> Relays and Modules > Relays and Modules - Accessories and Optional Equipment > Alarm Module, (Vehicle Antitheft) > Component Information > Technical Service Bulletins > Page 22
Alarm Module: Description and Operation
Sentry Key Immobilizer (SKIM) Location
SENTRY KEY IMMOBILIZER MODULE(SKIM)
(SKIM) (RF)
(SKIS)
(PCI) (PCM)
The Sentry Key Immobilizer Module contains a Radio Frequency transceiver and a central processing unit, which includes theSentry Key Immobilizer System program logic. The SKIS programming enables the SKIM to program and retain in memory the codes ofat least two, but no more than eight electronically coded Sentry Key transponders. The SKIS programming also enables the SKIM to communicateover the Programmable Communication Interface bus network with the Powertrain Control Module , and/or the DRB III(R) scantool.
eight millimeters (0.31 inches)
The SKIM transmits and receives RF signals through a tuned antenna enclosed within a molded plastic ring formation that is integral to the SKIMhousing. When the SKIM is properly installed on the steering column, the antenna ring is oriented around the circumference of the ignition lockcylinder housing. This antenna ring must be located within of the Sentry Key in order to ensure proper RFcommunication between the SKIM and the Sentry Key transponder.
For added system security, each SKIM is programmed with a unique "Secret Key" code and a security code. The SKIM keeps the "Secret Key"code in memory. The SKIM also sends the "Secret Key" code to each of the programmed Sentry Key transponders. The security code is used bythe assembly plant to access the SKIS for initialization, or by the dealer technician to access the system for service. The SKIM also stores in itsmemory the Vehicle Identification Number (VIN), which it learns through a PCT bus message from the PCM during initialization.
The SKIM and the PCM both use software that includes a rolling code algorithm strategy, which helps to reduce the possibility of unauthorizedSKIS disarming. The rolling code algorithm ensures security by preventing an override of the SKIS through the unauthorized substitution of theSKIM or the PCM. However, the use of this strategy also means that replacement of either the SKIM or the PCM units will require a systeminitialization procedure to restore system operation.
When the ignition switch is turned to the ON or START positions, the SKIM transmits an RF signal to excite the Sentry Key transponder. TheSKIM then listens for a return RF signal from the transponder of the Sentry Key that is inserted in the ignition lock cylinder. If the SKIM receivesan RF signal with valid "Secret Key" and transponder identification codes, the SKIM sends a "valid key" message to the PCM over the PCI bus. Ifthe SKIM receives an invalid RF signal or no response, it sends "invalid key" messages to the PCM. The PCM will enable or disable engineoperation based upon the status of the SKIM messages.