Your information, and your business interests safe and secure


Maverick Secure LLC’s new product, Maverick 4-F™ is a breakthrough 4-factor password system. It is the most advanced hybrid hardware authenticator with a built-in USB driverless smart card PKI token. It offers an enhanced authentication solution through the integration of a one-time password and well-established PKI functionality. Maverick 4-F™ generates time or event-based one-time passwords in offline mode, meanwhile providing secure storage for credentials and digital certificates when connected in a Public Key Infrastructure (PKI) environment. Maverick 4-F™ complies with the OATH standard algorithms and takes full advantage of the security with the PKI mechanism thereby keeping you, your information, and your business interests safe and secure.


  • Strong four-factor authentication process
  • Most advanced hybrid hardware authenticator with a built-in USB driverless smart card PKI token
  • All-in-one device for strong authentication, secure transaction and data protection
  • Support for a wide range of authentication and access gateway solutions to protect important data
  • Versatility and flexibility by combining OTP generator & encrypted memory of certificate on the same device
  • DirectX support: DX11
  • Open GL: v2.0
  • Video Decode: UVD 2.0 – VC-1, MPEG2, MPEG4
  • HDCP:v1.3b (up to 1080p)
  • Side-Port Memory:128MB (DDR2-800) DP/DVI: 1080p, with Digital Audio (HDMI optional)
  • Max Resolution:2560×1600 @ 32bpp (dual output capable)
  • Dual Display Standard: DVI-DL + VGA, DVI-DL + DP, VGA + DP (HDMI converter optional)

External Connectors:

  • 1 – Ethernet connector (10 / 100/ 1000)
  • 1 – Display Port (DP/DVI, HDMI optional)
  • 1 – Display Port (DVI-DL + VGA, DVI-DL + DP, VGA + DP)
  • 1 – Power Connector (12-24 volts DC @ 3.30amps)


  • High security due to advanced two-factor authentication system
  • Multiple operating system support
  • Web-interfaced management tool for remote management
  • Central authentication for networks or computer operating systems
  • Provision of full configuration and management toolset
  • Advanced pre-sales and after-sales services at a reasonable price


  • Simple Phishing Attacks
  • Real-Time Phishing Attacks
  • Brute-Force Attacks
  • Chosen-Plaintext Attacks
  • Replay Attacks
  • Shoulder Surfing and Snooping