, the “Specification”), is governed by the Promoters Membership Agreement among the Promoter Members and Bluetooth SIG (the “Promoters Agreement”), certain membership agreements between Bluetooth SIG and its Adopter and Associate Members (the “Membership Agreements”) and the Bluetooth Specification Early Adopters Agreements (1.2 Early Adopters Agreements) among Early Adopter members of the unincorporated Bluetooth SIG and the Promoter Members (the “Early Adopters Agreement”). Certain rights and obligations of the Promoter Members under the Early Adopters Agreements have been assigned to Bluetooth SIG by the Promoter Members. Use of the Specification by anyone who is not a member of Bluetooth SIG or a party to an Early Adopters Agreement (each such person or party, a “Member”), is prohibited. The legal rights and obligations of each Member are governed by their applicable Membership Agreement, Early Adopters Agreement or Promoters Agreement. No license, express or implied, by estoppel or otherwise, to any intellectual property rights are granted herein. Any use of the Specification not in compliance with the terms of the applicable Membership Agreement, Early Adopters Agreement or Promoters Agreement is prohibited and any such prohibited use may result in termination of the applicable Membership Agreement or Early Adopters Agreement and other liability permitted by the applicable agreement or by applicable law to Bluetooth SIG or any of its members for patent, copyright and/or trademark infringement. THE SPECIFICATION IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, SATISFACTORY QUALITY, OR REASONABLE SKILL OR CARE, OR ANY WARRANTY ARISING OUT OF ANY COURSE OF DEALING, USAGE, TRADE PRACTICE, PROPOSAL, SPECIFICATION OR SAMPLE. Each Member hereby acknowledges that products equipped with the Bluetooth technology (“Bluetooth products”) may be subject to various regulatory controls under the laws and regulations of various governments worldwide. Such laws and regulatory controls may govern, among other things, the combination, operation, use, implementation and distribution of Bluetooth products. Examples of such laws and regulatory controls include, but are not limited to, airline regulatory controls, telecommunications regulations, technology transfer controls and health and safety regulations. Each Member is solely responsible for the compliance by their Bluetooth Products with any such laws and regulations and for obtaining any and all required authorizations, permits, or licenses for their Bluetooth products related to such regulations within the applicable jurisdictions. Each Member acknowledges that nothing in the Specification provides any information or assistance in connection with securing such compliance, authorizations or licenses. NOTHING IN THE SPECIFICATION CREATES ANY WARRANTIES, EITHER EXPRESS OR IMPLIED, REGARDING SUCH LAWS OR REGULATIONS. ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY INTELLECTUAL PROPERTY RIGHTS OR FOR NONCOMPLIANCE WITH LAWS, RELATING TO USE OF THE SPECIFICATION IS EXPRESSLY DISCLAIMED. BY USE OF THE SPECIFICATION, EACH MEMBER EXPRESSLY WAIVES ANY CLAIM AGAINST BLUETOOTH SIG AND ITS PROMOTER MEMBERS RELATED TO USE OF THE SPECIFICATION. Bluetooth SIG reserve the right to adopt any changes or alterations to the Specification as it deems necessary or appropriate.
BLUETOOTH PROFILE SPECIFICATION HID over GATT Profile Specification Page 5 of 38 Copyright © 2011. Bluetooth SIG Inc. All copyrights in the Bluetooth Specifications themselves are owned by Ericsson AB, Lenovo (Singapore) Pte. Ltd., Intel Corporation, Microsoft Corporation, Motorola Mobility, Inc., Nokia Corporation, and Toshiba Corporation. *Other third-party brands and names are the property of their respective owners.
BLUETOOTH PROFILE SPECIFICATION HID over GATT Profile Specification Document Terminology Page 6 of 38 The Bluetooth SIG has adopted Section 13.1 of the IEEE Standards Style Manual, which dictates use of the words ``shall’’, ``should’’, ``may’’, and ``can’’ in the development of documentation, as follows: The word shall is used to indicate mandatory requirements strictly to be followed in order to conform to the standard and from which no deviation is permitted (shall equals is required to). The use of the word must is deprecated and shall not be used when stating mandatory requirements; must is used only to describe unavoidable situations. The use of the word will is deprecated and shall not be used when stating mandatory requirements; will is only used in statements of fact. The word should is used to indicate that among several possibilities one is recommended as particularly suitable, without mentioning or excluding others; or that a certain course of action is preferred but not necessarily required; or that (in the negative form) a certain course of action is deprecated but not prohibited (should equals is recommended that). The word may is used to indicate a course of action permissible within the limits of the standard (may equals is permitted). The word can is used for statements of possibility and capability, whether material, physical, or causal (can equals is able to).
BLUETOOTH PROFILE SPECIFICATION HID over GATT Profile Specification Table of Contents Page 7 of 38 1 2 3 4 3.1 3.2 3.3 1.1 1.2 2.1 2.2 2.3 2.4 2.5 Introduction .................................................................................................................................... 9 Profile Dependencies ................................................................................................................ 9 Conformance ............................................................................................................................. 9 Configuration ................................................................................................................................ 10 Roles ........................................................................................................................................ 10 Role/Service Relationships ...................................................................................................... 10 Concurrent Role Limitations and Restrictions ......................................................................... 11 Topology Limitations and Restrictions ..................................................................................... 11 Multiple Service Instances ....................................................................................................... 11 HID Device Requirements ........................................................................................................... 13 HID Service.............................................................................................................................. 13 3.1.1 Dependent Service Requirements .................................................................................... 13 3.1.2 Service Type ..................................................................................................................... 13 3.1.3 Service UUIDs AD Type ................................................................................................... 13 3.1.4 Local Name AD Type ........................................................................................................ 14 3.1.5 Appearance AD Type ........................................................................................................ 14 3.1.6 Additional Security Requirements ..................................................................................... 14 Battery Service ........................................................................................................................ 14 3.2.1 Service Type ..................................................................................................................... 14 3.2.2 Additional Security Requirements ..................................................................................... 14 Device Information Service ...................................................................................................... 14 3.3.1 Service Type ..................................................................................................................... 14 3.3.2 Mandatory Characteristics ................................................................................................ 15 3.3.3 Additional Security Requirements ..................................................................................... 15 Scan Parameters Service ........................................................................................................ 15 3.4.1 Additional Security Requirements ..................................................................................... 15 HID Host Requirements and Behaviors ..................................................................................... 16 GATT Sub-Procedure Requirements ...................................................................................... 17 Scan Parameters Profile Support. ........................................................................................... 17 4.2.1 Additional Security Requirements ..................................................................................... 17 Service Discovery - Boot Host ................................................................................................. 17 4.3.1 HID Service Discovery ...................................................................................................... 18 4.3.2 Device Information Service Discovery .............................................................................. 18 4.3.3 Battery Service Discovery ................................................................................................. 18 Characteristic Discovery – Boot Host ...................................................................................... 18 4.4.1 HID Service Characteristic Discovery ............................................................................... 18 4.4.2 Device Information Service Characteristic Discovery ....................................................... 19 4.4.3 Battery Service Characteristic Discovery .......................................................................... 19 Service Discovery – Report Host ............................................................................................ 19 4.5.1 HID Service Discovery ...................................................................................................... 20 4.5.2 Device Information Service Discovery .............................................................................. 20 4.5.3 Battery Service Discovery ................................................................................................. 20 Characteristic Discovery – Report Host .................................................................................. 20 4.6.1 HID Service Characteristic Discovery ............................................................................... 20 4.6.2 Device Information Service Characteristic Discovery ....................................................... 21 4.6.3 Battery Service Characteristic Discovery .......................................................................... 21 Report Map Behavior ............................................................................................................... 21 Report Behavior ....................................................................................................................... 22 4.8.1 Translation Layer .............................................................................................................. 22 4.9 HID Control Point Behavior ..................................................................................................... 23 4.10 HID Information Behavior ........................................................................................................ 23 4.11 Protocol Mode Behavior .......................................................................................................... 23 4.1 4.2 4.3 4.7 4.8 3.4 4.4 4.5 4.6
BLUETOOTH PROFILE SPECIFICATION HID over GATT Profile Specification Page 8 of 38 4.12 4.13 4.14 4.15 4.16 4.17 5 5.1 5.2 6.1 6.2 6 7 8 9 10 11 Boot Keyboard Input Report Behavior ..................................................................................... 23 Boot Keyboard Output Report Behavior .................................................................................. 23 Boot Mouse Input Report Behavior ......................................................................................... 24 Battery Level Behavior ............................................................................................................ 24 PnP ID Behavior ...................................................................................................................... 24 Information Sharing between HID Hosts ................................................................................. 24 Connection Establishment .......................................................................................................... 25 HID Device Requirements ....................................................................................................... 25 5.1.1 Device Discovery .............................................................................................................. 25 5.1.2 Connection Procedure for Non-bonded Devices .............................................................. 25 5.1.3 Device-Initiated Connection Procedure for Bonded Devices ............................................ 26 5.1.4 Host-Initiated Connection Procedure for Bonded Devices ............................................... 27 Link Loss Reconnection Procedure .................................................................................. 28 5.1.5 5.1.6 Idle Connection ................................................................................................................. 28 Host Requirements .................................................................................................................. 28 5.2.1 Device Discovery .............................................................................................................. 28 5.2.2 Connection Procedure for Non-bonded Devices .............................................................. 29 5.2.3 Device-Initiated Connection Procedure for Bonded Devices ............................................ 30 5.2.4 Host-Initiated Connection Procedure for Bonded Devices ............................................... 30 5.2.5 Link Loss Reconnection Procedure .................................................................................. 31 5.2.6 Fast Connection Interval ................................................................................................... 32 Security Considerations .............................................................................................................. 33 Device Security Considerations............................................................................................... 33 Host Security Considerations .................................................................................................. 33 List of Figures .............................................................................................................................. 34 List of Tables ................................................................................................................................ 35 Acronyms and Abbreviations ..................................................................................................... 36 References .................................................................................................................................... 37 Appendix A ................................................................................................................................... 38
分享到:
收藏