Service Manuals, User Guides, Schematic Diagrams or docs for : . Car Manuals Jeep Cherokee XJ 1997.1999-2001 Approved 2000 XJ Jeep Cherokee exj_8q
<< Back |
HomeMost service manuals and schematics are PDF files, so You will need Adobre Acrobat Reader to view : Acrobat Download
Some of the files are DjVu format. Readers and resources available here : DjVu Resources
For the compressed files, most common are zip and rar. Please, extract files with Your favorite compression software ( WinZip, WinRAR ... ) before viewing.
If a document has multiple parts, You should download all, before extracting.
Good luck. Repair on Your own risk. Make sure You know what You are doing.
Image preview - the first page of the document
>> Download exj_8q documenatation <<Text preview - extract from the documentXJ VEHICLE THEFT/SECURITY SYSTEMS 8Q - 1
VEHICLE THEFT/SECURITY SYSTEMS
TABLE OF CONTENTS
page page
GENERAL INFORMATION DIAGNOSIS AND TESTING
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . 1 SENTRY KEY IMMOBILIZER SYSTEM . . . . . . . . . 3
SENTRY KEY IMMOBILIZER SYSTEM . . . . . . . . . 1 SERVICE PROCEDURES
DESCRIPTION AND OPERATION SENTRY KEY IMMOBILIZER SYSTEM
SENTRY KEY IMMOBILIZER MODULE. . . . . . . . . 1 TRANSPONDER PROGRAMMING . . . . . . . . . . . 4
SENTRY KEY IMMOBILIZER TRANSPONDER . . . 2 REMOVAL AND INSTALLATION
SENTRY KEY IMMOBILIZER SYSTEM SENTRY KEY IMMOBILIZER MODULE. . . . . . . . . 4
INDICATOR LAMP . . . . . . . . . . . . . . . . . . . . . . . 3
GENERAL INFORMATION malfunction is detected. The SKIS can be diagnosed,
and any stored DTC can be retrieved using a
INTRODUCTION DRBIII scan tool as described in the proper Diag-
The Sentry Key Immobilizer System (SKIS) is nostic Procedures manual.
available factory-installed optional equipment for this
model. Following are some general descriptions of the DESCRIPTION AND OPERATION
features and components of the SKIS. Refer to the
vehicle owner's manual for more information on the
SENTRY KEY IMMOBILIZER MODULE
use and operation of the SKIS. Refer to 8W-30 - Fuel/
The Sentry Key Immobilizer Module (SKIM) con-
Ignition System in Group 8W - Wiring Diagrams for
tains a Radio Frequency (RF) transceiver and a cen-
complete circuit descriptions and diagrams.
tral processing unit, which includes the Sentry Key
Immobilizer System (SKIS) program logic. The SKIS
SENTRY KEY IMMOBILIZER SYSTEM programming enables the SKIM to program and
The Sentry Key Immobilizer System (SKIS) is
retain in memory the codes of at least one, but no
designed to provide passive protection against unau-
more than eight electronically coded Sentry Key
thorized vehicle use by preventing the engine from
transponders. The SKIS programming also enables
operating while the system is armed. The primary
the SKIM to communicate over the Chrysler Collision
components of this system are the Sentry Key Immo-
Detection (CCD) data bus network with the Power-
bilizer Module (SKIM), the Sentry Key transponder,
train Control Module (PCM), the instrument cluster
the SKIS indicator lamp, and the Powertrain Control
and/or the DRBIII scan tool.
Module (PCM).
The SKIM transmits and receives RF signals
The SKIM is installed on the steering column near
through a tuned antenna enclosed within a molded
the ignition lock cylinder. The transponder is located
plastic ring formation that is integral to the SKIM
under the molded rubber cap on the head of the igni-
housing. When the SKIM is properly installed on the
tion key. The SKIS indicator lamp is located in the
steering column, the antenna ring is oriented around
instrument cluster.
the circumference of the ignition lock cylinder hous-
The SKIS includes two valid Sentry Key transponders
ing. This antenna ring must be located within eight
from the factory. If the customer wishes, additional non-
millimeters (0.31 inches) of the Sentry Key in order
coded blank Sentry Keys are available. These blank
to ensure proper RF communication between the
keys can be cut to match a valid ignition key, but the
SKIM and the Sentry Key transponder.
engine will not start unless the key transponder is also
For added system security, each SKIM is pro-
programmed to the vehicle using the Customer Learn
grammed with a unique "Secret Key" code and a
programming procedure or a DRBIII scan tool. The
security code (PIN). The SKIM keeps the "Secret
SKIS will recognize no more than eight valid Sentry
Key" code in memory. This "Secret Key" code must be
Key transponders at any one time.
transferred to the PCM memory during the initializa-
The SKIS performs a self-test each time the igni-
tion/programming of the SKIS when the vehicle is
tion switch is turned to the On position, and will
manufactured, and each time the PCM is replaced
store Diagnostic Trouble Codes (DTCs) if a system
during vehicle service by the dealer technician. The
8Q - 2 VEHICLE THEFT/SECURITY SYSTEMS XJ
DESCRIPTION AND OPERATION (Continued)
SKIM also transfers the "Secret Key" code to the For diagnosis or initialization of the SKIM and the
memory of each of the Sentry Key transponders dur- PCM, a DRBIII scan tool and the proper Diagnostic
ing new key programming. The security code is used Procedures manual are required. The SKIM cannot
by the assembly plant to access the SKIS for initial- be repaired and, if faulty or damaged, the unit must
ization, or by the dealer technician to access the sys- be replaced.
tem for service. The SKIM also stores in its memory
the Vehicle Identification Number (VIN), which it SENTRY KEY IMMOBILIZER TRANSPONDER
learns through a CCD data bus message from the The Sentry Key Immobilizer System (SKIS) uses a
PCM during initialization. transponder that is integral to each of the two igni-
The SKIM and the PCM both use software that tion keys that are supplied with the vehicle when it
includes a rolling code algorithm strategy, which is shipped from the factory. The transponder chip is
helps to reduce the possibility of unauthorized SKIS insulated within a nylon mount inserted in the head
disarming. The rolling code algorithm ensures secu- of the key, and invisible beneath a molded rubber cap
rity by preventing an override of the SKIS through (Fig. 1).
the unauthorized substitution of the SKIM or the
PCM. However, the use of this strategy also means
that replacement of either the SKIM or the PCM
units will require a system initialization procedure to
restore system operation.
When the ignition switch is turned to the On or Start
positions, the SKIM transmits an RF signal to excite
the Sentry Key transponder. The SKIM then listens for
a return RF signal from the transponder of the Sentry
Key that is inserted in the ignition lock cylinder. If the
SKIM receives an RF signal with valid "Secret Key" and
transponder identification codes, the SKIM sends a
"valid key" message to the PCM over the CCD data bus.
If the SKIM receives an invalid RF signal or no
response, it sends "invalid key" messages to the PCM.
The PCM will enable or disable engine operation based
upon the status of the SKIM messages.
The SKIM also sends messages to the instrument
cluster over the CCD data bus network to control the Fig. 1 Sentry Key Immobilizer Transponder
SKIS indicator lamp. The SKIM sends messages to the 1
◦ Jabse Service Manual Search 2024 ◦ Jabse Pravopis ◦ onTap.bg ◦ Other service manual resources online : Fixya ◦ eServiceinfo