Contents
1. Introduction |
| 9 | |
1.1 | Scope | ........................................................................................................................... | 9 |
1.2 | Chapter Overviews | 9 | |
1.3 | Support | 9 | |
1.4 | Conventions | 10 | |
| 1.4.1 | Definitions | 10 |
| 1.4.2 | Acronyms | 10 |
2. WirelessUSB™ Protocol 2.2 | 13 | ||
2.1 | General Overview | 13 | |
| 2.1.1 | Radio Channel Management | 13 |
| 2.1.2 | Pseudo Noise Codes | 13 |
| 2.1.3 | Chip Error Correction | 14 |
| 2.1.4 | Automatic Acknowledgment (AutoACK) | 14 |
| 2.1.5 | Network ID | 14 |
| 2.1.6 | Manufacturing ID | 14 |
| 2.1.7 | Channel Selection Algorithm | 15 |
2.2 | Protocol Modes | 15 | |
| 2.2.1 Ping Mode (Bridge Only) | 16 | |
| 2.2.2 Idle Mode (HID only) | 17 | |
| 2.2.3 Reconnect Mode (HID only) | 17 | |
| 2.2.4 | Button Bind Mode | 17 |
| 2.2.5 | Enhanced KISSBind™ | 18 |
| 2.2.6 | Unbind | 20 |
| 2.2.7 | Data Mode | 20 |
| 2.2.8 Back Channel Data Support | 20 | |
| 2.2.9 Dynamic Data Rate and Dynamic PA | 22 | |
2.3 | Packet Structures | 23 | |
| 2.3.1 Bind/KISSBind Request Packet (HID) | 23 | |
| 2.3.2 Bind Response Packet (Bridge) | 24 | |
| 2.3.3 | Connect Request (HID) | 24 |
| 2.3.4 Connect Response Packet (Bridge) | 24 | |
| 2.3.5 | Ping Packet (Bridge) | 25 |
| 2.3.6 Data Packet/Back Channel Data Packet (Bridge and HID) | 25 | |
2.4 Bind and Reconnect Timing | 26 | ||
2.5 | Signature Byte | 28 | |
2.6 | Encryption | 29 | |
| 2.6.1 | TEA Encryption | 29 |
|
| 2.6.1.1 TEA Key Management over WirelessUSB | 29 |
| 2.6.2 | AES Encryption | 30 |
|
| 2.6.2.1 AES Key Management | 31 |
| 2.6.3 Encryption and Power Consumption Trade Off | 31 | |
CY4672 Reference Design Guide, Document # | 3 |
[+] Feedback