LEMON Manuals: Even more car manuals for everyone: 1960-2025
Home >> Jeep >> 2005 >> Liberty Limited, 2.8 5, Part Time >> Repair and Diagnosis >> Engine Performance >> System >> Powertrain Diagnostic Procedures - Diesel >> System Description And Functional Operation >> Functional Operation >> Skis Operation
April 5, 2026: LEMON Manuals is launched! Read the announcement.

Skis Operation

When ignition power is supplied to the SKIM, the SKIM performs an internal self-test. After the self-test is complete, the SKIM energizes the antenna (this activates the transponder chip) and sends a challenge to the transponder chip. The transponder chip responds to the challenge by generating an encrypted response message using the following: Secret Key - This is an electronically stored value (identification number) that is unique to each SKIS. The secret key is stored in the SKIM, ECM and all ignition key transponders.

Challenge - This is a random number that is generated by the SKIM at each ignition key cycle.

The secret key and challenge are the two variables used in the algorithm that produces the encrypted response message. The transponder uses the crypto algorithm to receive, decode and respond to the message sent by SKIM. After responding to the coded message, the transponder sends a transponder ID message to the SKIM. The SKIM compares the transponder ID message to the available valid key codes in SKIM memory (8 key maximum at any one time). After validating the ignition key, the SKIM sends a PCI Bus message called a seed request to the ECM, then waits for the ECM response. If the ECM does not respond, the SKIM will send the seed request again. After twenty failed attempts, the SKIM will stop sending the seed request and store a trouble code in memory. If the ECM sends a seed response, the SKIM sends a valid/invalid key message to the ECM. This is an encrypted message that is generated using the following:

The VIN and seed are two variables used in the rolling code algorithm that encrypts the valid/invalid key message. The ECM uses the rolling code algorithm to receive, decode and respond to the valid/invalid key message sent by the SKIM. After sending the valid/invalid key message, the SKIM waits 3.5 seconds for an ECM status message from the ECM. If the ECM does not respond with a valid key message to the SKIM, a fault is detected and a code is stored.

The SKIS incorporates a warning lamp located in the instrument cluster. The SKIS lamp is actuated when the SKIM sends a PCI Bus message to the instrument cluster requesting the lamp on, off or flashing.

The SKIM will request lamp operation for the following:

For all faults except transponder faults the lamp remains on steady. In the event of a transponder fault the lamp will flash at a rate of 1Hz (once per second). If a fault is present, the lamp will remain on or flashing for the complete ignition cycle. If a fault is stored in SKIM memory which prevents the system from operating properly, the ECM will allow the engine to start and idle for 2 seconds then stall. This may occur up to six times. After the sixth attempt, the ECM disables fuel delivery until the fault is corrected.