BLUETOOTH® DOC
Prepared By
HID WG
Date / Year-Month-Day
Approved
Revision
Document No
2011-12-27
E-mail Address
hid-main@bluetooth.org
Adopted
V10r00
HOGP_SPEC
N.B.
HID OVER GATT PROFILE SPECIFICATION
Abstract
This profile defines how a device with Bluetooth low energy wireless
communications can support HID services over the Bluetooth low
energy protocol stack using the Generic Attribute Profile.
BLUETOOTH PROFILE SPECIFICATION
HID over GATT Profile Specification
Revision History
Revision
Date
Comments
Page 2 of 38
D09r01
D09r02
D09r03
D09r04
2011-06-30
2011-07-05
2011-07-08
2011-07-15
First Draft of LE HID Profile
Review comments from Alain Michaud and Jacques Chassot
Updated the review comments, HID Flags and added Appendix A
Revised section 0 to clarify device-initiated and
D09r05
2011-07-15
Sandeep Kamath updated text in sections 5.1.2 and 5.2.6, fixed Idle
Connection Timeout references
host-initiated connection establishment
D09r06
D09r07
D09r08
D09r09
D09r10
D09r11
D09r12
D09r13
D09r14
D09r15
D09r16
D09r17
D09r18
D09r19
D09r20
D09r21
D09r22
D09r23
D09r24
2011-07-21
2011-08-04
2011-08-09
2011-08-10
2011-08-11
2011-08-11
2011-08-12
2011-08-17
2011-08-17
2011-08-19
2011-08-22
2011-08-26
2011-08-29
2011-09-05
2011-09-06
2011-09-07
2011-09-08
2011-09-10
2011-09-12
D09r25
2001-09-13
D09r26
D09r27
2011-09-13
2011-09-14
D09r28
2011-09-14
Updated at HID WG F2F, Malmö
Changes for Option 1a
Added section 4.3.1.5
Added review comments and renamed “Flags” to “Information”
Added review comments
Added more comments
Updates from HID WG CC, 2011-08-11
Removed addressed comments, added a few editorial changes
Added comments from Chris Church and Mike Tsai
Resolved comments
Removed soft/hard reset commands
Updated section 5.1.3, removed addressed comments
Revision Revoked
Clean version
Changed Boot Mode only Hosts
Added more details on Boot Mode only Hosts
Added recommendation for DIS C1 values.
Added review comments
Accepted review comments and changed Tables 4-1 and 4-2 to
accommodate clarified requirements. Added to sections 3.1 through
3.4 to clarify additional security requirements beyond Service Specs
Changes to accommodate HID Boot Report Mapping as a
characteristic, including updating Tables 4-1 and Table 4-2, adding
new characteristic and GATT sub-proc. Rationalized conditionals in
Tables 4-1 and 4-2. Updated section 4.2 updated Security
Considerations in s6.1.
Updated table 6-1. Updated references section
Added new subsections to 3.1, 3.2, 3.3, 3.4 to define Service Types
& reformatted subsections
Addressed review comments, changed all instances of Report Mode
to Report Protocol Mode and all instances of Boot Mode to Boot
Protocol Mode. Inserted table of Figures and List of Tables.
Changed section 4.2.2.1 to separate Service & Characteristic
discovery for Boot Protocol Mode Hosts. Issued clean version
D09r29
D09r30
2011-09-16
2011-09-16
Updates from HID WG CC 2011-09-15
Formatting edits, changed HID Report to HID Control Point in
section 4.8
BLUETOOTH PROFILE SPECIFICATION
HID over GATT Profile Specification
Revision
Date
Comments
Page 3 of 38
D09r31
D09r32
D09r33
D09r34
D09r35
2011-09-17
2011-09-19
2011-09-20
2011-09-26
2011-09-29
D09r36
2011-09-29
D09r37
D09r38
2011-10-09
2011-10-15
D09r39
2011-10-15
D09r40
2011-10-25
D09r41
2011-11-02
D09r42
2011-11-08
D10r00
2011-11-23
D10r01
2011-12-07
Updated section 4.8 for Get Protocol Mode
Addressed review comments from Jacques Chassot
Corrected references column in Table 4-1
Renamed to HID over GATT
Reverted some low energy deletions, added HID State, addressed
Tim and Randy’s comments.
Added HID Protocol Mode, removed get/set protocol from HID
Control Point. Comments addressed from HID WG CC
Updates from the Budapest F2F
Added details on Translation Layer, Report Instance characteristic
descriptor and External Report Reference characteristic descriptor.
Updated following redesign of HID Service after BARB review.
Removed Report Reference characteristic descriptor from Report
Map characteristic and into Report (or non-HID Service
characteristics). Added External Report Reference characteristic
descriptor. Multiple HID Services allowed. Mandated including
external services with characteristics described in Report Map.
Updated to match HID Service r38 (removed Boot Report Reference
characteristic, added Boot Keyboard Input Report, Boot Keyboard
Output Report, and Boot Mouse Input Report).
Addressed BARB review comments, reinstated mandatory HID
service discovery for Boot Mode Hosts, and optional DIS and
Battery service discovery. Added optional characteristic discovery
for Boot Mode hosts. Updated section 5.1.6 to refer to Scan
Parameters Profile/Service. Added behavior sections for Boot mode
characteristics. Added exchange MTU sub-procedure requirement
for Report Hosts. Added information sharing for bonding and service
changed requirement for HID Hosts.
Addressed BARB review comments. Removed optional support of
Report and non-HID Service characteristic in Table 4-2.
Added clarification in Section 3.1.1 regarding external service
characteristics’ mandatory requirements for characteristic properties.
Submitted as v1.0 voting object to BARB
Added note in Section 4.5.3 regarding multiple Battery Service
instances & use of the characteristic presentation format descriptor.
Resubmitted as v1.0
V10r00
2011-12-27
Adopted by the Bluetooth SIG Board of Directors
Contributors
Name
Company
Krishnan Nair
Simon Finch
Robin Heydon
Joe Decuir
Amit Gupta
Chris Church
Alain Michaud
CSR
CSR
CSR
CSR
CSR
CSR
Microsoft
Page 4 of 38
BLUETOOTH PROFILE SPECIFICATION
HID over GATT Profile Specification
Name
Jacques Chassot
David Edwin
Sandeep Kamath
Karl Torvmark
Len Ott
Mike Tsai
Rob Hulvey
Company
Logitech
Nordic
TI
TI
Socket Mobile
Qualcomm Atheros
Broadcom
Disclaimer and Copyright Notice
The copyright in this specification is owned by the Promoter Members of Bluetooth® Special Interest Group
(SIG), Inc. (“Bluetooth SIG”). Use of these specifications and any related intellectual property (collectively, the
“Specification”), is governed by the Promoters Membership Agreement among the Promoter Members and
Bluetooth SIG (the “Promoters Agreement”), certain membership agreements between Bluetooth SIG and its
Adopter and Associate Members (the “Membership Agreements”) and the Bluetooth Specification Early
Adopters Agreements (1.2 Early Adopters Agreements) among Early Adopter members of the unincorporated
Bluetooth SIG and the Promoter Members (the “Early Adopters Agreement”). Certain rights and obligations of
the Promoter Members under the Early Adopters Agreements have been assigned to Bluetooth SIG by the
Promoter Members.
Use of the Specification by anyone who is not a member of Bluetooth SIG or a party to an Early Adopters
Agreement (each such person or party, a “Member”), is prohibited. The legal rights and obligations of each
Member are governed by their applicable Membership Agreement, Early Adopters Agreement or Promoters
Agreement. No license, express or implied, by estoppel or otherwise, to any intellectual property rights are
granted herein.
Any use of the Specification not in compliance with the terms of the applicable Membership Agreement, Early
Adopters Agreement or Promoters Agreement is prohibited and any such prohibited use may result in
termination of the applicable Membership Agreement or Early Adopters Agreement and other liability permitted
by the applicable agreement or by applicable law to Bluetooth SIG or any of its members for patent, copyright
and/or trademark infringement.
THE SPECIFICATION IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY
WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE,
SATISFACTORY QUALITY, OR REASONABLE SKILL OR CARE, OR ANY WARRANTY ARISING OUT OF
ANY COURSE OF DEALING, USAGE, TRADE PRACTICE, PROPOSAL, SPECIFICATION OR SAMPLE.
Each Member hereby acknowledges that products equipped with the Bluetooth technology (“Bluetooth
products”) may be subject to various regulatory controls under the laws and regulations of various governments
worldwide. Such laws and regulatory controls may govern, among other things, the combination, operation,
use, implementation and distribution of Bluetooth products. Examples of such laws and regulatory controls
include, but are not limited to, airline regulatory controls, telecommunications regulations, technology transfer
controls and health and safety regulations. Each Member is solely responsible for the compliance by their
Bluetooth Products with any such laws and regulations and for obtaining any and all required authorizations,
permits, or licenses for their Bluetooth products related to such regulations within the applicable jurisdictions.
Each Member acknowledges that nothing in the Specification provides any information or assistance in
connection with securing such compliance, authorizations or licenses. NOTHING IN THE SPECIFICATION
CREATES ANY WARRANTIES, EITHER EXPRESS OR IMPLIED, REGARDING SUCH LAWS OR
REGULATIONS.
ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY INTELLECTUAL PROPERTY RIGHTS
OR FOR NONCOMPLIANCE WITH LAWS, RELATING TO USE OF THE SPECIFICATION IS EXPRESSLY
DISCLAIMED. BY USE OF THE SPECIFICATION, EACH MEMBER EXPRESSLY WAIVES ANY CLAIM
AGAINST BLUETOOTH SIG AND
ITS PROMOTER MEMBERS RELATED TO USE OF THE
SPECIFICATION.
Bluetooth SIG reserve the right to adopt any changes or alterations to the Specification as it deems necessary
or appropriate.
BLUETOOTH PROFILE SPECIFICATION
HID over GATT Profile Specification
Page 5 of 38
Copyright © 2011. Bluetooth SIG Inc. All copyrights in the Bluetooth Specifications themselves are
owned by Ericsson AB, Lenovo (Singapore) Pte. Ltd., Intel Corporation, Microsoft Corporation,
Motorola Mobility, Inc., Nokia Corporation, and Toshiba Corporation. *Other third-party brands and
names are the property of their respective owners.
BLUETOOTH PROFILE SPECIFICATION
HID over GATT Profile Specification
Document Terminology
Page 6 of 38
The Bluetooth SIG has adopted Section 13.1 of the IEEE Standards Style Manual,
which dictates use of the words ``shall’’, ``should’’, ``may’’, and ``can’’ in the
development of documentation, as follows:
The word shall is used to indicate mandatory requirements strictly to be followed in
order to conform to the standard and from which no deviation is permitted (shall equals
is required to).
The use of the word must is deprecated and shall not be used when stating mandatory
requirements; must is used only to describe unavoidable situations.
The use of the word will is deprecated and shall not be used when stating mandatory
requirements; will is only used in statements of fact.
The word should is used to indicate that among several possibilities one is
recommended as particularly suitable, without mentioning or excluding others; or that a
certain course of action is preferred but not necessarily required; or that (in the negative
form) a certain course of action is deprecated but not prohibited (should equals is
recommended that).
The word may is used to indicate a course of action permissible within the limits of the
standard (may equals is permitted).
The word can is used for statements of possibility and capability, whether material,
physical, or causal (can equals is able to).
BLUETOOTH PROFILE SPECIFICATION
HID over GATT Profile Specification
Table of Contents
Page 7 of 38
1
2
3
4
3.1
3.2
3.3
1.1
1.2
2.1
2.2
2.3
2.4
2.5
Introduction .................................................................................................................................... 9
Profile Dependencies ................................................................................................................ 9
Conformance ............................................................................................................................. 9
Configuration ................................................................................................................................ 10
Roles ........................................................................................................................................ 10
Role/Service Relationships ...................................................................................................... 10
Concurrent Role Limitations and Restrictions ......................................................................... 11
Topology Limitations and Restrictions ..................................................................................... 11
Multiple Service Instances ....................................................................................................... 11
HID Device Requirements ........................................................................................................... 13
HID Service.............................................................................................................................. 13
3.1.1 Dependent Service Requirements .................................................................................... 13
3.1.2 Service Type ..................................................................................................................... 13
3.1.3 Service UUIDs AD Type ................................................................................................... 13
3.1.4
Local Name AD Type ........................................................................................................ 14
3.1.5 Appearance AD Type ........................................................................................................ 14
3.1.6 Additional Security Requirements ..................................................................................... 14
Battery Service ........................................................................................................................ 14
3.2.1 Service Type ..................................................................................................................... 14
3.2.2 Additional Security Requirements ..................................................................................... 14
Device Information Service ...................................................................................................... 14
3.3.1 Service Type ..................................................................................................................... 14
3.3.2 Mandatory Characteristics ................................................................................................ 15
3.3.3 Additional Security Requirements ..................................................................................... 15
Scan Parameters Service ........................................................................................................ 15
3.4.1 Additional Security Requirements ..................................................................................... 15
HID Host Requirements and Behaviors ..................................................................................... 16
GATT Sub-Procedure Requirements ...................................................................................... 17
Scan Parameters Profile Support. ........................................................................................... 17
4.2.1 Additional Security Requirements ..................................................................................... 17
Service Discovery - Boot Host ................................................................................................. 17
4.3.1 HID Service Discovery ...................................................................................................... 18
4.3.2 Device Information Service Discovery .............................................................................. 18
4.3.3 Battery Service Discovery ................................................................................................. 18
Characteristic Discovery – Boot Host ...................................................................................... 18
4.4.1 HID Service Characteristic Discovery ............................................................................... 18
4.4.2 Device Information Service Characteristic Discovery ....................................................... 19
4.4.3 Battery Service Characteristic Discovery .......................................................................... 19
Service Discovery – Report Host ............................................................................................ 19
4.5.1 HID Service Discovery ...................................................................................................... 20
4.5.2 Device Information Service Discovery .............................................................................. 20
4.5.3 Battery Service Discovery ................................................................................................. 20
Characteristic Discovery – Report Host .................................................................................. 20
4.6.1 HID Service Characteristic Discovery ............................................................................... 20
4.6.2 Device Information Service Characteristic Discovery ....................................................... 21
4.6.3 Battery Service Characteristic Discovery .......................................................................... 21
Report Map Behavior ............................................................................................................... 21
Report Behavior ....................................................................................................................... 22
4.8.1 Translation Layer .............................................................................................................. 22
4.9
HID Control Point Behavior ..................................................................................................... 23
4.10 HID Information Behavior ........................................................................................................ 23
4.11
Protocol Mode Behavior .......................................................................................................... 23
4.1
4.2
4.3
4.7
4.8
3.4
4.4
4.5
4.6
BLUETOOTH PROFILE SPECIFICATION
HID over GATT Profile Specification
Page 8 of 38
4.12
4.13
4.14
4.15
4.16
4.17
5
5.1
5.2
6.1
6.2
6
7
8
9
10
11
Boot Keyboard Input Report Behavior ..................................................................................... 23
Boot Keyboard Output Report Behavior .................................................................................. 23
Boot Mouse Input Report Behavior ......................................................................................... 24
Battery Level Behavior ............................................................................................................ 24
PnP ID Behavior ...................................................................................................................... 24
Information Sharing between HID Hosts ................................................................................. 24
Connection Establishment .......................................................................................................... 25
HID Device Requirements ....................................................................................................... 25
5.1.1 Device Discovery .............................................................................................................. 25
5.1.2 Connection Procedure for Non-bonded Devices .............................................................. 25
5.1.3 Device-Initiated Connection Procedure for Bonded Devices ............................................ 26
5.1.4 Host-Initiated Connection Procedure for Bonded Devices ............................................... 27
Link Loss Reconnection Procedure .................................................................................. 28
5.1.5
5.1.6
Idle Connection ................................................................................................................. 28
Host Requirements .................................................................................................................. 28
5.2.1 Device Discovery .............................................................................................................. 28
5.2.2 Connection Procedure for Non-bonded Devices .............................................................. 29
5.2.3 Device-Initiated Connection Procedure for Bonded Devices ............................................ 30
5.2.4 Host-Initiated Connection Procedure for Bonded Devices ............................................... 30
5.2.5
Link Loss Reconnection Procedure .................................................................................. 31
5.2.6 Fast Connection Interval ................................................................................................... 32
Security Considerations .............................................................................................................. 33
Device Security Considerations............................................................................................... 33
Host Security Considerations .................................................................................................. 33
List of Figures .............................................................................................................................. 34
List of Tables ................................................................................................................................ 35
Acronyms and Abbreviations ..................................................................................................... 36
References .................................................................................................................................... 37
Appendix A ................................................................................................................................... 38