Juan Jesús,
On Tue, Jan 13, 2009 at 5:03 PM, Juan Jesús García de Soria Lucena <[email protected]> wrote: > 2009/1/13 Juan Jesús García de Soria Lucena <[email protected]>: >> I attach the lsusb -v of the device at the end of the message. > > Excuse me for the spam, but I noticed I dumped the USB info with a > non-root account. This is the complete data: > > Bus 006 Device 002: ID 147e:1000 I have the exact same device, and would appreciate it very much if anyone managed to get it working :-) Unfortunately, I cannot program myself, but am ready to test patches, new code, or acquire logs of scanned fingers and so on. Whatever I can do. If you're serious about trying to reverse engineer this device, the libfprint wiki has some information on how to do sniffing [1]. If you look through this mailing list's archives [2], particularly of December and January, you'll find my posts with logs attached (and, like I said, I can arrange more logs if you need). Finally, you might want to take a look at the fingerprintGUI [3] application which uses either libfprint or, optionally, UPEK's binary BSAPI to make your device work under Linux. UPEK's binary support is very limited, and it would, indeed, be great if there were open source support available for this device so that it could be properly integrated with pam, GNOME and the whole shebang. Best way to use these drivers right now, would arguably be to use them in order to do some usb sniffing in Linux (instead of Windows). I really hope Daniel chimes in and offers to help you out ;-) All the best, Khashayar [1] http://reactivated.net/fprint/wiki/USB_sniffing [2] http://lists.reactivated.net/pipermail/fprint/ [3] http://www.n-view.net/Appliance//fingerprint/index.php _______________________________________________ fprint mailing list [email protected] http://lists.reactivated.net/mailman/listinfo/fprint
