YeboTech Technology

Digital Locking systems can support a large number of features.

A large part of the strength in a digitized locking system is not, as you might expect, the physical lock or key. The back-end is what makes it all work, and enables the implementation of powerful security tools. We are constantly working to develop new tools for our system, by listening to what our users need for their infrastructure.

Control Everything at the Press of a Button

All of our locks and keys can be configured and tweaked remotely from a web-app. Configure, Deploy, and Manage your access infrastructure.

YeboManager allows you to manage thousands of keys and locks with ease.

Putting you in control

  • Interval Calendars

    Interval Calendars are restrictions that only allow a key access for a specified time interval. For example, you could give a visitor or contractor a key that will only last for two hours (or any other time period) after which, the key will no longer work

    learn more

  • Calendars

    Calendars are a lot like Interval Calendars. They allow you to restrict a keys access to certain days, and times of days. for example, if your business hours are 9:00 to 17:00 Monday to Friday, you can set your keys to only provide access within that time frame

    learn more

  • Fully Auditable

    And we mean fully audit-able. Every event within the system is logged, and can be traced back to its origin. Both locks and keys remember their own audit trails, and are collected automatically to be viewed on our management web-app. Our digital key is capable of recalling 2,400 audit events, so you can be sure that events are unlikely to slip by unnoticed

    click here for more about auditing

  • Pin Activation

    Secure a key even further by assigning a user pin. With a user pin enabled on your key, it ensures that even if a key is misplaced or stolen that the key cannot be used without also knowing the user pin

    learn more

  • Checkpoints

    Another feature that can be useful for high-security environments. A key can be used for more than just locking and unlocking. With our technology, you can use a key as a means for proof-of-presence. Checkpoints can be set up for security rounds, and can be audited and recorded automatically.

    learn more

  • Multi-key

    Another high security feature, that can add layers of redundancy to your infrastructure, is multi-key. With multikey, it is possible to set up a lock such that it cannot be opened without multiple keys present. This tool makes it so that a lock will not grant access unless two different authenticated keys have been presented within a given interval.

    learn more

  • Blacklist Keys

    Explicitly blacklist keys within the system. If a key goes missing or fails to be returned, blacklisting allows you to restrict access, and get alert audit items when a blacklisted key attempts to open a lock.

  • Automatic Firmware Updates

    An out-of-date system is a system at risk. Our system automatically distributes and installs firmware updates to keys and MFS, ensuring that your hardware is future-proof and up to date. Locks have their own straightforward update process.

What are the specific functions of these features?

What can I use these features for?

 

Time Windows

 

Time windows are a set of temporal rules that describe when a key is allowed to access a lock. Our system is equipped with tools for describing and configuring Time Windows.

For example: You have a visitor coming and they’re going to need a key that should last two hours, but you don’t know when they’re going to arrive. You can create a time window with the rule “This key should last 2 hours, starting when I sync the key”, and that way when your visitor arrives, they can sync the key and get access for two hours. This is called an Interval Calendar

Another application would be to only allow a key to work during work hours. You can use a Calendar to restrict a key such that it only works between certain hours, or on certain days. 09:00 to 17:00 on weekdays would be an example of such a rule.

 

Interval Calendars

Interval Calendars are more dynamic. They can be set to start at an undetermined time, with access being permitted for a specified amount of time thereafter.

Your specified interval could be, for example, 20 minutes. This means that if the interval is started by the key holder at 08:22, access will be permitted until 08:42 - 20 minutes later

Interval calendars can be a little larger in scope too. You could just as easily set your interval to be a number of days or weeks, after which the key won’t work.

Calendars

Having keys with needless permissions can create potential risks to your infrastructure. One clean and easy way to put it out of your mind is to use calendars to describe when a key is allowed to access a lock (or group of locks)

Regular Calendars create temporal rules that are fixed and consistent. Every day, the rule will apply in the same way, at predictable date and times.

If your work hours are 09:00 to 17:00, Monday to Friday, you can create a rule that says keys are not allowed to access locks outside of those times. It is usually a good idea to configure rules like this, as it can make your infrastructure more secure with no added inconvenience.

.

 

Time windowing can be expanded upon with features like Calendar renewal, to add additional layers of security. This means that a user may be forced to sync their key more frequently, which makes it easier for you to keep track of all your keys, or a user may be forced to input a pin that only they know (which will add two-factor authentication to your security infrastructure).

You could even decide to use a combination of all these features, mixing and matching how you see fit.

 

For some security cases, it can be absolutely crucial to minimize the risk of losing or misplacing keys. The Yebotech system already makes this risk vastly reduced, especially compared to traditional locking systems, but sometimes your security demands the enabling of less conventional measures.

One such powerful security measure is pin activation, which ensures that a key by itself is not enough to access specific infrastructure.

 

How does it work?

Pin activation is generally paired with calendar renewal; which allows you to describe how often a key holder should be forced to input their pin.

This extra step is like two-factor authentication, as a user needs to demonstrate something they know as well as presenting their key.

“But the key doesn’t have a keypad…”

Pin entry can be performed at an MFS sync station, or via our YeboSync app. Pin entry also does not require connection to a network, and can be done offline or in locations that have no network connection

Checkpoints

 

For high security environments, you may find value in being able to monitor or audit security guard rounds. This is already built-in, as every door that is accessed by your security staff will record their presence at that location, but can be expanded upon by dedicated checkpoint stations.

Simply insert your key into the station, and the presence of that key is recorded and can be reviewed or automatically parsed on our web-app, YeboManager.

Multi-key

The concept of multi-key is quite straightforward: Multiple keys must be presented to a lock before it will grant access.

Suppose you have valuable stock in the back room, and store protocol is that two employees should be present to move stock from the store, to the shelves. Using Multi-key, two employees will have to present their keys within a certain time, after which the lock will be open. Multi-key isn’t a commonly needed tool, but can greatly increase the security of assets when it is deployed.

Audit, Review, and Examine

 

Fully Auditable

Every event is recorded within the Yebotech system. This means that any action performed on the system - In our web-app, or an action performed directly on Yebotech hardware - is recorded and displayed in the management software

Detailed Statistics

There are a number of insights that are useful for site managers, or management in general. YeboManager provides built-in insights right in the site. Usage statistics, for example, can be displayed for any lock, key, user, or department

Do your own examination

You can easily email or download audit trails as CSV or PDF files, this allows you to parse audit trail history exactly the way you want to

 
 

You can configure your audit history to be as detailed as you want. If you want to get diagnostics in your audit trail, for example, you can enable it system-wide, or on specific keys or locks. This can give you excellent top-down visibility of how healthy your Yebotech hardware is.

Looking for Information not Covered Here?