Hello List,

I'm trying to reverse engineer a usb protocol. I'm interested in how
usb devices work in general. Is the communication always passive or
can devices actively request data or perform some sort of
authentification with the driver? I see patterns in the protocol as
well, is it possible that some devices require a "keep alive" signal?
I've also tried performing what seem to be requests in the snoopy
logs, but got inconsistent replies. Is usb communication in general
request/response or should i consider the device as a finite state
automaton, where a particular sequence of commands puts the device
into a certain state (possibly writing desired data to an endpoint)?
At the moment i have a few hundred pages of logs and before I get lost
in the details I thought I could ask for some advice. Does anyone have
any experience in reverse engineering usb protocols and can give me
some pointers? I could also put the logs online if someone's
interested in taking a look. The device is a Logitech IO2 digital pen.

Any help is much appreciated,
Rade

-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier.
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
Linux-usb-users@lists.sourceforge.net
To unsubscribe, use the last form field at:
https://lists.sourceforge.net/lists/listinfo/linux-usb-users

Reply via email to