Detailed introduction:
The basic requirements for the use of Bluetooth HID devices are as follows:
1. It usually acts as a slave device (slave) in a micro network but can also function as a master device (master).
2. The keyboard must support authentication and encryption: only activates the working mode when required by the HID host; on the basis of authentication and encryption, it can also be selected by other HID hosts.
3.The limited service discovery mode is recommended: for a HID host, the HID terminal device is usually one-to-one; the HID terminal device is activated by keystrokes or power on.
4.As a slave device, it must always be connectable, such as the PC paging keyboard at startup, or the keyboard paging PC when there is data transmission.
5. The HID host must support QOS.
6.The HID host must support low power mode. Both the HID host and the HID terminal device must support breathing (sniff) working mode and dormant (park) working mode; keeping the working mode is necessary for the HID host and optional for the HID terminal device.
7.HID terminal devices only need to support data in DM1 format.
8.In addition to query mode and paging mode, interactive paging scanning mode and query scanning mode are also necessary.
9.There is no need to support SCO voice channels for single-function devices.
10. Devices that support binding must have some form of fixed memory to hold 128-bit authentication codes, and HID devices that use federated keys require more memory to support them than devices that use only single keys.