Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
2Activity

Table Of Contents

2. Introduction
2.1 Scope
2.2 Purpose
2.3 Related Documents
3. Management Overview
4. Functional Characteristics
4.1 The HID Class
4.2 Subclass
4.3 Protocols
4.4 Interfaces
4.5 Device Limitations
5. Operational Model
5.1 Device Descriptor Structure
5.2 Report Descriptors
5.3 Generic Item Format
5.4 Item Parser
5.5 Usages
5.6 Reports
5.7 Strings
5.8 Format of Multibyte Numeric Values
5.9 Orientation
5.10 Null Values
6. Descriptors
6.1 Standard Descriptors
6.2 Class-Specific Descriptors
6.2.1 HID Descriptor
6.2.2 Report Descriptor
6.2.2.1 Items Types and Tags
6.2.2.2 Short Items
6.2.2.3 Long items
6.2.2.4 Main Items
6.2.2.5 Input, Output, and Feature Items
6.2.2.6 Collection, End Collection Items
6.2.2.7 Global Items
6.2.2.8 Local Items
6.2.2.9 Padding
6.2.3 Physical Descriptors
7. Requests
7.1 Standard Requests
7.1.1 Get_Descriptor Request
7.1.2 Set_Descriptor Request
7.2 Class-Specific Requests
7.2.1 Get_Report Request
7.2.2 Set_Report Request
7.2.3 Get_Idle Request
7.2.4 Set_Idle Request
7.2.5 Get_Protocol Request
7.2.6 Set_Protocol Request
8. Report Protocol
8.1 Report Types
8.2 Report Format for Standard Items
8.3 Report Format for Array Items
8.4 Report Constraints
8.5 Report Example
Appendix A: Usage Tags
Appendix B: Boot Interface Descriptors
B.1 Protocol 1 (Keyboard)
B.2 Protocol 2 (Mouse)
Appendix C: Keyboard Implementation
Appendix D: Example Report Descriptors
D.1 Example Joystick Descriptor
Appendix E: Example USB Descriptors for HID Class Devices
E.1 Device Descriptor
E.2 Configuration Descriptor
E.3 Interface Descriptor (Keyboard)
E.4 HID Descriptor (Keyboard)
E.5 Endpoint Descriptor (Keyboard)
E.6 Report Descriptor (Keyboard)
E.7 Interface Descriptor (Mouse)
E.8 HID Descriptor (Mouse)
E.9 Endpoint Descriptor (Mouse)
E.10 Report Descriptor (Mouse)
E.11 String Descriptors
Appendix F: Legacy Keyboard Implementation
F.1 Purpose
F.2 Management Overview
F.3 Boot Keyboard Requirements
F.4 Keyboard: Non-USB Aware System Design Requirements
F.5 Keyboard: Using the Keyboard Boot Protocol
Appendix G: HID Request Support Requirements
Appendix H: Glossary Definitions
0 of .
Results for:
No results containing your search query
P. 1
Hid

Hid

Ratings: (0)|Views: 15|Likes:
Published by pkdos

More info:

Published by: pkdos on Oct 30, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

02/24/2015

pdf

text

original

You're Reading a Free Preview
Pages 4 to 38 are not shown in this preview.
You're Reading a Free Preview
Pages 42 to 93 are not shown in this preview.
You're Reading a Free Preview
Page 97 is not shown in this preview.

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->