Robert Bosch VIMA01 SMARTRA III IMMOBILIZER User Manual Appendix H

Robert Bosch (Australia) Pty Ltd SMARTRA III IMMOBILIZER Appendix H

USERS MANUAL

Download: Robert Bosch VIMA01 SMARTRA III IMMOBILIZER User Manual Appendix H
Mirror Download [FCC.gov]Robert Bosch VIMA01 SMARTRA III IMMOBILIZER User Manual Appendix H
Document ID774240
Application IDuBWjM4UVlZOiLY53htr9lg==
Document DescriptionUSERS MANUAL
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize296.49kB (3706139 bits)
Date Submitted2007-03-29 00:00:00
Date Available2007-03-30 00:00:00
Creation Date2007-03-26 15:59:24
Producing SoftwareAcrobat Distiller 6.0 (Windows)
Document Lastmod2007-03-29 15:22:33
Document TitleMicrosoft Word - Appendix H - User Manual.doc
Document CreatorPScript5.dll Version 5.2
Document Author: donna3

FCC ID: LXP-VIMA01
(IC: 2298A-VIMA01)
Report No. M070149_Cert_Immobiliser
APPENDIX H
USER MANUAL
EMC Technologies Pty Ltd – 176 Harrick Road, Keilor Park VIC 3042 Australia
www.emctech.com.au
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 1 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
By
RBAU-EB/EBS2-JL
RBAU-EB/EBS2-VA
RBAU-EB/EBS2
Drawn
Checked
Approved
1.
Date
03/10/06
03/10/06
03/10/06
Signature
ALTERATION LIST
Issue
Alteration Number, Description
No.
1.0 New Specification for ABIC1 Solution
Valid From
03/10/06
By
Checked
EBS2/JL
“WARNING: ANY CHANGES OR MODIFICATIONS NOT EXPRESSIVELY APPROVED BY ROBERT BOSCH
(AUSTRALIA) PTY LTD COULD VOID THE USER’S AUTHORITY TO OPERATE THIS EQUIPMENT.
THIS DEVICE COMPLIES WITH PART 15 OF THE FCC RULES. OPERATION
IS SUBJECT TO THE FOLLOWING TWO CONDITIONS: (1) THIS DEVICE MAY
NOT CAUSE HARMFUL INTERFERENCE, AND (2) THIS DEVICE MUST
ACCEPT ANY INTERFERENCE RECEIVED, INCLUDING INTERFERENCE THAT
MAY CAUSE UNDESIRED OPERATION.
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 2 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
TABLE OF CONTENTS
1.
ALTERATION LIST ..........................................................................................................................................................1
2.
TABLE OF CONTENTS ....................................................................................................................................................2
3.
APPLICABLE DOCUMENTS ..........................................................................................................................................5
4.
INTRODUCTION ...............................................................................................................................................................5
4.1.1
Immobiliser Background ..........................................................................................................................................5
4.1.1.1
Model : Proposed Smartra3................................................................................................................................................5
4.1.2 Document description...............................................................................................................................................6
4.1.3 Diagram: Smartra communications interfaces ........................................................................................................6
4.2
EMS TO SMARTRA COMMUNICATIONS DESCRIPTION (OSI MODEL):.............................................................................7
4.2.1 Diagram: OSI model ................................................................................................................................................7
4.2.1.1
4.2.2
4.2.3
4.2.4
Requirements from customer .............................................................................................................................................8
Proposed Solution ....................................................................................................................................................8
Diagram Showing Proposed Design:.......................................................................................................................8
States of the smartra.................................................................................................................................................9
4.2.4.1
State transition Diagram: ...................................................................................................................................................9
4.2.4.1.1 States:............................................................................................................................................................................9
4.2.4.1.2 State Transitions: ..........................................................................................................................................................9
4.2.5
4.2.6
System security .......................................................................................................................................................10
Secret Encryption Key (SEK) Learning..................................................................................................................10
4.2.6.1
4.3
4.4
5.
Diagram: Secret Key learning flow .................................................................................................................................10
ASSUMPTIONS MADE ...................................................................................................................................................12
REFERENCES ................................................................................................................................................................12
MESSAGE STRUCTURE BETWEEN EMS AND SMARTRA ..................................................................................13
5.1.1 Data Packet Breakdown.........................................................................................................................................13
5.2
06H - ACKNOWLEDGE..................................................................................................................................................14
5.3
53H - SOFTWARE VERSION. .........................................................................................................................................14
5.4
4BH - TRANSPONDER IDE (PRE ID MATCHING) .........................................................................................................15
5.4.1 0x4B – (Existing) Pre Secret Encryption Key – kept for backwards compatibility ................................................15
5.4.2 0x4B – New – Secret Encryption Key – with Encryption check. ............................................................................15
5.5
41H - TRANSPONDER AUTHENTICATION. .....................................................................................................................16
5.6
57H - TRANSPONDER WRITE EEPROM PAGE. ............................................................................................................16
5.7
52H - TRANSPONDER READ EEPROM PAGE ...............................................................................................................16
5.8
4EH – NEUTRALISE A [LEARNT] SMARTRA ..................................................................................................................17
5.9
54H – TEACH SMARTRA ...............................................................................................................................................17
5.10
15H - NEGATIVE RESPONSES........................................................................................................................................18
6.
MESSAGE FLOW BETWEEN EMS, SMARTRA AND TRANSPONDER...............................................................19
6.1
BACKGROUND .............................................................................................................................................................19
6.1.1 Starting Communications .......................................................................................................................................19
6.1.2 Stopping Communications......................................................................................................................................19
6.1.3 (Re)Teaching Mode ................................................................................................................................................19
6.1.3.1
6.2
Diagram: Explaining how to read message flow diagrams ..............................................................................................19
MESSAGE FLOW 1 - NORMAL OPERATION ...................................................................................................................20
6.2.1.1
6.2.1.2
Message Sequence ...........................................................................................................................................................20
Message Flow Detail .......................................................................................................................................................20
6.2.2 Message Flow Diagram: ........................................................................................................................................20
6.3
MESSAGE FLOW 2 – TWICE IG ON OR AUTHENTICATION MODE..................................................................................21
6.3.1.1
6.3.1.2
Message Sequence ...........................................................................................................................................................21
Message Flow Detail .......................................................................................................................................................21
6.3.2 Message Flow Diagram: ........................................................................................................................................21
6.4
MESSAGE FLOW 3 – TWICE IG ON OR AUTHENTICATION MODE..................................................................................22
6.4.1.1
Issue Number:
Message Sequence ...........................................................................................................................................................22
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 3 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
6.4.1.2
Message Flow Detail .......................................................................................................................................................22
6.4.2 Message Flow Diagram: ........................................................................................................................................22
6.5
MESSAGE FLOW 4 - TWICE IG ON OR AUTHENTICATION MODE ..................................................................................23
6.5.1.1
6.5.1.2
Message Sequence ...........................................................................................................................................................23
Message Flow Detail .......................................................................................................................................................23
6.5.2 Message Flow Diagram: ........................................................................................................................................23
6.6
MESSAGE FLOW 5 - TWICE IG ON OR AUTHENTICATION MODE ..................................................................................24
6.6.1.1
6.6.1.2
Message Sequence ...........................................................................................................................................................24
Message Flow Detail .......................................................................................................................................................24
6.6.2 Message Flow Diagram: ........................................................................................................................................24
6.7
MESSAGE FLOW 6 - TWICE IG ON OR AUTHENTICATION MODE ..................................................................................25
6.7.1.1
6.7.1.2
Message Sequence ...........................................................................................................................................................25
Message Flow Detail .......................................................................................................................................................25
6.7.2 Message Flow Diagram: ........................................................................................................................................25
6.8
MESSAGE FLOW 7 - TWICE IG ON OR AUTHENTICATION MODE ..................................................................................26
6.8.1.1
6.8.1.2
Message Sequence ...........................................................................................................................................................26
Message Flow Detail .......................................................................................................................................................26
6.8.2 Message Flow Diagram: ........................................................................................................................................26
6.9
MESSAGE FLOW 8 – TWICE IG ON OR AUTHENTICATION MODE..................................................................................27
6.9.1.1
6.9.1.2
Message Sequence ...........................................................................................................................................................27
Message Flow Detail .......................................................................................................................................................27
6.9.2 Message Flow Diagram: ........................................................................................................................................27
6.10
MESSAGE FLOW 9 – TWICE IG ON OR AUTHENTICATION MODE..................................................................................28
6.10.1.1
6.10.1.2
Message Sequence ...........................................................................................................................................................28
Message Flow Detail .......................................................................................................................................................28
6.10.2
Message Flow Diagram:....................................................................................................................................28
6.11
MESSAGE FLOW 10 – MISSING TRANSPONDER ............................................................................................................29
6.11.1.1
6.11.1.2
Message Sequence ...........................................................................................................................................................29
Message Flow Detail .......................................................................................................................................................29
6.11.2
Message Flow Diagram:....................................................................................................................................29
6.12
MESSAGE FLOW 11 - TRANSPONDER TEACHING OR RETEACHING MODE ....................................................................30
6.12.1.1
6.12.1.2
Message Sequence ...........................................................................................................................................................30
Message Flow Detail .......................................................................................................................................................30
6.12.2
Message Flow Diagram:....................................................................................................................................30
6.13
MESSAGE FLOW 12 - TRANSPONDER TEACHING OR RE-TEACHING MODE ...................................................................31
6.13.1.1
6.13.1.2
Message Sequence ...........................................................................................................................................................31
Message Flow Detail .......................................................................................................................................................31
6.13.2
Message Flow Diagram:....................................................................................................................................31
6.14
MESSAGE FLOW 13 – TRANSPONDER TEACHING OR RE-TEACHING MODE ..................................................................32
6.14.1.1
6.14.1.2
Message Sequence ...........................................................................................................................................................32
Message Flow Detail .......................................................................................................................................................32
6.14.2
Message Flow Diagram:....................................................................................................................................32
6.15
MESSAGE FLOW 14 – TRANSPONDER TEACHING OR RE-TEACHING MODE ..................................................................33
6.15.1.1
6.15.1.2
Message Sequence ...........................................................................................................................................................33
Message Flow Detail .......................................................................................................................................................33
6.15.2
Message Flow Diagram:....................................................................................................................................33
6.16
MESSAGE FLOW 15 – TRANSPONDER TEACHING OR RE-TEACHING MODE ..................................................................34
6.16.1.1
6.16.1.2
Message Sequence ...........................................................................................................................................................34
Message Flow Detail .......................................................................................................................................................34
6.16.2
Message Flow Diagram:....................................................................................................................................34
6.17
MESSAGE FLOW 16: – TRANSPONDER TEACHING OR RE-TEACHING MODE .................................................................35
6.17.1.1
6.17.1.2
Message Sequence ...........................................................................................................................................................35
Message Flow Detail .......................................................................................................................................................35
6.17.2
Message Flow Diagram:....................................................................................................................................35
6.18
MESSAGE FLOW 17: –MISS-MATCHED SECRET KEY .....................................................................................................36
6.18.1.1
6.18.1.2
Message Sequence ...........................................................................................................................................................36
Message Flow Detail .......................................................................................................................................................36
6.18.2
Message Flow Diagram:....................................................................................................................................36
6.19
MESSAGE FLOW 18: – OLD EMS WITH A NEW LEARNT SMARTRA ...............................................................................37
6.19.1.1
6.19.1.2
Issue Number:
Message Sequence ...........................................................................................................................................................37
Message Flow Detail .......................................................................................................................................................37
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 4 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
6.19.2
Message Flow Diagram:....................................................................................................................................37
6.20
MESSAGE FLOW 19: – OLD EMS WITH A VIRGIN SMARTRA.........................................................................................38
6.20.1.1
6.20.1.2
Message Sequence ...........................................................................................................................................................38
Message Flow Detail .......................................................................................................................................................38
6.20.2
Message Flow Diagram:....................................................................................................................................38
6.21
MESSAGE FLOW 20: – OLD SMARTRA WITH A NEW EMS ............................................................................................39
6.21.1.1
6.21.1.2
Message Sequence ...........................................................................................................................................................39
Message Flow Detail .......................................................................................................................................................39
6.21.2
Message Flow Diagram:....................................................................................................................................39
6.22
SUMMARY TABLES : MESSAGE FLOW SUMMARY ........................................................................................................40
6.22.1
Table: Normal Message Flow............................................................................................................................40
6.22.2
Table: Twice IG ON or Authentication..............................................................................................................40
6.22.3
Table: All modes missing transponder...............................................................................................................40
6.22.4
Table: Transponder (Re)teaching mode ............................................................................................................41
6.22.5
Table: Special cases...........................................................................................................................................41
7.
REPLACING OF SYSTEM COMPONENTS................................................................................................................42
7.1
REPLACING THE ENGINE MANAGEMENT SYSTEM (EMS) ECU....................................................................................42
7.1.1 Equipment required to replace the EMS in immo system.......................................................................................42
7.1.2 Process Flow Chart: Replacing Engine Management System EMS ......................................................................43
7.2
REPLACING THE SMARTRA ECU..................................................................................................................................43
7.2.1 Equipment required to replace a Smartra unit in immo system .............................................................................43
7.2.2 Process Flow Chart : Replacing Smartra ..............................................................................................................44
7.3
REPLACING KEYS (TRANSPONDERS) ............................................................................................................................44
7.3.1 Process Flow Chart : Replacing/Adding Keys .......................................................................................................44
7.4
REPLACING ANTENNA .................................................................................................................................................44
8.
DIAGNOSTIC TESTER REQUIREMENTS.................................................................................................................45
8.1.1
8.1.2
8.1.3
Diagnostic Tester Introduction ..............................................................................................................................45
The Diagnostics tester interface diagram: .............................................................................................................45
Programming Diagnostic PIN Number DPN (on the Smartra) .............................................................................45
8.1.3.1
8.1.3.2
8.1.3.3
8.1.4
8.1.5
8.1.6
Aftermarket PIN number sequence: .......................................................................................................................47
Changing Diagnostic PIN Number (DPN) on Smartra..........................................................................................47
Accessing diagnostic functions...............................................................................................................................48
8.1.6.1
8.1.6.2
Issue Number:
Message Flow Diagram (Programming Diagnostic PIN – both Smartra and EMS) ........................................................46
Message Flow Diagram (Programming Diagnostic PIN – EMS......................................................................................46
Message Flow Diagram (Programming Diagnostic PIN – Smartra) ................................................................................47
Message Flow Diagram (Changing State – correct PIN) .................................................................................................48
Message Flow Diagram (Changing Smartra State – in-correct PIN) ...............................................................................49
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 5 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
2.
APPLICABLE DOCUMENTS
Applicable Standards
F005VP0800
F005VP0702
F005VP0703
F005VS0115
3.
Title
HMC SMARTRA 3 Product Spec
HMC SMARTRA 3 Engineering Test Spec
HMC SMARTRA 3 Production Test Spec
HMC SMARTRA 3 Sales Drawing
INTRODUCTION
3.1.1 Immobiliser Background
The Smartra3 immobiliser unit, known as the SMARt TRansponder Antenna (SMARTRA) will need to be
updated as a result of new requirements. The SMARTRA3 will be an update of an existing product.
The existing immobiliser system consisted of a passive challenge-response (mutual authentication)
transponder inside the key head and the SMARTRA unit. The SMARTRA communicates to a Control
Unit (CU) via a dedicated communications line.
3.1.1.1 Model : Proposed Smartra3
This design will use a different microcontroller with on board non-volatile memory and combined voltage
regulator and LIN transceiver system basis chip.
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 6 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
3.1.2 Document description
This document shall focus on the communications protocol between the Smartra and the Engine
Management System (EMS). The existing protocol has been used with two new messages added and
existing messages modified. The changes are required due to additional customer requirements.
The document shall present:
• Project background, requirements and proposed design.
• Message Structure between the EMS and Smartra.
• Message Flow charts: EMS to Transponder (via Smartra) considering different device states.
• Replacing immobiliser system components
• Diagnostic tester interface.
3.1.3 Diagram: Smartra communications interfaces
Transponder
EMS
Smartra
single w ire
asynch bi-dir
comms
4800baud
Low Frequency w ireless link
125kHz ASK
(com m s m aster)
This document
focusses on Smartra
to EMS interface
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 7 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
3.2 EMS to Smartra Communications Description (OSI model):
The communications between the EMS and the Smartra can be better described using the 7 layer OSI
model. The below diagram shows different levels of the interface in reference to the OSI model. It
describes the Physical layer the Data Link Layer and the Application Layer.
3.2.1 Diagram: OSI model
Application
Layer
EMS Action Messages:
06h (ACK) Acknow ledge
53h (ASCII 'S') Softw are version
Presentation 4Bh (ASCII 'K') Transponder IDE *
Layer
41h (ASCII 'A') Transponder Authentication (Additional info for ID Matching)
57h (ASCII 'W') Transponder Write EEPROM page
52H (ASCII 'R')
Transponder Read EEPROM page
Session
4Eh (ASCII ‘N’) Neutralise a Taught Smartra **
Layer
54h (ASCII ‘T’) Teach Smartra **
15h (ASCII nak) Negative response *
Transport
Layer
Network
Layer
Data Link
Layer
For every message sent to the SMARTRA from the CU there w ill be a response from the
SMARTRA unit. Only one command can be sent at a time to the SMARTRA unit.
A negative response to any command is possible.
* - modified message
** - new message
The protocol betw een the Control Unit (CU) and the SMARTRA is defined as :Address
Length
Action
Data
CS
The protocol betw een the SMARTRA and the CU is defined as :Address
Length
Data
CS
1 start bit-low , 8 data bits, no parity, 2 stop bits-high.
Idle
Physical
Layer
Issue Number:
Start
Bit 1
bit
Data
8 bits
Stop bit
2 bits
Idle
Dedicated single wire between Immobiliser and Control Unit.
Bi-directional Asynchronous Communications @ 4800 baud
Logic Low = 0V, Logic High = 12V, Idle State High
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 8 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
3.2.1.1 Requirements from customer
Requirements for the new Smartra:
• automobile to be Thatcham Compliant to withstand attack on car for >300secs.
• Product required to be backward compatible with existing system.
Current system :
• Engine Management System (EMS) ECU can be replaced easily and car can be started <300secs
with matching transponders.
• Smartra is transparent ie. passes messages to and from the EMS and transponder (no memory).
3.2.2 Proposed Solution
•
•
•
•
•
•
To meet new customer requirements the EMS and the Smartra shall be matched together using the
same Secret Encryption Key (SEK).
The Secret Encryption Key (SEK) is generated and taught to the Smartra and EMS at the OEM end
of line tester.
The EMS and Smartra will generate the Secret Encryption Key (SEK) from a common 9 byte
Diagnostic PIN Number (DPN) unique for each car (ie. use 6 bytes from Diagnostic PIN Number
(DPN)). See section 3.2.6.
The Secret Encryption Key (SEK) will be used during all communications between the EMS and the
Smartra to ensure that the EMS and Smartra are matched.
To test if the units are matched:
o The EMS generates a Random Number and passes to the Smartra.
o Smartra encrypts the Random Number using the Secret Encryption Key(SEK) and passes
back the encrypted value to the EMS.
o EMS encrypts the random number using its Secret Encryption Key(SEK) and then evaluates
if the Smartra response is the same as the EMS encryption.
Thieves need to replace the EMS, Smartra and Transponder to steal the car. The Smartra shall be
placed in a difficult to get to position in the car (increase time to replace).
3.2.3 Diagram Showing Proposed Design:
Automobile Assy
SMARTRA
Diagnostic
Tester
EMS
transponder
Single Wire
Comms
LF interface
Issue Number:
1.0
Dev No.
3881
Valid from:
Single Wire
Comms
14/2/06
Security Pin No. to access the
EM S and Smartra
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 9 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
3.2.4 States of the smartra
With the new proposed Design the Smartra shall have 3 states ([Virgin] and [Neutral] states behave the
same).
3.2.4.1 State transition Diagram:
Learnt
Virgin
(follow s new
protocolSm artra3)
(follow s old
protocolSm artra2)
Neutral
(follow s old
protocolSm artra2)
3.2.4.1.1 States:
[Virgin]
– virgin product after EOL testing.
[Neutral]
– part has Diagnostic PIN Number(DPN) and Secret Encryption Key(SEK) cleared using
diagnostic tester so it can go into [Learnt] state again.
[Learnt]
– part has been taught a Diagnostic PIN Number(DPN) at the OEM end of line tester or
using diagnostic tester in the field. Secret Encryption Key(SEK) is generated from the
Diagnostic PIN Number(DPN). (refer to 3.2.6)
3.2.4.1.2 State Transitions:
1) Smartra is taught the Diagnostic PIN Number(DPN) and generates the Secret Encryption Key(SEK).
2) Diagnostic Tester Places Smartra into Neutral Mode when correct DPN has been entered.
* Note : For backwards compatibility a [virgin] or [neutral] Smartra3 will function as a Smartra2 until unit
is placed into [learnt] state.
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 10 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
3.2.5 System security
If a thief replaces the Smartra with a virgin Smartra the car will not start as the virgin Smartra does not
match the EMS.
If a thief replaces three components with a matching set (Transponder, Smartra and EMS) then by
breaking lock barrel the car can start. The car will start however the period of time to replace the
Smartra takes time ie. longer than 5 minutes to pass the Thatcham attack test. Refer to section 3.4 –
References.
A thief could steal a car in a short time if they have access to a Diagnostic Tester and a ECU with his
corresponding Diagnostic PIN Number (DPN) then the thief can steal the car by:
a. replacing the EMS with a matching EMS and transponder set.
b. use Diagnostic Tester to neutralise the Smartra3, using the secure HMC Diagnostic PIN Number
(DPN) of EMS.
c. use Diagnostic Tester to program the new Diagnostic PIN Number (DPN) that matches the thiefs
EMS Diagnostic PIN Number (DPN).
The security of the system depends on the security of the DPN.
3.2.6 Secret Encryption Key (SEK) Learning
•
•
•
•
The EMS and Smartra will generate the Secret Encryption Key (SEK).
Secret Encryption Key (SEK) is generated from the first 6 bytes of the 9 byte Diagnostic PIN Number
(DPN).
The DPN is taught to the Smartra and EMS at the OEM end of line tester or in the field.
The encryption algorithm requires each of the 6 SEK bytes to be an uneven number between 3 and
253.
o Therefore both the EMS and Smartra will use the same function that will check value of PIN
and adjust each byte of the Secret Encryption Key (SEK) accordingly:
• If DPN byte is <3 or >253 then SEK byte = 0x55.
• Else If DPN byte is even then SEK byte = DPN byte – 1.
• Else SEK byte = DPN byte.
3.2.6.1 Diagram: Secret Key learning flow
Automobile Assy
SMARTRA
EMS
Diagnostic Tester
T r ansp o nd er
0 x XXXXXXXXXXX
0 x XXXXXXXXXXX
0 x XXXXXXXXXXXXXXXX
0 x XXXXXXXXXXXXXXXX
0 x XXXXXXXXXXXXXXXX
Secret Encrytpion
Diagnostic PIN (9 Secret Encrytpion
Key (SEK) (6 bytes) - bytes) number
Key (SEK) (6
generated from
stored in eeprom bytes) - generated
Diagnostic PIN
from Diagnostic
on Smartra
Number (DPN)
PIN Number (DPN)
Issue Number:
1.0
Dev No.
3881
Valid from:
Diagnostic PIN 9
byte number
stored in eeprom
on EMS
14/2/06
OEM end of line tester
shall generate a
Diagnostic Security Pin
Number and pass the
number to the EMS.
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 11 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 12 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
3.3 Assumptions Made
PIN number database (PIN for diagnostic interface) shall be maintained and protected by the
OEM and this information is not information that a thief can access.
3.4 References
HMC Engineering Spec: No ES95400-09 TITLE: IMMOBILIZER SYSTEM FUNCTIONS,
Spec (Encypted Smartra3 Type), VERSION D3, 29/06/2006
Thatcham NVSA specification: No TQSD 014.07 TITLE: THE BRITISH INSURANCE INDUSTRIES
CRITERIA FOR VEHICLE SECURITY, NEW VEHICLE SECURITY ASSESSMENT – PASSENGER
CARS, ISSUE 4A, JULY 2006
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 13 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
4.
MESSAGE STRUCTURE BETWEEN EMS AND SMARTRA
The proposal for the message structure between the Smartra and the EMS is based on the existing
communications protocol with two additional messages and some modified existing messages. The new
messages and modifications are highlighted in yellow.
4.1.1 Data Packet Breakdown
The protocol between the Control Unit (CU) [EMS] and the SMARTRA is defined as :-
Address
Length
Action
Data
CS
length
checksum
The protocol between the SMARTRA and the CU is defined as :-
Address
Length
Data
CS
length
checksum
where :Address = 49h (ASCII 'I') when CU is addressing SMARTRA.
= 69h (ASCII 'i') when SMARTRA is addressing CU
Length = number of bytes following the Length byte (including checksum)
Action = valid SMARTRA actions are :06h (ACK)
Acknowledge
53h (ASCII 'S')
Software version
4Bh (ASCII 'K')
Transponder IDE*
41h (ASCII 'A')
Transponder Authentication (Additional info for ID Matching)
57h (ASCII 'W')
Transponder Write EEPROM page
52H (ASCII 'R')
Transponder Read EEPROM page
4Eh (ASCII ‘N’)
[Neutralise] a [Learnt] Smartra**
54h (ASCII ‘T’)
Teach a Smartra**
15h (ASCII nak)
Negative response*
Note:
* Modified existing message.
** New messages added.
Data
= data to be exchanged between units.
CS
= Checksum - one byte addition of all bytes (excluding address).
The ASCII code naming convention was carried over from existing protocol.
For every message sent to the SMARTRA from the CU there will be a response from the SMARTRA
unit. Only one command can be sent at a time to the SMARTRA unit.
A negative response to any command is possible and is defined in Section 4.10.
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 14 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
4.2 06h - Acknowledge.
CU Request :49
02
06
08
69
02
06
08
SMARTRA Response :-
If the SMARTRA unit does not respond to this command then it will not be ready to accept other
communications. This command could be used to determine if the SMARTRA is ready to receive data at
the start of a communications session.
SMARTRA will take up to 5ms to start sending return Acknowledge to the CU.
4.3 53h - Software Version.
CU Request :49
02
53
55
SMARTRA Response :69
06
Software version in ASCII
CS
06
41
06
eg. For software version A01.0 :69
Note :-
Issue Number:
30
31
2E
30
SMARTRA will take up to 5ms to start sending return Software Version to the CU.
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 15 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
4.4 4Bh - Transponder IDE (Pre ID Matching)
4.4.1 0x4B – (Existing) Pre Secret Encryption Key – kept for backwards compatibility
CU Request :49
02
4B
4D
SMARTRA2 Response:69
05
IDE1
IDE2
IDE3
IDE4
IDE1..IDE4 :- 32 bit Identifier.
Checksum
4.4.2 0x4B – New – Secret Encryption Key – with Encryption check.
CU Request :49
4B RN1 RN2 RN3 RN4 RN5 RN6
RN1..RN6 :- Random Number bytes (00-FF)
08
CS
Note :RN1..6 can be based on the 4 byte random number from the Transponder Authentication
command (refer to “4.5 Transponder Authentication”). This will avoid extra EMS processing to generate
a random number.
SMARTRA3 Response:69
0D
Return
IDE1
Return :-
IDE2
0x00
0x01
0x02
IDE3
IDE4
ERN1
ERN2
ERN3
ERN4
ERN5
ERN6
Smartra
State
CS
= transponder communications OK
= transponder missing or incorrect communications
= Antenna coil Open/Short Detection
IDE1..IDE4
:- 32 bit Identifier.
ERN1 .. ERN6 :- Encrypted Random Number using Secret Encryption Key (SEK)
Smartra State :0x01 = Learnt / Taught
0x02 = Virgin
0x03 = Neutral
Note : - SMARTRA will take up to 110ms to start sending IDE response to the CU.
- When Transponder is missing the Return value will be 0x01 and IDE1 to IDE4 = (0x00 0x00
0x00 0x00).
- When Smartra3 receives the IDE request with the Random Number and it is in:
• [virgin] or [neutral] state the ERN1..6 shall be the encrypted random number using a
default key.
• [learnt] state the ERN1..6 shall be the encrypted random number using the Secret
Encryption Key (SEK).
- Default encryption key will be described in Encryption Software Integration Document.
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 16 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
4.5 41h - Transponder Authentication.
CU Request :49
0A
41
RN1 RN2 RN3 RN4 ELP1
ELP2 ELP3
ELP4
RN1..RN4 :- Random Number bytes (00-FF)
ELP1.. ELP4 :- Encrypted Lock Password bytes (00-FF)
CS
SMARTRA Response :69
05
EKP1
EKP2
EKP3
EKP4
CS
EKP1 .. EKP4 :- Encrypted Key Password bytes (00-FF)
Note :- SMARTRA will take up to 150ms to start sending the Authentication response to the CU.
4.6 57h - Transponder Write EEPROM Page.
CU Request :49
Length
57
PN
B0
B1
B2
B3
PNn B0n B1n B2n B3n
PN...PNn :- Page Number byte (01-07)
B0,B1,B2,B3...B0n,B1n,B2n,B3n :- Transponder bytes to be written (00-FF)
CS
SMARTRA Response :69
02
57
59
This request is only valid during the key programming procedure with the Transponder in password
mode.
Note :• SMARTRA will take up to 600ms to start sending the response to the CU when programming three
consecutive pages.
• Maximum number of consecutive pages to program in the same “Transponder Write EEPROM Page”
request is three.
4.7 52h - Transponder Read EEPROM Page
CU Request :49 03 52
PN
CS
PN :- Page Number byte (00-07)
SMARTRA Response :69 05 B0 B1
B2
B3
CS
B0 .. B3 :- Transponder bytes read (00-FF)
This request is only valid prior to key programming procedure with the Transponder in password mode.
Note :SMARTRA will take up to 100ms to start sending the response bytes to the CU.
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 17 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
4.8 4Eh – Neutralise a [Learnt] Smartra
Message is instigated by Diagnostic Tester and passed to the Smartra through the EMS. The Smartra
will check if the DPN is correct before changing to [neutral] state.
CU Request :We request to place Smartra into Neutral Mode:
49 0B 4E DPN1 DPN2 DPN3 DPN4
DPN1..9
DPN5
DPN6
DPN7
DPN8
DPN9
- Diagnostic PIN Number byte 1 to 9
SMARTRA Response :Return =
69
0x01
0x02
0x03
0x04
02 Return CS
= Correct PIN changed from [Learnt] to [Neutral]
= Correct PIN already in Virgin State
= Correct PIN already in Neutral State
= Diagnostic PIN incorrect
Note :-The EMS will pass this information to the Diagnostic Tester.
4.9 54h – Teach Smartra
Message is instigated by EMS when the Smartra State is [Virgin] or [Neutral] and if the Diagnostic Tester
wants to teach the Diagnostic PIN Number.
CU Request :49 0B 54
DPN1
DPN2 DPN3 DPN4 DPN5 DPN6 DPN7 DPN8
DPN1..9
- Diagnostic PIN Number byte 1 to 9
DPN9
CS
SMARTRA Response :Return
69
02 Return CS
= 0x01 – Programmed Successfully
= 0x02 – Correct PIN (Smartra already in Learnt State).
= 0x03 – Incorrect PIN
**Note**:
1) For backward compatibility the Smartra3 will by default function as a Smartra2 until the Teach Smartra
command is completed correctly.
2) When Smartra3 handles this message it shall convert the diagnostic PIN number to a secret KEY and
store it on the device.
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 18 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
4.10 15h - Negative Responses
To any CU command the SMARTRA may respond negatively. The following message will be sent.
SMARTRA Negative Response (NAK) :69
03
15
Error code
CS
Error Code
Description
01h
Antenna signal error
Detection Window : Before transponder communications
Detection Criteria :
Antenna open/short circuit
Invalid Transponder Data
Detection Window :- a. During Transponder IDE
b. During Transponder Authentication requests
c. During Transponder Write EEPROM page requests.
d. During Transponder Read EEPROM page requests.
Detection Criteria :- Corrupted data from Transponder (Tp), or more than one Tp in
the field, or no Tp in the field.
Request from Control unit is invalid
02h
03h
Detection Window :- End of CU request message
Detection Criteria :-
04h
Protocol layer violation
-- Invalid request,
--or invalid check sum,
Password mode invalid
Detection Window :- During Transponder Write or Read EEPROM Page
Detection Criteria :-
05h
Tp not in password mode, or Transponder transport data has
been changed.
Smartra in locked state:
Detection Window :- During access to the Diagnostic functions, teaching or
neutralising a Smartra.
Detection Criteria :-
1PNh
PN = page No. failed
PN = 1..7
When the DPN is entered while the Smartra is locked.
Refer to section 7.1.6.
Transponder Programming error
Detection Window :- During Transponder Write EEPROM Page request While
Transponder is in authorised state.
Detection Criteria :-
Issue Number:
1.0
Dev No.
3881
Corrupted data from Transponder (Tp), Or more than one Tp in
the field, or no Tp in the field.
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 19 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
5.
MESSAGE FLOW BETWEEN EMS, SMARTRA AND TRANSPONDER
5.1 Background
The message flow between the Smartra and the EMS is described in the following section. The Smartra
is event driven ie. the EMS sends a message, the Smartra response will be sent back to the EMS.
Components missing in system:
If no EMS is present then the Smartra does nothing.
If no Smartra is present the EMS will timeout on the ACK request message.
If no transponder is present the Smartra will send a NAK to the EMS (No transponder).
5.1.1 Starting Communications
The communications start with Ignition switch ON or Key Teaching Mode(14h) and ignition switch ON.
5.1.2 Stopping Communications
The communications stop when:
• no response received from Smartra after EMS attempts to send a message to the Smartra
more than 3 times.
• communication error on Smartra when an EMC or checksum error occurs more than 3 times.
• Authentication is complete. Note in case of ignition off by key before authentication EMS
should not store error.
5.1.3 (Re)Teaching Mode
•
•
EMS should not start communication request (06h/4Bh/…) after IGN ON by Next Key,
and in case of sending Teaching messages(1Ch…1Eh) from Tester(HI-SCAN or GST) EMS
should start communication request (06h/4Bh/…).
5.1.3.1 Diagram: Explaining how to read message flow diagrams
Trans ponde r
Sm artra
EM S
IDE Request
0x49 S 0x4B RN1..6
Re que s t
re s pons e pair,
groupe d to
m ak e re ading
e as ie r
Solid Line s s how
m odule s that s e nd and
re ce ive data
Block indicate s s om e
proce s s ing at m odule
Issue Number:
1.0
Arrow Show s Dire ction
of m e s s age
M e s s age s tructure , data
that m ak e s m e s s age .
Ye llow = ne w m e s s age
Blue = e xis ting m e s s age
Re d = e rror m e s s age
Dev No.
3881
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 20 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
5.2 Message Flow 1 - Normal Operation
Authentication Flow : After ignition or accessories is detected by the CU (EMS) the following steps will
normally be taken to validate the key. We have not added any new messages in the flow only
increased some message sizes.
1)
2)
3)
4)
5)
6)
7)
8)
CU provides supply voltage to SMARTRA.
CU sends command 06h – ACK.
SMARTRA3 responds with 06h – ACK.
CU sends command 4Bh - Transponder IDE (+ random number(6 bytes) ).
SMARTRA3 responds with the transponder's Identifier (32 bits) [+ Return byte + encrypted number (6bytes) +State(1byte) ].
CU sends command 52h – Read EEPROM Page.
SMARTRA3 responds with 15h Negative Response. This indicates to EMS that Transponder is in learnt state.
The CU generates a random number and calculates the encrypted lock password, then sends command 41h - Transponder
Authentication.
9) SMARTRA3 responds with the encrypted key password.
10) The CU compares the encrypted key password from the transponder (via SMARTRA) with its calculated encrypted key password, if they
match then the key has been authenticated.
5.2.1.1 Message Sequence
Command
06h
53h
4Bh
41h
52h
57h
4Eh
54h
15h
Sequence
5.2.1.2 Message Flow Detail
Msg
Flow
no.
S EMS
Mode
description
Description
EMS message
Data EMS message
Description
Smartra Response
Data Smartra Message
Normal
message Flow
All modules
learnt. Same
as Flow 9.
ACK request
IDE request
Read EEPROM
Authentication req
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x52 PAGE
0x49 S 0x41 RN1..4
ELP1..4
ACK response
IDE Response
Negative response
Authentication Response
0x49 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S 0x15 0xXX
0x69 S EKP1..4
5.2.2 Message Flow Diagram:
T r ansp o nd er [ lear nt ]
EM S[ lear nt ]
Smar t r a[ lear nt ]
ACK request
EM S requests ACK
0x49 0x02 0x06 0x08
Smartra3 responds
with a ACK
Smartra knows the EM S sw
is new version due to extra
bytes - encrypts RN1..4 and
passes to EM S
0x69 0x02 0x06 0x08
IDE request
0x49 S 0x4B + RN1..6
0x69 S Ret IDE1..4 +
ERN1..6 + State byte
Read EEPROM Page
0x49 S 0x52 PAGE
0 x6 9 0 x15 er r o r
messag e
EM S receives ACK
EM S requests IDE from
transponder with 0x4B
+ extra bytes
From IDE response EM S
knows type of Smartra, and
TP IDE.
EM S requests to read eeprom
page
Read EEPROM error
message received.
Request the Transponder
Authentication
Authentication
Smartra does transponder
encryption
Smartra sends
encrypted data
Issue Number:
1.0
0x49 S 0x41 RN1..4
ELP1..4
0x69 S EKP1..4
Dev No.
3881
Evaluate transponder
encrypted key password
if OK then start engine
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 21 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
5.3 Message Flow 2 – Twice IG ON or Authentication mode
Transponder is in [Virgin] state read EEPROM is allowed.
5.3.1.1 Message Sequence
Command
06h
53h
4Bh
41h
52h
57h
4Eh
54h
15h
Sequence
5.3.1.2 Message Flow Detail
Msg
Flow
no.
S EMS
Mode
description
Description
EMS message
Data EMS message
Description
Smartra Response
Data Smartra Message
Twice IG ON
or
Authentication
ACK request
IDE request
Read EEPROM
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x52 PAGE
ACK response
IDE Response
EEPROM data Response
0x49 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S B0..3
V/L/N
5.3.2 Message Flow Diagram:
T r ansp o nd er [ vir g in]
Smar t r a[ vir g in / neut r al]
EM S [ vir g in, neut r al, lear nt ]
ACK request
0x49 0x02 0x06 0x08
new EM S requests ACK
Smartra3 responds
with a ACK
0x69 0x02 0x06 0x08
EM S receives ACK
EM S requests IDE from
transponder with 0x4B
+ extra bytes
IDE request
0x49 S 0x4B + RN1..6
If IDE request has a Random
Number attached then the
Smartra will send the new EM S
some more information.
0x69 S Ret IDE1..4 +
ERN1..6 + State byte
From IDE response EM S
knows type of Smartra, and
TP IDE.
Read EEPROM Page
0x49 S 0x52 PAGE
0x69 S B0..3
Issue Number:
1.0
Dev No.
3881
Valid from:
EM S requests to read
eeprom page
Smartra sends
response
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 22 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
5.4 Message Flow 3 – Twice IG ON or Authentication mode
Transponder is in [learnt] state Read EEPROM is not allowed.
5.4.1.1 Message Sequence
Command
06h
53h
4Bh
41h
52h
57h
4Eh
54h
15h
Sequence
3.5
5.4.1.2 Message Flow Detail
Msg
Flow
no.
S EMS
Mode
description
Description
EMS message
Data EMS message
Description
Smartra Response
Data Smartra Message
Twice IG ON
or
Authentication
ACK request
IDE request
Read EEPROM
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x52 PAGE
ACK response
IDE Response
EEPROM data Response
0x49 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S 0x15 0xXX
V/L/N
5.4.2 Message Flow Diagram:
T r ansp o nd er [ lear nt ]
Smar t r a[ vir g in / neut r al]
EM S [ vir g in, neut r al, lear nt ]
ACK request
0x49 0x02 0x06 0x08
new EM S requests ACK
Smartra3 responds
with a ACK
0x69 0x02 0x06 0x08
EM S receives ACK
EM S requests IDE from
transponder with 0x4B
+ extra bytes
IDE request
0x49 S 0x4B + RN1..6
If IDE request has a Random
Number attached then the
Smartra will send the new EM S
some more information.
0x69 S Ret IDE1..4 +
ERN1..6 + State byte
Read EEPROM Page
Issue Number:
1.0
Dev No.
3881
From IDE response EM S
knows type of Smartra, and
TP IDE.
0x49 S 0x52 PAGE
EM S requests to read
eeprom page
0 x6 9 0 x15 er r o r
messag e
Receive negative response from
Smartra as Transponder is
already learnt
Valid from:
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 23 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
5.5 Message Flow 4 - Twice IG ON or Authentication mode
Transponder is in [Virgin] state read EEPROM is allowed.
5.5.1.1 Message Sequence
Command
06h
53h
4Bh
41h
52h
57h
4Eh
54h
15h
Sequence
5.5.1.2 Message Flow Detail
Msg
Flow
no.
S EMS
Mode
description
Description
EMS message
Data EMS message
Description
Smartra Response
Data Smartra Message
Twice IG ON
or
Authentication
ACK request
IDE request
Read EEPROM
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x52 PAGE
ACK response
IDE response
EEPROM data Response
0x49 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S B0..3
V/L/N
5.5.2 Message Flow Diagram:
T r ansp o nd er [ vir g in]
EM S [ vir g i n, lear nt , neut r al]
Smar t r a[ lear nt ]
ACK request
EM S requests ACK
0x49 0x02 0x06 0x08
Smartra3 responds
with a ACK
Smartra knows the EM S sw
is new version due t o extra
bytes - encrypts RN1..6 and
passes t o EM S
0x69 0x02 0x06 0x08
EM S requests IDE from
t ransponder with 0x4B
+ extra byt es
IDE request
0x49 S 0x4B RN1..6
0x69 S Ret IDE1..4 +
ERN1..6 + St ate byte
Read EEPROM Page
Smartra sends the
EEPROM page bytes
0x49 S 0x52 PAGE
0x69 S B0..3
Issue Number:
1.0
Dev No.
EM S receives ACK
3881
Valid from:
From IDE response EM S
knows type of Smartra, and
TP IDE.
EM S requests to read eeprom
page
EM S receives TP
EEPROM data.
14/2/06
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 24 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
5.6 Message Flow 5 - Twice IG ON or Authentication mode
Transponder is in [learnt] state Read EEPROM is not allowed.
5.6.1.1 Message Sequence
Command
06h
53h
4Bh
41h
52h
57h
4Eh
54h
15h
Sequence
3.5
5.6.1.2 Message Flow Detail
Msg
Flow
no.
S EMS
Mode
description
Description
EMS message
Data EMS message
Description
Smartra Response
Data Smartra Message
Twice IG ON
or
Authentication
ACK request
IDE request
Read EEPROM
0x49 0x02 0x06 0x08
0x49 S 0x4B DATA
0x49 S 0x52 PAGE
ACK response
IDE response
Negative response
0x49 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
00x69 S 0x15 0xXX
V/N
5.6.2 Message Flow Diagram:
T r ansp o nd er [ lear nt ]
EM S[ vir g in, neut r al]
Smar t r a[ lear nt ]
ACK request
EM S requests ACK
0x49 0x02 0x06 0x08
Smartra3 responds
with a ACK
0x69 0x02 0x06 0x08
EM S requests IDE from
transponder with 0x4B
+ extra bytes
IDE request
Smartra knows the EM S sw
is new version due to extra
bytes - encrypts RN1..4 and
passes to EM S
EM S receives ACK
0x49 S 0x4B RN1..6
0x69 S Ret IDE1..4 +
ERN1..6 + State byte
From IDE response EM S
knows type of Smartra, and
TP IDE.
EM S requests to read eeprom
page
Read EEPROM Page
0x49 S 0x52 PAGE
0 x6 9 0 x15 er r o r
messag e
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Read EEPROM error
message received.
Print Date:
28 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 37 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
5.19 Message Flow 18: – Old EMS with a new learnt Smartra
Smartra sends an exsting error message for EMS to handle.
5.19.1.1 Message Sequence
Command
06h
53h
4Bh
41h
52h
57h
4Eh
54h
15h
Sequence
2.5
5.19.1.2 Message Flow Detail
Msg
Flow
no.
18
S EMS
Mode
description
Description
EMS message
Data EMS message
Description
Smartra Response
Data Smartra Message
Old EMS new
learnt smartra
ACK request
IDE Request 1
IDE Request 2
IDE Request 3
0x49 0x02 0x06 0x08
0x49 S 0x4B
0x49 S 0x4B
0x49 S 0x4B
ACK response
IDE Response (Negative)
IDE Response (Negative)
IDE Response (Negative)
0x49 0x02 0x06 0x08
0x69 S 0x15 0x03
0x69 S 0x15 0x03
0x69 S 0x15 0x03
VLN
(Old)
5.19.2 Message Flow Diagram:
T r ansp o nd er [ vir g in , lear nt ]
Smar t r a[ lear nt ]
Old EM S [ vir g in, lear nt , neut r al]
ACK request
EM S requests ACK
0x49 0x02 0x06 0x08
Smartra3 responds
with a ACK
0x69 0x02 0x06 0x08
EM S receives ACK
IDE request 1
EM S requests IDE from
transponder with 0x4B
+ extra bytes
0x49 S 0x4B
New Smartra responds with
an exsiting error message
as the learnt smartra cant
talk to a Old EM S.
0 x6 9 0 x15 0 X 0 3
er r o r messag e
IDE request 2
EM S requests IDE from
transponder with 0x4B
+ extra bytes
0x49 S 0x4B
New Smartra responds
with an exsiting error
message as the learnt
smartra cant talk to a Old
EM S.
0 x6 9 0 x15 0 X 0 3
er r o r messag e
IDE request 3
EM S requests IDE from
transponder with 0x4B
+ extra bytes
0x49 S 0x4B
New Smartra responds with an
exsiting error message as the learnt
smartra cant talk to a Old EM S.
0 x6 9 0 x15 0 X 0 3
er r o r messag e
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
23 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 38 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
5.20 Message Flow 19: – Old EMS with a virgin Smartra
This combination will function according to the Smartra2 protocol specification.
5.20.1.1 Message Sequence
Command
06h
53h
4Bh
41h
52h
57h
4Eh
54h
15h
Sequence
5.20.1.2 Message Flow Detail
Msg
Flow
no.
19
S EMS
Mode
description
Description
EMS message
Data EMS message
Description
Smartra Response
Data Smartra Message
Old EMS with
a virgin
Smartra3
ACK request
IDE Request
….
Following
messages are the
same as Smartra2
…….
0x49 0x02 0x06 0x08
0x49 S 0x4B
….
Following messages are the
same as Smartra2
…….
ACK response
IDE Response
….
Following messages are
the same as Smartra2
…….
0x69 0x02 0x06 0x08
0x69 S IDE1..4
….
Following messages are the same as
Smartra2
…….
(Old)
5.20.2 Message Flow Diagram:
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
23 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 39 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
5.21 Message Flow 20: – Old Smartra with a new EMS
This combination will not allow automobile to start up as the system isn’t setup correctly.
5.21.1.1 Message Sequence
Command
06h
53h
4Bh
41h
52h
57h
4Eh
54h
15h
Sequence
5.21.1.2 Message Flow Detail
Msg
Flow
no.
20
S EMS
old
Mode
description
Description
EMS message
Data EMS message
Description
Smartra Response
Data Smartra Message
Old Smartra
with a new
learnt EMS
ACK request
IDE Request 1
IDE Request 2
IDE Request 3
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x4B RN1..6
0x49 S 0x4B RN1..6
ACK response
IDE Response 1
IDE Response 2
IDE Response 3
0x69 0x02 0x06 0x08
0x69 S IDE1..4
0x69 S IDE1..4
0x69 S IDE1..4
5.21.2 Message Flow Diagram:
T r ansp o nd er [ l ear nt ]
N ew EM S[ lear nt ]
Ol d Smar t r a
ACK request
EM S request s ACK
0x49 0x02 0x06 0x08
Smart ra2 responds
with a ACK
0x69 0x02 0x06 0x08
EM S receives ACK
IDE request 1
0x49 S 0x4B + RN1..6
0x69 S IDE1..4
EM S requests IDE from
transponder with 0x4B
+ extra byt es
EM S knows there is a
Smart ra2 when it is
expecting a Smartra3. Try
again.
IDE request 2
0x49 S 0x4B + RN1..6
0x69 S IDE1..4
EM S requests IDE from
transponder with 0x4B
+ extra byt es
EM S knows there is a
Smart ra2 when it is
expecting a Smartra3. Try
again.
IDE request 3
0x49 S 0x4B + RN1..6
EM S request s IDE f rom
t ransponder wit h 0x4B
+ ext ra bytes
EM S knows t here is a
Smartra2 when it is
expect ing a Smart ra3. The
EM S needs t o raise an error
as there is a miss-mat ch
0x69 S IDE1..4
Message Flow will stop as the EMS knows that
there is a Smartra2 in the system when it is
expecting a configured Smartra3.
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
23 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 40 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
5.22 Summary Tables : Message Flow Summary
Table displays the transponder (TP), Smartra (SM) and engine management system(EMS) states and
the messages that are sent when in the state between the EMS and the Smartra. The message flows
are described in more detail below.
5.22.1 Table: Normal Message Flow
Msg
Flow
no.
S EMS
Mode
description
Description
EMS message
Data EMS message
Description
Smartra Response
Data Smartra Message
Normal
message Flow
All modules
learnt.
Same as Flow
9.
ACK request
IDE request
Read EEPROM
Authentication req
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x52 PAGE
0x49 S 0x41 RN1..4
ELP1..4
ACK response
IDE Response
Negative response
Authentication Response
0x49 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S 0x15 0xXX
0x69 S EKP1..4
TP = transponder SM = Smartra EMS = engine management system.
V = virgin L = Learnt N = Neutral S = size R = return value D = data M = Missing
Note :
** all messages have Check sum at end but this isn’t shown to simplify matrix.
(old) = Smartra2 compatible EMS unit
5.22.2 Table: Twice IG ON or Authentication
Msg
Flow
no.
S EMS
Mode
description
Description
EMS message
Data EMS message
Description
Smartra Response
Data Smartra Message
V/L/N
V/L/N
V/L/N
V/N
V/L/N
(Old)
V/L/N
(Old)
(Old)
Twice IG ON
or
Authentication
Twice IG ON
or
Authentication
Twice IG ON
or
Authentication
Twice IG ON
or
Authentication
Twice IG ON
or
Authentication
Twice IG ON
or
Authentication
Twice IG ON
or
Authentication
ACK request
IDE request
Read EEPROM
ACK request
IDE request
Read EEPROM
ACK request
IDE request
Read EEPROM
ACK request
IDE request
Read EEPROM
ACK request
IDE request
Read EEPROM
ACK request
IDE request
Read EEPROM
ACK request
IDE request
Read EEPROM
Authentication Req
ACK response
IDE Response
EEPROM data Response
ACK response
IDE Response
EEPROM data Response
ACK response
IDE response
EEPROM data Response
ACK response
IDE response
Negative response
ACK response
IDE Response
EEPROM data Response
ACK response
IDE Response
Negative response
ACK response
IDE response
Negative response
Authentication response
0x49 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S B0..3
0x49 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S 0x15 0xXX
0x49 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S B0..3
0x49 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
00x69 S 0x15 0xXX
0x69 0x02 0x06 0x08
0x69 S IDE1..4
0x69 S B0..3
0x69 0x02 0x06 0x08
0x69 S IDE1..4
0x69 S 0x15 0xXX
0x69 0x02 0x06 0x08
0x69 S IDE1..4
0x69 S 0x15 0xXX
0x69 S EKP1..4
Twice IG ON
or
Authentication
Same as Flow
1.
ACK request
IDE request
Read EEPROM
Authentication req
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x52 PAGE
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x52 PAGE
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x52 PAGE
0x49 0x02 0x06 0x08
0x49 S 0x4B DATA
0x49 S 0x52 PAGE
0x49 0x02 0x06 0x08
0x49 S 0x4B
0x49 S 0x52 PAGE
0x49 0x02 0x06 0x08
0x49 S 0x4B
0x49 S 0x52 PAGE
0x49 0x02 0x06 0x08
0x49 S 0x4B
0x49 S 0x52 PAGE
0x49 S 0x41 RN1..4
ELP1..4
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x52 PAGE
0x49 S 0x41 RN1..4
ELP1..4
ACK response
IDE Response
Negative response
Authentication Response
0x49 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S 0x15 0xXX
0x69 S EKP1..4
TP = transponder SM = Smartra EMS = engine management system.
V = virgin L = Learnt N = Neutral S = size R = return value D = data M = Missing
Note :
** all messages have Check sum at end but this isn’t shown to simplify matrix.
(old) = Smartra2 compatible EMS unit
5.22.3 Table: All modes missing transponder
Msg
Flow
no.
10
S EMS
Mode
description
Description
EMS message
Data EMS message
Description
Smartra Response
Data Smartra Message
All modes
(missing
transponder)
ACK request
IDE request
IDE request
IDE request
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x4B RN1..6
0x49 S 0x4B RN1..6
ACK response
IDE Response (Negative)
IDE Response (Negative)
IDE Response (Negative)
0x49 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S R IDE1..4 + ERN1..6 + State byte
V/N/L
(new)
TP = transponder SM = Smartra EMS = engine management system.
V = virgin L = Learnt N = Neutral S = size R = return value D = data M = Missing
Note :
** all messages have Check sum at end but this isn’t shown to simplify matrix.
Issue Number:
1.0
Dev No.
3881
Valid from:
(old) = Smartra2 compatible EMS unit
14/2/06
Print Date:
23 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 41 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
5.22.4 Table: Transponder (Re)teaching mode
Msg
Flow
no.
S EMS
Mode
description
Description
EMS message
Data EMS message
Description
Smartra Response
Data Smartra Message
11
V/N/L
(new)
Transponder
(Re) Teaching
ACK request
IDE Request
Write EEPROM
Authentication Req
ACK response
IDE Response
EEPROM write Response
Authentication response
0x69 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S 0x57
0x69 S EKP1..4
12
V/N/L
(new)
Transponder
(Re) Teaching
ACK request
IDE Request
Write EEPROM
Authentication Req
ACK response
IDE Response
EEPROM write Response
Authentication response
0x49 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S 0x57
0x69 S EKP1..4
13
V/N/L
(new)
Transponder
(Re) Teaching
ACK request
IDE Request
Write EEPROM
Authentication Req
ACK response
IDE Response
Negative response
Authentication response
0x69 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S 0x15 0xXX
0x69 S EKP1..4
14
V/N/L
(new)
Transponder
(Re) Teaching
ACK request
IDE Request
Write EEPROM
Authentication Req
ACK response
IDE Response
Negative response
Authentication response
0x49 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S 0x15 0xXX
0x69 S EKP1..4
15
VNL
(old)
Transponder
(Re) Teaching
ACK request
IDE Request
Write EEPROM
Authentication Req
ACK response
IDE Response
Negative response
Authentication response
0x69 0x02 0x06 0x08
0x69 S IDE1..4
0x69 S 0x15 0xXX
0x69 S EKP1..4
16
VNL
(old)
Transponder
(Re) Teaching
ACK request
IDE Request
Write EEPROM
Authentication Req
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x57 WRITE_DATA
0x49 S 0x41 RN1..4
ELP1..4
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x57 WRITE_DATA
0x49 S 0x41 RN1..4
ELP1..4
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x57 WRITE_DATA
0x49 S 0x41 RN1..4
ELP1..4
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x57 WRITE_DATA
0x49 S 0x41 RN1..4
ELP1..4
0x49 0x02 0x06 0x08
0x49 S 0x4B
0x49 S 0x57 WRITE_DATA
0x49 S 0x41 RN1..4
ELP1..4
0x49 0x02 0x06 0x08
0x49 S 0x4B
0x49 S 0x57 WRITE_DATA
0x49 S 0x41 RN1..4
ELP1..4
ACK response
IDE Response
EEPROM write Response
Authentication response
0x69 0x02 0x06 0x08
0x69 S IDE1..4
0x69 S 0x57
0x69 S EKP1..4
TP = transponder SM = Smartra EMS = engine management system.
V = virgin L = Learnt N = Neutral S = size R = return value D = data M = Missing
Note :
** all messages have Check sum at end but this isn’t shown to simplify matrix.
(old) = Smartra2 compatible EMS unit
5.22.5 Table: Special cases
Msg
Flow
no.
S EMS
Mode
description
Description
EMS message
Data EMS message
Description
Smartra Response
Data Smartra Message
17
(new)
Miss-matched
secret key
18
VLN
(Old)
Old EMS new
learnt smartra
19
(Old)
Old EMS with
a virgin
Smartra3
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x4B RN1..6
0x49 S 0x4B RN1..6
0x49 0x02 0x06 0x08
0x49 S 0x4B
0x49 S 0x4B
0x49 S 0x4B
0x49 0x02 0x06 0x08
0x49 S 0x4B
….
Following messages are the
same as Smartra2
…….
ACK response
IDE Response 1
IDE Response 2
IDE Response 3
ACK response
IDE Response (Negative)
IDE Response (Negative)
IDE Response (Negative)
ACK response
IDE Response
….
Following messages are
the same as Smartra2
…….
0x49 0x02 0x06 0x08
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S R IDE1..4 + ERN1..6 + State byte
0x69 S R IDE1..4 + ERN1..6 + State byte
0x49 0x02 0x06 0x08
0x69 S 0x15 0x03
0x69 S 0x15 0x03
0x69 S 0x15 0x03
0x69 0x02 0x06 0x08
0x69 S IDE1..4
….
Following messages are the same as
Smartra2
…….
20
old
Old Smartra
with a new
learnt EMS
ACK request
IDE Request 1
IDE Request 2
IDE Request 3
ACK request
IDE Request 1
IDE Request 2
IDE Request 3
ACK request
IDE Request
….
Following
messages are the
same as Smartra2
…….
ACK request
IDE Request 1
IDE Request 2
IDE Request 3
0x49 0x02 0x06 0x08
0x49 S 0x4B RN1..6
0x49 S 0x4B RN1..6
0x49 S 0x4B RN1..6
ACK response
IDE Response 1
IDE Response 2
IDE Response 3
0x69 0x02 0x06 0x08
0x69 S IDE1..4
0x69 S IDE1..4
0x69 S IDE1..4
TP = transponder SM = Smartra EMS = engine management system.
V = virgin L = Learnt N = Neutral S = size R = return value D = data M = Missing
Note :
** all messages have Check sum at end but this isn’t shown to simplify matrix.
Issue Number:
1.0
Dev No.
3881
Valid from:
(old) = Smartra2 compatible EMS unit
14/2/06
Print Date:
23 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 42 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
6.
REPLACING OF SYSTEM COMPONENTS
The possibility exists that we may need to replace a component in the Immobilizer system.
components that possibly can be replaced are:
1. EMS (when damaged).
2. Smartra (when damaged).
3. Keys [transponders] when Lost or damaged existing keys.
4. Antenna - (interface to the transponder).
The
6.1 Replacing the Engine Management System (EMS) ECU
The consequences of replacing the Engine Management Systems (EMS) are :
1. The new EMS needs to be taught with the same 9 byte DPN as the previous EMS had.
2. The Keys need to be re-taught.
Replacing the EMS causes non Smartra changes as well. Transponder Keys have to be re-taught to the
EMS. The EMS requests vehicle specific data from tester. The [virgin] EMS stores the vehicle specific
data and the key teaching can be started. The key teaching is done by the Ignition on with key and
additional tester command. The EMS stores the relevant data in the EEPROM and in the transponder.
Then the EMS runs authentication for confirmation of teaching process. The successful programming is
confirmed by message to tester.
6.1.1 Equipment required to replace the EMS in immo system
•
•
•
•
EMS – virgin state
Existing Keys
Diagnostic Tester
Diagnostic PIN number from OEM secure database
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
23 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 43 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
6.1.2 Process Flow Chart: Replacing Engine Management System EMS
Replacing an Engine
Management System
Insert New Engine
management System.
Store Diagnostic PIN
number on the EMS. EMS
changes to [learnt] state.
Send positive response to
the tester.
Yes
Connect the Diagnostic
Tester
The Diagnostic Tester will
trigger a message so EMS
will check the state of the
EMS and Smartra
correct EMS is
present
Enter the PIN number
according to OEM
database on the Diagnostic
Tester
No
Send negative response to
the Tester
Go through Key teach
procedure
return
6.2 Replacing the Smartra ECU
If the Smartra is replaced in the field due to failure then the diagnostic tester will be required.
6.2.1 Equipment required to replace a Smartra unit in immo system
•
•
•
Smartra [virgin] state.
Diagnostic Tester.
Diagnostic PIN number from OEM secure database.
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
23 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 44 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
6.2.2 Process Flow Chart : Replacing Smartra
Replacing a Smartra
Insert New Smartra unit.
[virgin] state.
Connect Diagnostic Tester
Through the EMS
The Diagnostic Tester will
trigger a message so EMS
will check the state of the
EMS and Smartra
correct smartra is
present and PIN
number entered is
the same as EMS
PIN
Enter the PIN number
according to OEM
database on the Diagnostic
Tester
Store PIN number on the
Smartra
Yes
Smartra changes to [learnt]
state
Send positive response to
the tester.
No
return
Send negative response to
the Tester
6.3 Replacing Keys (transponders)
The proposed protocol hasn’t changed the existing Key (transponder) teach functionality. The replacing
of keys doesn’t involve any different processing from the Smartra. The Smartra shall pass messages
between the EMS and the transponder as it currently does.
6.3.1 Process Flow Chart : Replacing/Adding Keys
Adding new Keys (transponder) - Process flow Chart showing changes required on Smartra after
replacing a EMS
Key Teach Procedure need
Diagnostic tester interface.
Adding new keys
return
6.4 Replacing Antenna
The proposed changes to the Smartra do not affect the antenna. That is, the lock barrel is passive and
has no unique code to identify it. If the antenna is replaced with an equivalent part, the system will work
as normal.
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
23 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 45 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
7.
DIAGNOSTIC TESTER REQUIREMENTS
7.1.1 Diagnostic Tester Introduction
•
•
•
•
The Smartra needs the Diagnostic interface to change state of Smartra to [neutral] state from the
[learnt] state in the field.
The Smartra needs to use the Diagnostic PIN Number (DPN) to generate the Secret Encryption Key
(SEK).
For Security reasons the Diagnostic PIN Number (DPN) is required to access the diagnostic function,
PIN number protection is required for security reasons. Once the Diagnostic PIN Number (DPN) is
taught to the [virgin] or [neutral] Smartra the Smartra enters [learnt] state. The OEM secure
Diagnostic PIN Number (DPN) is taught to the Smartra:
o at the OEMs end of line tester after the car is assembled.
o in the field when a Smartra is replaced with a [virgin] Smartra.
The Diagnostic PIN Number (DPN) will be:
o a 9 byte number that will be Thatcham compliant selected by OEM.
o the OEM will be responsible to maintain a database for Diagnostic PIN numbers (DPN’s)
matching with VIN numbers.
o the diagnostic PIN number will be stored on both the EMS and the Smartra.
7.1.2 The Diagnostics tester interface diagram:
EMS
Smartra
single w ire
asynch bi-dir
comms
4800baud
k-line comms
using KWP2000
or CAN
Diagnostics
(Tester or HiScan)
7.1.3 Programming Diagnostic PIN Number DPN (on the Smartra)
The Smartra will learn the 9 byte Diagnostic PIN Number (DPN) at the OEMs end of line tester or in the
field when a module is replaced.
The Diagnostic PIN Number (DPN) will inhibit placing the Smartra3 into [Neutral] state from [Learnt] state
for security reasons.
A new Smartra ECU will be delivered with no Diagnostic PIN Number (DPN) programmed into EEPROM.
In this “production mode” status, all diagnostic functions will be available without having to enter or
program a pin code previously.
Once the Diagnostic PIN Number (DPN) is programmed to the ECU at the car assembly plants end of
line tester, all diagnostics functions are possible until the end diagnostic command is transmitted from
the tester to the control unit or the car assembly plants end of line tester is removed from the vehicle.
This is to say, once the Diagnostic PIN Number (DPN) has been programmed, it does not have to be
entered again to access secured diagnostic functions until the current diagnostic session is completed.
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
23 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 46 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
7.1.3.1 Message Flow Diagram (Programming Diagnostic PIN – both Smartra and EMS)
Smar t r a[ vir g in/ neut r al]
EM S[ vir g i n/ neut r a
D iag no st ic T est er
Program Diagnostic PIN
number request - send
request with 9 byte PIN
number
ACK request
0x49 0x02 0x06 0x08
0x49 0x02 0x06 0x08
IDE request
0x49 S 0x4B + RN1..6
0x69 S IDE1..4 +
ERN1..6 + St ate byte
EM S knows the type of Smartra
and the state the Smartra is in.
After sending IDE request
Teach Smartra
EM S sends teach Smartra
command (0x54) to Smartra to
store new PIN code
0x49 S 0x54 DPN1..9
0x69 S 0x01
Send ACK to tester
7.1.3.2 Message Flow Diagram (Programming Diagnostic PIN – EMS
EM S[ vi r g i n/ neut r al]
Smar t r a[ l ear nt ]
ACK request
Smart ra3
responds
with a ACK
D i ag no st ic T est er
Program Diagnostic PIN
number request - send
request wit h 9 byte PIN
number
0x49 0x02 0x06 0x08
EM S receives ACK
0x49 0x02 0x06 0x08
IDE request
0x49 S 0x4B + RN1..6
EM S knows t he Smart ra is
in learnt st at e and it is in
[ virgin] or [ neut ral] st at e. It
stores the PIN number
0x69 S IDE1..4 +
ERN1..6 + Stat e byt e
Send ACK t o t est er
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
23 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 47 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
7.1.3.3 Message Flow Diagram (Programming Diagnostic PIN – Smartra)
Smar t r a[ vir g i n/ neut r al ]
EM S[ lear nt ]
D iag no st ic T est er
Program Diagnostic PIN
number request - send
request with 9 byte PIN
number
ACK request
0x49 0x02 0x06 0x08
0x49 0x02 0x06 0x08
IDE request
0x49 S 0x4B + RN1..6
0x69 S IDE1..4 +
ERN1..6 + State byt e
EM S knows t he type of Smartra
and the state t he Smart ra is in.
After sending IDE request
Teach Smartra
0x49 S 0x54 DPN1..9
0x69 S 0x01
EM S sends teach Smartra
command (0x54) t o Smartra t o
st ore new PIN code
Send ACK to t ester
7.1.4 Aftermarket PIN number sequence:
When a Smartra is installed at the:
• OEM Car manufacturer the unique Diagnostic PIN Number (DPN) shall be programmed by the
function tester on the line. The OEM needs to maintain a database with the VIN and the Diagnostic
PIN Number (DPN).
• Aftermarket dealer, the dealer must program the unique Diagnostic PIN Number (DPN) using the
diagnostic tester. The Aftermarket dealer needs to confirm the Diagnostic PIN Number (DPN) from
the OEM database.
7.1.5 Changing Diagnostic PIN Number (DPN) on Smartra
To change the Diagnostic PIN Number (DPN):
1. the Smartra will need to be placed into [neutral] state.
2. then the diagnostic tester will need to teach the new diagnostic PIN number.
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
23 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 48 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
7.1.6 Accessing diagnostic functions
At the next diagnostic session, the pin code is required to be entered correctly to enable the ECU state
change. If pin code is entered incorrectly 3 times, the Smartra will enter a time-out loop where it will not
be possible to retry entering the DPN for 60 minutes ie. a NACK will be sent from Smartra stating that
the Smartra is in locked state. After 60 minutes of IGN ON, the counters and error flags will be cleared
and the DPN can be entered.
7.1.6.1 Message Flow Diagram (Changing State – correct PIN)
EM S[ lear nt ]
Smar t r a[ lear nt ] - > [ neut r al]
D iag no st ic T est er
Change stat e of Smartra
t o [neutral] request with
PIN number
ACK request
0x49 0x02 0x06 0x08
Smartra3
responds
with a ACK
0x49 0x02 0x06 0x08
EM S receives ACK
IDE request
0x49 S 0x4B + RN1..6
0x69 S IDE1..4 +
ERN1..6 + Stat e byt e
Smartra will check if
PIN number is correct
t hen t he unit will enter
[ neutral] stat e.
In neut ral st ate the
Diagnostic PIN code
is changed to neutral
PIN code.
Issue Number:
EM S knows the type of Smart ra
and the stat e t he Smart ra is in.
After sending IDE request
Neutralise Smartra
0x49 S 0x4E DPN1..9
0x69 S Return T1..3
EM S sends neut ralise Smartra
command (0x4E) with existing
PIN code
Send ACK to tester
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
23 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1
PROTOCOL SPECIFICATION
F005VP0801
SMARTRA III IMMOBILISER
Page 49 of 49
ROBERT BOSCH
(AUSTRALIA) PTY. LTD.
A.B.N. 48 004 315 628
7.1.6.2 Message Flow Diagram (Changing Smartra State – in-correct PIN)
EM S[ lear nt ]
Smar t r a[ lear nt ]
D iag no st ic T est er
Change stat e of Smartra
t o [neutral] request with
PIN number
ACK request
0x49 0x02 0x06 0x08
Smartra3
responds
with a ACK
0x49 0x02 0x06 0x08
EM S receives ACK
IDE request
0x49 S 0x4B + RN1..6
0x69 S IDE1..4 +
ERN1..6 + Stat e byt e
EM S knows t he t ype of Smartra
and t he state the Smartra is in.
Aft er sending IDE request
Neutralise Smartra
Smartra sees the PIN
number is not correct
and responds wit h
negative response
0x49 S 0x4E DPN1..9
EM S sends neut ralise Smartra
command (0x4E) wit h incorrect
PIN code
0x69 S Return
Send Negative response
to test er
Issue Number:
1.0
Dev No.
3881
Valid from:
14/2/06
Print Date:
23 March, 2007
© THIS DRAWING IS THE EXCLUSIVE PROPERTY OF ROBERT BOSCH (AUSTRALIA) PTY. LTD. WITHOUT THEIR CONSENT IT MAY NOT BE REPRODUCED OR GIVEN TO THIRD PARTIES.
DEV04205.9/I-1

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.5
Linearized                      : No
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print, Extract
Page Count                      : 38
Has XFA                         : No
XMP Toolkit                     : XMP toolkit 2.9.1-13, framework 1.6
About                           : uuid:6757209d-7675-48fd-a8b3-4abca0483b2e
Producer                        : Acrobat Distiller 6.0 (Windows)
Create Date                     : 2007:03:26 15:59:24+10:00
Creator Tool                    : PScript5.dll Version 5.2
Modify Date                     : 2007:03:29 15:22:33+10:00
Metadata Date                   : 2007:03:29 15:22:33+10:00
Document ID                     : uuid:3712d7ec-239e-464e-b0f3-d2b061ddbfd0
Format                          : application/pdf
Title                           : Microsoft Word - Appendix H - User Manual.doc
Creator                         : donna3
Author                          : donna3
EXIF Metadata provided by EXIF.tools
FCC ID Filing: LXP-VIMA01

Navigation menu