The PKI 8445 Hardware for directly data extraction is a Forensic Hardware Solution to extract data directly from the Main Board of a phone via the JTAG interface. In cases where the main board of a mobile device has survived despite external damage to the phone, a forensic examiner can connect the PKI 8445 Forensic Hardware Solution to extract data directly from the Main Board to the phone via the JTAG interface.
Specification |
Product highlights oh the PKI 8445 Hardware for directly data extraction:
- Physical extraction for the motherboard with JTAG
- Applicable to the damaged mobile device
- Various Mobile CPU support
- Faster and robust extraction function
- Write protection and preservation of evidence
- Save data image file with PKI 8430
Hardware Specification | |
---|---|
Dimensions | 75 x 120 x 18 mm |
CPU | ARM9 |
RAM | 64Mbytes |
Input voltage | DC current 5V/2A |
JTAG clock | 1KHz ~ 50 MHz |
Connector type | 20-pole connector |
Target voltage | 1.8V ~ 5.0V |
Key features |
Data extraction from the board with JTAG interface
- Forensic hardware to read data directly from the mobile device’s motherboard using the JTAG interface
- Advanced extraction functions
- Automatic scanning of partitions
- The selected partition extraction
- Extraction without reference voltage – DMA (Direct Memory Access) type extraction
- Resume extraction of the stopped point
Excellent extraction performance
- 1MB/sec extraction capacity
Ensuring the integrity of evidence data
- Write protection of the evidence data
- 10 hash algorithms like MD5 and SHA256
Mobile CPU support
- CPU family MSM6XXX, MSM7XXX, APQ, Exynos, OMAP, Cortex-A, X-scale series
Ensuring the integrity of evidence data
- Write protection of the evidence data
- 10 hash algorithms like MD5 and SHA256
Product Components
- PKI 8445 Hardware
- Probe connection
- Main adapter
- USB cable
JTAG cable holder
- FPCB connector cable sets
- Manual connection by soldering
Saving image files with PKI 8430
- Saves data as MDF image file with PKI 8430 software