Service Manuals, User Guides, Schematic Diagrams or docs for : . Car Manuals Jeep Cherokee XJ 1997.1999-2001 Approved 2000 XJ Jeep Cherokee exj_8qa

<< Back | Home

Most service manuals and schematics are PDF files, so You will need Adobre Acrobat Reader to view : Acrobat Download Some of the files are DjVu format. Readers and resources available here : DjVu Resources
For the compressed files, most common are zip and rar. Please, extract files with Your favorite compression software ( WinZip, WinRAR ... ) before viewing. If a document has multiple parts, You should download all, before extracting.
Good luck. Repair on Your own risk. Make sure You know what You are doing.




Image preview - the first page of the document
exj_8qa


>> Download exj_8qa documenatation <<

Text preview - extract from the document
XJ                                                                       VEHICLE THEFT/SECURITY SYSTEMS           8Q - 1



                        VEHICLE THEFT/SECURITY SYSTEMS
                                                TABLE OF CONTENTS

                                                           page                                                     page

DESCRIPTION AND OPERATION                                           SERVICE PROCEDURES
  SENTRY KEY IMMOBILIZER SYSTEM . . . . . . . . . 1                  SENTRY KEY IMMOBILIZER SYSTEM
  SENTRY KEY IMMOBILIZER MODULE. . . . . . . . . 1                     TRANSPONDER PROGRAMMING . . . . . . . . . . . 3
  SENTRY KEY IMMOBILIZER TRANSPONDER . . . 2                        REMOVAL AND INSTALLATION
  SENTRY KEY IMMOBILIZER SYSTEM                                      SENTRY KEY IMMOBILIZER MODULE. . . . . . . . . 4
   INDICATOR LAMP . . . . . . . . . . . . . . . . . . . . . . . 2
DIAGNOSIS AND TESTING
  SENTRY KEY IMMOBILIZER SYSTEM . . . . . . . . . 3

DESCRIPTION AND OPERATION                                           more than eight electronically coded Sentry Key
                                                                    transponders. The SKIS programming also enables
SENTRY KEY IMMOBILIZER SYSTEM                                       the SKIM to communicate over the Chrysler Collision
   The Sentry Key Immobilizer System (SKIS) is                      Detection (CCD) data bus network with the Power-
designed to provide passive protection against unau-                train Control Module (PCM), the instrument cluster
thorized vehicle use by preventing the engine from                  and/or the DRB scan tool.
operating. The primary components of this system                       The SKIM transmits and receives RF signals
are the Sentry Key Immobilizer Module (SKIM), the                   through a tuned antenna enclosed within a molded
Sentry Key transponder, the SKIS indicator lamp,                    plastic ring formation that is integral to the SKIM
and the Powertrain Control Module (PCM).                            housing. When the SKIM is properly installed on the
   The SKIM is installed on the steering column near                steering column, the antenna ring is oriented around
the ignition lock cylinder. The transponder is located              the circumference of the ignition lock cylinder hous-
under the molded rubber cap on the head of the igni-                ing. This antenna ring must be located within eight
tion key. The SKIS indicator lamp is located in the                 millimeters (0.31 inches) of the Sentry Key in order
instrument cluster.                                                 to ensure proper RF communication between the
   The SKIS includes two valid Sentry Key transpon-                 SKIM and the Sentry Key transponder.
ders from the factory. If the customer wishes, addi-                   For added system security, each SKIM is pro-
tional non-coded blank Sentry Keys are available.                   grammed with a unique "Secret Key" code and a
These blank keys can be cut to match a valid ignition               security code. The SKIM keeps the "Secret Key" code
key, but the engine will not start unless the key tran-             in memory and sends the code over the CCD data
sponder is also programmed to the vehicle. The SKIS                 bus to the PCM, which also keeps this code in its
will recognize no more than eight valid Sentry Key                  memory. The SKIM also sends the "Secret Key" code
transponders at any one time.                                       to each of the programmed Sentry Key transponders.
   The SKIS performs a self-test each time the igni-                The security code is used by the assembly plant to
tion switch is turned to the On position, and will                  access the SKIS for initialization, or by the dealer
store Diagnostic Trouble Codes (DTCs) if a system                   technician to access the system for service. The
malfunction is detected. The SKIS can be diagnosed,                 SKIM also stores in its memory the Vehicle Identifi-
and any stored DTC can be retrieved using a DRB                     cation Number (VIN), which it learns through a CCD
scan tool as described in the proper Diagnostic Pro-                data bus message from the PCM during initializa-
cedures manual.                                                     tion.
                                                                       The SKIM and the PCM both use software that
SENTRY KEY IMMOBILIZER MODULE                                       includes a rolling code algorithm strategy, which
  The Sentry Key Immobilizer Module (SKIM) con-                     helps to reduce the possibility of unauthorized SKIS
tains a Radio Frequency (RF) transceiver and a cen-                 disarming. The rolling code algorithm ensures secu-
                                                                    rity by preventing an override of the SKIS through
tral processing unit, which includes the Sentry Key
Immobilizer System (SKIS) program logic. The SKIS                   the unauthorized substitution of the SKIM or the
                                                                    PCM. However, the use of this strategy also means
programming enables the SKIM to program and
                                                                    that replacement of either the SKIM or the PCM
retain in memory the codes of at least two, but no
8Q - 2    VEHICLE THEFT/SECURITY SYSTEMS                                                                      XJ
DESCRIPTION AND OPERATION (Continued)
units will require a system initialization procedure to
restore system operation.
   When the ignition switch is turned to the On or
Start positions, the SKIM transmits an RF signal to
excite the Sentry Key transponder. The SKIM then
listens for a return RF signal from the transponder
of the Sentry Key that is inserted in the ignition lock
cylinder. If the SKIM receives an RF signal with
valid "Secret Key" and transponder identification
codes, the SKIM sends a "valid key" message to the
PCM over the CCD data bus. If the SKIM receives
an invalid RF signal or no response, it sends "invalid
key" messages to the PCM. The PCM will enable or
disable engine operation based upon the status of the
SKIM messages.
   The SKIM also sends messages to the instrument
cluster over the CCD data bus network to control the
SKIS indicator lamp. The SKIM sends messages to                   Fig. 1 Sentry Key Immobilizer Transponder
the instrument cluster to turn the lamp on for about      1   



◦ Jabse Service Manual Search 2024 ◦ Jabse PravopisonTap.bg ◦ Other service manual resources online : FixyaeServiceinfo