may be required in all cases of an inoperative lamp.
This will require removal of the cluster and bulb in
question.
3.3.5.3
CCD Controlled Lamps
The cluster contains several CCD controlled
lamps as described earlier. These lamps are part of
the diagnostic self-test. When entering the self-test
mode, operation of these lamps can be observed. If
the bulb fails to operate during the self-test and the
bulb filament is good, the cluster assembly will
need to be replaced.
3.4
REMOTE KEYLESS ENTRY (RKE)
The Remote Keyless Entry (RKE) module is in
the overhead console or in the dome lamp assembly.
It operates on a RF signal, which makes it less
dependent on the aiming of the transmitter. When
an unlock signal is received (from a transmitter),
the module will ground the unlock control circuit,
therefore actuating the passenger door module and
at the same time grounding the courtesy lamps
driver circuit, actuating the illuminated entry. The
RKE module is capable of retaining four individual
vehicle access codes (four transmitters). This sys-
tem incorporates a rolling code feature. A horn chirp
feature is also part of this system and is customer
programmable.
The RKE module has some DRBIII
t functions. The
Door Lock, Door Unlock, Horn and Illuminated Entry
can be actuated. The horn and illuminated entry
activation time is adjustable using the DRBIII
t. The
DRBIII
t can also turn the horn chirp and illuminated
entry on and off.
The XJ will be shipped with the horn chirp
enabled. It can be deactivated manually using the
following procedure: Press and hold the LOCK
button on the transmitter for 5-10 seconds, and
then while the LOCK button is pressed, press and
release the UNLOCK button. The horn chirp fea-
ture can be reactivated by repeating the procedure.
3.4.1
PROGRAMMING AN RKE
TRANSMITTER
Programming a transmitter can be accomplished
using the DRBIII
t. Using the DRBIIIt select “Theft
Alarm,” “VTSS” (even though “Vehicle Theft Secu-
rity System” is not available for this vehicle) then
“Miscellaneous” then “Programming RKE”. Select a
transmitter (1 - 4). The locks will cycle to verify you
are in programming mode. Press the unlock button
on the transmitter. The locks will cycle again to
verify programming has taken place. When you
program to a position, that code will overwrite the
code that was in that position and because you have
no way of knowing if a valid code was there or not,
it is recommended that whenever it is necessary to
program a transmitter, all transmitters that are to
be used with that vehicle should be programmed at
that time.
3.4.2
SYNCHRONIZATION (ROLLING
CODE) BUTTON TRANSMITTERS
The transmitter will go out of synchronization if
the button is pressed more than 128 times outside
of the range of the receiver. In other words the
transmitter will not unlock the doors. The transmit-
ter will go out of synchronization if the batteries are
removed and replaced. To synchronize the code of
the particular transmitter with the receiver, press
and hold the “lock” button while within the receiver
range.
3.5
SENTRY KEY IMMOBILIZER SYSTEM
(SKIS)
The Sentry Key Immobilizer System (SKIS) is an
immobilizer system designed to prevent unautho-
rized vehicle operation. The system consists of a
Sentry Key Immobilizer Module (SKIM), ignition
key(s) equipped with a transponder chip and engine
controller. When the ignition switch is turned on,
the SKIM interrogates the ignition key. If the igni-
tion key is “Valid” the SKIM sends a CCD Bus
message to the engine controller indicating the
presence of a valid ignition key. Upon receiving a
“Valid” key signal the PCM will allow the engine to
continue to operate.
3.5.1
SKIS OPERATION
When ignition power is supplied to the SKIM, the
SKIM performs an internal self-test. After the self-
test is completed, the SKIM energizes the antenna
(this activates the transponder chip) and sends a
challenge to the transponder chip. The transponder
chip responds to the challenge by generating an
encrypted response message using the following:
Secret Key — This an electronically stored value
(identification number) that is unique to each SKIS.
The secret key is stored in the SKIM, PCM and all
ignition key transponders.
Challenge — This is a random number that is
generated by the SKIM at each ignition key cycle.
The secret key and challenge are plugged into an
algorithm that produces the encrypted response
message. The transponder uses the crypto algo-
rithm to receive, decode and respond to the message
sent by SKIM. After responding to the coded mes-
sage, the transponder sends a transponder I.D.
message to the SKIM. The SKIM compares the
transponder I.D. to the available valid key codes in
SKIM memory (8 key maximum). After validating
the key the SKIM sends a CCD Bus message called
8
GENERAL INFORMATION