CY4672 Reference Design Guide, Document # 001-16968 Revision ** 3
Contents
1. Introduction 9
1.1 Scope...........................................................................................................................9
1.2 Chapter Overviews .....................................................................................................9
1.3 Support ........................................................................................................................9
1.4 Conventions...............................................................................................................10
1.4.1 Definitions ......................................................................................................10
1.4.2 Acronyms .......................................................................................................10
2. WirelessUSB™ Protocol 2.2 13
2.1 General Overview ......................................................................................................13
2.1.1 Radio Channel Management .........................................................................13
2.1.2 Pseudo Noise Codes .....................................................................................13
2.1.3 Chip Error Correction .....................................................................................14
2.1.4 Automatic Acknowledgment (AutoACK).........................................................14
2.1.5 Network ID .....................................................................................................14
2.1.6 Manufacturing ID............................................................................................14
2.1.7 Channel Selection Algorithm..........................................................................15
2.2 Protocol Modes..........................................................................................................15
2.2.1 Ping Mode (Bridge Only)................................................................................16
2.2.2 Idle Mode (HID only) ......................................................................................17
2.2.3 Reconnect Mode (HID only)...........................................................................17
2.2.4 Button Bind Mode...........................................................................................17
2.2.5 Enhanced KISSBind™...................................................................................18
2.2.6 Unbind............................................................................................................20
2.2.7 Data Mode......................................................................................................20
2.2.8 Back Channel Data Support...........................................................................20
2.2.9 Dynamic Data Rate and Dynamic PA.............................................................22
2.3 Packet Structures ......................................................................................................23
2.3.1 Bind/KISSBind Request Packet (HID) ...........................................................23
2.3.2 Bind Response Packet (Bridge) ....................................................................24
2.3.3 Connect Request (HID)..................................................................................24
2.3.4 Connect Response Packet (Bridge)...............................................................24
2.3.5 Ping Packet (Bridge) .....................................................................................25
2.3.6 Data Packet/Back Channel Data Packet (Bridge and HID)............................25
2.4 Bind and Reconnect Timing.......................................................................................26
2.5 Signature Byte ...........................................................................................................28
2.6 Encryption .................................................................................................................29
2.6.1 TEA Encryption ..............................................................................................29
2.6.1.1 TEA Key Management over WirelessUSB.......................................29
2.6.2 AES Encryption..............................................................................................30
2.6.2.1 AES Key Management.....................................................................31
2.6.3 Encryption and Power Consumption Trade Off..............................................31
[+] Feedback