Home > Zanussi > Key Cutting Machine > Zanussi Ls8 User Manual

Zanussi Ls8 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Zanussi Ls8 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 276 Zanussi manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							engLiSh
    LS8
    instruction Manual
    KEY CUTTING MACHINE  
    						
    							engLiSh
    1.- PreSentation and generaL aSPeCtS
      1.1  general asPects
      1.2 TRANSPORT AND PACKAGING
    2.- teChniCaL SPeCiFiCationS
      2.1 he Machine’s suPPleMentary eleMents
      2.2  the Machine’s Main eleMents
    3.- Starting the maChine
     
    3.1  situating the aPPliance
      3.2  installing and fitting the equiPMent
    4.-  CoPying keyS
     
    4.1   local Mode with no Pc connection.
          4.1.1  inforMation visible on the disPlay in local connection M ode 
          4.1.2  inforMation suPPlied when coPying a texas cryPto    
          4.1.3  inforMation suPPlied when coPying a PhiliPs cryPto ii.  
    						
    							engLiSh
    2.2 the maChine’S main eLementS
    • Two push buttons (READ and COPY).
    • One on/off switch.
    • One female DB9 connector for future RS 232 series line connections.
    • Two USB connectors (CL for CLoner and TR for LS8).
    • One DC power supply connector.
    • One 4x20 character alphanumeric display.
     
    3. Starting the maChine
    3.1 Situating the aPPLianCe
    Once the machine has been carefully unpacked, it must be placed on a 
    surface that is not made of metal or any other material that may generate 
    electromagnetic interference when reading, given that the antenna is the 
    most sensitive area to interferences and therefore to the metal components 
    that distort the signal captured from the key as well as the tuning frequency. 
    As an example: 
    A correct location for situating the machine may be a wooden desk.
    It must also be taken into account that the machine must be situated at 
    a distance of at least between 80 and 100 cm from any electromagnetic 
    interference source (operator screens, televisions, electrical communication 
    elements, motors, walky-talkies, mobile phones, etc.).
    3.2 inStaLLing and Fitting the equiPment
    One positioned correctly, all the material received with the appliance can be 
    installed.
    To do this, proceed as follows:
    1. Check that the material in the box received from the manufacturer is in 
    accordance with point 2.1 of this manual in reference to the elements the 
    machine includes.
    2. Check there is a 110/220V power socket available in the premises and that 
    the power supply received is correct: 100-240 Vac / 50-60Hz and 9V /2A.
     Connect the power supply to the LS8.
    The inclusion of the (4x20) alphanumeric display on the LS8 enables reading 
    of all the transponders to be optimised, thus offering detailed and complete 
    information about them.
    Following, and to summarise, the attached table shows the messages 
    that appear when reading an original key as well as the transponder to be 
    inserted for cloning the key.
    1. PreSentation and generaL aSPeCtS
    1.1 generaL aSPeCtS
    Following the evolution of the LS family, the launch of the new LS8 is 
    presented.
    As such, and taking the renowned and successful LS7 as a base, a more 
    robust and compact machine has been developed that clones most of the 
    encrypted and fixed, automatic and PC mode transponder families available on 
    the market:
    •Megamos fixed code
    •Temic fixed code
    •Nova fixed code
    •Philips fixed and encrypted code
    •Texas fixed and encrypted code
    This evolution is true to the philosophy for the entire LS range, which can be 
    translated as “the simpler the better for the user”.
    In line with this maxim, the LS8 still has the usual READ/COPY buttons 
    present in the entire range.
    In this new evolution, JMA has worked considerably on the technical simpli -
    fication of the solution provided as a whole (LS+TPX Cloner+TX4TECH).
    In fact, substantial effort has been made to compact all the external hard -
    ware and cabling used previously (TPX Cloner + TX4TECH) whose functiona -
    lity is supplied with the codes that bear the original keys from the Texas and 
    Philips Crypto families respectively, in one unit.
    1.2 tranSPort and PaCkaging
    The machine is supplied protected by polystyrene packing and inside a 
    cardboard box with the following dimensions and weight:
    • Width = 275 mm.
    • Length = 320 mm.
    • Height = 170 mm.
    • Weight = 550 g.
    When unpacking the machine, check carefully to see if it has been damaged 
    during transportation. If you find any problems, please contact ERREBI tech -
    nical or customer service department and do not use the machine. 
     
    2.teChniCaL SPeCiFiCationS
    The LS8 duplicating machine, in addition to offering the same and the complete 
    reading and cloning range of the main transponder manufacturers, offers comple-
    te information on the detail of these readings.
    Also, with the compacting of the product (integration of the two external clo -
    ners (TPX+TX4TECH), on a single plate) the errors have been suppressed that 
    are often generated by the client when connecting between the different 
    devices (LS7 TX4TECH TPX).
    The machine is updated using the upper USB port (known as the TR).
    The other USB port (known as the CL), is enabled for updating the new 
    compact Cloner (TPX+TX4TECH), so that new vehicle models can be easily 
    added for later cloning.
    2.1 the maChine’S SuPPLementary eLementS
    After unpacking the LS8 duplicating machine, the following components 
    should be found:
    • Power supply 100-240 Vac / 50-60 Hz and 9V / 2.5 A.
    • USB cable type A-B (1.5 m long), for interconnection between the PC and 
    the LS 8.
    • Instructions manual.
    • TX4 support (two units).
    reF. 
    errebi reSuLt on LS8
    aCtuaL tranSPonder
    t01
    T01 Philips Fixed Copy on T05/01 Philips code Fixed Wedge format
    ID 30C7F1FF07F0E3C7 711C07FEE3FF7F00 Code example on T01 / ID 33
    tP02T02 Texas Fixed
    Copy on TX1 Texas Code Fixed Glass format 23 mm 
    TI ID 00007E62409A00 0000000074717E0000 Code example on a T02 / ID 4C
    t03T03 Megamos fixed code
    Copy on T05 Megamos code Fixed Glass 13 mm
    ID  FF81342019B9C710  FF81342019B9C710 Code example on a T03 / ID 13
    t04T04 Temic fixed code
    Copy on T05 Temic code Fixed Wedge format
    ID 9E8D77DF4000001C  9E8D77DF4000001C Code example on a T04 / ID 11-12  
    						
    							engLiSh
    reF. 
    errebi reSuLt on LS8
    aCtuaL tranSPonder
    t05
    T05 Nova fixed  Copy on T05 Nova code Fixed Wedge format 
    (Universal TP of copy for fixed codes) 
    (Except Texas)
    id bbbbffffffffffff     ffffffffffffffff Code example on a T05 / ID 23
    t06T06/19  Texas Crypto
    Copy on TX2 Texas Code Crypto. Glass 23 mm
    PW: FF    ID: 00    859F11
    MC: 11 LCK: 0010 DST40 Code example on a T06-19 / ID 4D-60
    t07T02 Texas Fixed
    Copy on TX1 Texas Code Fixed Wedge format Read 
    = T02.
    TI ID 00007E62409A00 0000000074717E0000 Code example on a T07 / ID 4C
    t08LCK T08 Megamos Cry.
    Mire manual TP Megamos Code Glass Crypto 13 mm
    UM1 A1618765  WD1-WD0 Code example on a T08 / ID 48
    t09T09 Phil Crypto OP
    Copy on T05 Philips Code Crypto first generation 
    OPEL load
    30007E00008E03F8 8F1F380EE0FF0F1C Code example on a T09 / ID 40
    T09 Phil Crypto OP
    Cannot be duplicated Philips Code Crypto first generation 
    OPEL load
    30FF7F0000801FF8
    FF1F0700E0FF0F1C Code example on a T09 / ID 40
    t10T10 Phil Cry WS
    Copy on th1 Philips Code Crypto first generation 
    VW code
    id  30F871E0C7FF033f    FE1F000000000000 Code example on a T10 / ID 42
    t11LCK T08 Megamos Cry.
    Mire manual TP Megamos Code Crypto. Wedge format
    ID CA06662B   T08    MGI
    UM1 A9C08765 WD1-WD0 Code example on a T11 / ID 48A
    t12T12 Philips Crypto
    Copy ontPx4 Philips Code Crypto. PSA-HYU-KIA-
    hon
    ID  EF791717
    MODE LCK MANCHESTER Code example on a T12 / ID 46
    t13T13 Phil Cry NISSAN
    Copy on th1 Philips Code Crypto. first generation 
    NISSAN load
    ID  3007EFF3F001C07
         FEFF3F001CF88F1F Code example on a T12 / ID 46
    t14T14 Phil Cry VOLKSW
    Copy on th1 Philips Code Crypto second generation 
    vw
    ID  AA03554E4C4F434B
          000000000030F0303 Code example on a T14 / ID 44
    T14 Phil Cry VOLKSW Cannot be duplicated Philips Code Crypto second generation 
    vw
    ID  AA054C4F434B4544
          00000000007FF0303 Code example on a T14 / ID 44
    t16T16 Phil Cry PG
    Copy on th1 Philips Code Crypto first generation 
    Peugeot
    ID  FFFFFFFFFF30021F      8F32C3FFFFFFFFFF Code example on a T16 / ID 45
    t17T17 Temic Crypto.
    Mire manual TP Temic code Crypto. Wedge. Mazda/
    Ford
    ID  D41208B5D41208B5 Code example on a T17 / ID 8C
    t18T18 MOTOROLA
    Mire manual TP Motorola Indala (Lincoln MARK VIII)
    reF. 
    errebi reSuLt on LS8
    aCtuaL tranSPonder
    t19
    T06/19  Texas Crypto Copy on TX2. Texas Code Crypto. Wedge format
    PW: FF    ID: 00    C11520
    MC: 0B LCK: 0010 DST40 Code example on a T06-19 / ID 4D-60
    t20T20 Texas Cry. FORD
    Copy on TX2 Texas Code Crypto. Wedge format 
    ford
    PW: 03    ID: 00   2FAC03
    MC: 01 LCK: 0010 DST40 Code example on a T20 / ID 4D-63
    t21T21 Texas Cry. REN.
    Copy on TX2 Texas Code Crypto. Wedge. RENAULT/
    JEEP/CHRYSLER
    PW: FF    ID: 00  DD7D11
    MC: 10 LCK: 0010 DST40 Code example on a T21 / ID 4D-64
    t22T22 Meg Cry SEAT
    Mire manual TP Megamos Code Special crypto. SEAT 
    2005
    UM1 E04EC658  WD1-WD0
    UM2    BC38D0002A5112b3 Code example on a T22 / ID 48
    t23T23 Meg Cry VOLKSW
    Mire manual TP Megamos Code Special crypto. VW 
    2005
    UM1 E04EC658  WD1-WD0
    UM2    BC38D0002A5112B3 Code example on a T23 / ID 48
    t24T24 Meg Cry SKODA
    Mire manual TP Megamos Code Special crypto. SKODA 
    2005
    UM1 E04EC658  WD1-WD0
    UM2    BC38D0002A5112B3 Code example on a T24 / ID 48
    t25T25 Meg Cry AUDI
    Mire manual TP Megamos Code Special crypto. AUDI 
    2005
    UM1 E04EC658  WD1-WD0
    UM2    BC38D0002A5112B3 Code example on a T25 / ID 48
    t26T26 Texas Cry MIt
    Copy on TX2. Texas Code Crypto. Wedge.  MITSUBISHI
    PW: 19    ID: 00  3D4752
    MC: 05 LCK: 0010 DST40 Code example on a T26 / ID 4D-61
    t27T27 Texas Cry SUZ
    Copy on TX2. Texas Code Crypto. Wedge format  
    SUZUKI
    MC: 10 LCK: 1010 DST40 Code example on a T27 / ID 4D-65
    t28T28 Tex Cry MIT2
    Copy on TX2. Texas Code Crypto. Wedge.  MITSU-
    bishi 2
    PW: FF    ID: 00  E6820b
    MC: 11 LCK: 1010 DST40 Code example on a T28 / ID 4D-62
    t29T29 Tx Cry LX/Toy
    Copy on TX2. Texas Code Crypto. Wedge.  LEXUS/
    toyota
    PW: B0    ID: 65  7F6949
    MC: 14 LCK: 1111 DST40 Code example on a T29 / ID 4D-68
    t30T30 Tx Cry TOY/SC
    Copy on TX2. Texas Code Crypto. Wedge.  TOYOTA/
    scion
    PW: B2    ID: 31  61F846
    MC: 12 LCK: 1111 DST40 Code example on a T30 / ID 4D-67
    t31T31 Tx Cr YAMAHA
    Copy on TX2. Texas Code Crypto. Wedge format 
    yaMaha
    PW: FF    ID: 00  590600
    MC: 13 LCK: 0011 DST40 Code example on a T31 / ID 69
    t32T32 SOKYMAT Crypto
    Mire manual TP Megamos Code Crypto. 2nd generation 
    wedge HONDA/AUDI
    ID  00000000000000000 Code example on a T26 / ID 4D-61  
    						
    							engLiSh
    4 .CoPying keyS
    The steps to be followed in order to make a copy are:
    4.1 LoCaL mode With no PC ConneCtion
    •After entering the customer’s original key in the antenna housing, press 
    the read button. A message will appear advising the transponder’s ERREBI 
    type-reference that contains the original key read, as well as the transponder 
    on which ERREBI advises the duplicate.
    Covers all fixed and most encrypted transponders (Texas/Philips). If the 
    transponders were encrypted from other brands such as Megamos or Temic, 
    the device will show the transponder’s identification with its ERREBI reference 
    and will advise how to proceed to activate the key, generally redirecting to the 
    transponder’s manual and the use of a programming machine (TRACK7).
    •Next, and following the step-by-step indications on the display, the key is 
    removed and the new key entered on which the copy will be made together 
    with its corresponding transponder. 
    When making the copy, it is advisable to enter the key in a non-mechanical 
    manner, since due to the shavings or burrs that may remain on the key 
    that may interfere with the equipment’s electronics if they fall through the 
    antenna or because the copy may be defective, it is preferable to cut the key 
    after successfully completing this section.
    •Once the copy has been made, the device itself will indicate whether the 
    key is correct or erroneous.
    In the case that more than one copy of the same key is required, repeat all 
    the steps in the previous paragraphs, keeping in mind that it is advisable 
    to use the original key provided by the customer as the base and the exact 
    transponder with the reference recommended by ERREBI as the “copy base”.
    The only exception is for the Philips Crypto, for which as many copies as 
    desired can be made without having to go through the entire process again.
     
    4.1.1 inFormation viSibLe on the diSPLay in LoCaL 
    ConneCtion mode
    When cloning the encrypted transponders, Texas as well as Philips, there is 
    no need for a connection to the PC or to the external cloning device coupling 
    (TPX Cloner + TX4TECH), given that in the LS8’s new and compact design, all 
    functionalities have been included in one unit.
    During initialisation, the following messages will be shown on the display:
    ERREBI LS8
    S/N: 0123456789ABCDEF FWR: xx
    CLR: TPx CLONER FOuND
    The three first rows show the name, serial number and firmware version of 
    the LS8.
    The last row shows, successively and alternately, the messages that 
    indicate whether or not the Texas and Philips encrypted transponder copy 
    functions are enabled.
    The message “TPX Cloner Found” indicates that the LS8 is operational for 
    cloning the Texas Crypto.
    Next, the “TX4TECH Found” message will appear, which indicates that the 
    LS8 is also operational for cloning the Philips Crypto.
    Tx4TECH FOuND TPH vER.: 39.1.6
    Finally, after the message “TX4TECH found”, the firmware version will be 
    displayed that controls the cloning of the Philips Crypto and which can be easily 
    updated using the CL USB port.
    if you have any problems or questions, 
    please contact technical support:.
    If the key entered has a first generation Texas Crypto transponder that is 
    not recognised by the LS8 and thus does not appear in the above table, the 
    display will show the following message:
    texas cryPtocoPy on tx2 ttexas 
    code cryPto.  wedge forMat. 
    PW: 00    ID: 00  30B5B9
    MC: 02 LCK: 0010 DST40
    Code example on a  TXX / ID 6F-XX
    the tX1 and tX4 can be programmed as many times as 
    desired. this is not the case with the tX2. because it is 
    an otP (one time programmable) transponder, it can only 
    be recorded once, after which it will be disabled for future 
    copies on the same transponder.
    Similarly: if the key entered does not have a transponder, the display will 
    show the following advice message:
    NO CHIP
    NO TRANSPONDER
    it must be mentioned that some high range cars, 
    bmW, merCedeS use a rolling code system (evolutionarily 
    encrypted), from the appearance of the first vehicles from around 
    1995, and although the machine shows that the copy is possible, 
    this cloning will not be valid because the codes constantly 
    evolve following an unknown protocol. avoid duplicating the 
    keys for vehicles with manufacturing dates after 1995.
    reF. 
    errebi reSuLt on LS8
    aCtuaL tranSPonder
    t33
    T33 Texas-Cry 3GEN FORD-Copy onTPX2. Texas Code Crypto. 2Gen. Wedge. 
    ford
    PW: 03    ID: 80  81DCBE
    MC: 01 LCK: 0010 DST40 Code example on a T33 / ID 6F-63
    T33 Texas-Cry 3GEN
    FORD-Mire manual TP Texas Code Crypto. 3Gen. Wedge. 
    ford
    PW: 03    ID: 80  FB4FA6
    MC: 01 LCK: 0010 DST80 Code example on a T33 / ID XX
    t34T34 Texas-Cry 3GEN
    TOYO-Mire Man.TP Texas Code Crypto. 2Gen. Wedge.  
    toyota
    PW: 37    ID: 96  3DF27F
    MC: 80 LCK: 1111 DST40 Code example on a T34 / ID XX
    TEXAS CRYPTO ++
    Mire Manual tP Texas Code Crypto. 3Gen. Wedge.  
    toyota
    PW: 36    ID: 98  FAA182
    MC: 80 LCK: 1111 DST80 CODE EXAMPLE ON A T34 / ID XX
    tP35T35 Texas-Cry 3GEN
    TOYO-Copy onTPX2 texas code cryPto. 2gen. wedge  
    toyota
    PW: 33    ID: 0F  348CBC
    MC: 0C LCK: 1111 DST40 Code example on a T35 / ID 6F-70
          
    						
    							engLiSh
    4.1.2 inforMation suPPlied when coPying a texas cryPto 
    Next, the process will be shown for cloning a Texas Crypto transponder that 
    is mounted for example on a Ford Focus (2007) and the messages shown on 
    the LS8 display:
    INSERT KEy 
    PRESS READ
    Once the original key is analysed, the following detailed information will be 
    shown:
    • ERREBI code for the chip that holds the key (T 20).
    • Transponder type and manufacturer (Texas Crypto).
    • Manufacturer of the vehicle that uses it (FORD).
    • The ERREBI transponder that must be used for cloning this key (TX2).
    • Information about the transponder’s internal structure, which will be 
    different depending on the chip manufacturer. As an example, a FORD key 
    would be (Password: 03, Manufacturer’s code: 01, Serial number: 00 and 
    User serial number: 2FAC03, bits locked, which refers to the write-protected 
    information pages, 0010 (Pag3 LOCK) and finally if the old DST40 algorithm 
    or the new DST80 is used).
    T20 TExAS CRy FORD COPy ON Tx2
    PW: 03    ID: 00   2FAC03
    mC: 01 LCK: 0010 DST40
    After entering the ERREBI (TX2) transponder on which the cloning on the 
    antenna will be carried out, press the COPY button.
    READy TO COPy PRESS COPy
    The LS8 will begin to analyse the transponder from the original key 
    entered.
    PLEASE WAIT
    ............................
    Once discovered, this information will be written on the TX2 and it will beep 
    once if the copy is executed correctly.
    COPy OK
      ExTRACT KEy
    4.1.3 inforMation suPPlied when coPying a PhiliPs cryPto ii.
    To finalise, it shows the cloning process of a second generation Phillips 
    Crypto transponder, HT2, used by a Citroen C3 and the messages that would 
    display TRS EVO. 
    INSERT KEy 
    PRESS READ
    Once the original key is analysed, the following information will be shown:
    • ERREBI code for the chip that holds the key (T 12).
    • Chip model included (PCF7941).
    • Transponder type and manufacturer (PHC – Philips Crypto).
    • The ERREBI transponder that must be used for cloning this key (TX4).
    •Information about the transponder’s internal structure, which will be  different depending on the chip manufacturer. As an example, a CITROEN 
    key would be (Serial number: B9B66969, if it is write-protected (LOCK) and 
    the type of coding used (Manchester)).
    T12-PCF7941 PHC
    COPy ON Tx4ID: B9B66969
    mODE LOCK mANCHESTER
    To activate the TX4TECH mode supported by Philips Crypto, the process com-
    mences by pressing the COPY key on the original key.
    DO NOT REmOvE THE KEy  PRESS COPy
    While the HT2 algorithm used by Philips Crypto second generation is being 
    loaded into the memory, the LS8 will display the following message:
    PLEASE WAIT
    ............................
    When the FPGA has loaded the corresponding memory, the following will be 
    shown on the display:
    TPx CLONER READy ............................
    And the LS 8 will be ready for analysing and completing the following steps, 
    requesting a return to read the original key:
    PRESS [READ]
    Next, the transponder’s type and brand will be indicated, as well as whether 
    it is an original transponder or a copy (Philips crypto type):
    PHILIPS CRPTO
    PHILIPS CRyPTO TyPE
    A Virgin TX4 must then be entered to configure it in capture mode (Sniff) 
    and to be able to capture the data, verifying that the copy has been made 
    correctly.
    INSERT vIRgIN Tx4 PRESS [COPy]
    SuCCESS 
    gO TO CAR & SNIFF
    The LS8 will wait until the data stored in a TX4 are introduced (these data 
    contain the information flows that are transmitted between the ECU and the 
    original key). 
    INSERT SNIFF Tx4 PRESS [READ]
    This data will be stored in the LS8’s RAM memory so that it is available 
    during the search process.  
    						
    							engLiSh
    DATA SNIFFED Tx4COPy? CP=yES
    With successful conclusion in this case, the data preparation process conside-
    red in (Step 2) prior to the actual search is:
    STEP 2 SuCCESS
    Next, and using the information provided from the sniff, attempt to access the 
    transponder’s internal information pages:
    INSERT ORIgIN KEy PRESS [COPy]
    The search process duration is totally variable and depends on from where 
    the data is stored in the 24GB’s from available information:
    PROCESSINg
    00 %
    Once access is available to the transponder records map, the data is copied 
    either from the same transponder during the sniff process or from another TX4, 
    indicating whether or not the copy has been made successfully.
    KEy FOuND
    RE-INSERT Tx4
    COPy?    CP=yES
    i
    SuCCESS 
    The Philips Crypto II family provides the possibility to clone as many 
    transponders as required by pressing COPY once the information in the RAM 
    memory is available in the LS8.
      
    mAKE ANOTHER COPy? COPy?     CP=yES  
    						
    							deutSCh
    LS8
    bedienungsanleitung
    KOPIERMASCHINE  
    						
    							deutSCh
    1.-  einFührung und aLLgemeine aSPekte
     1.1 allgeMeines
      1.2 TRANSPORT UND VERPACKUNG
    2.-  teChniSChe eigenSChaFten
      2.1  zusätzliche geräteteile 
      2.2  hauPtbestandteile des geräts
    3.-  inbetriebnahme deS gerätS
     3.1 Positionierung des geräts
      3.2  aufbau und einstellung des geräts
    4.-  .koPieren von SChLüSSeLn
      4.1  eigenständiger Modus ohne anschluss an den Pc     
          4.1.1  DSPLAY-INFORMATIONEN IM EIGENSTäNDIGEN BETRIEB   
          4.1.2  BEIM KOPIEREN EINES TEXAS CRYPTO-TRANSPONDERS ANGEZEIGTE  IN 
         forMationen
          4.1.3  BEIM KOPIEREN EINES PHILIPS CRYPTO- II-TRANSPONDERS ANGEZEIGTE   
         inforMationen.  
    						
    All Zanussi manuals Comments (0)