Back to posts
ByteGate FAQ - Access Control System Questions

ByteGate FAQ - Access Control System Questions

Tammy Teng

Tammy Teng

Marketing Lead & Project Strategist | @HumanByte

Published: 1/1/1970

How ByteGate Works

Q: How does ByteGate control access to my locations?

A: ByteGate uses QR code scanning at each entry point. Customers register through ByteKey (our companion app) using phone number verification, then receive a QR code to scan at your door. The system verifies their access permissions and unlocks the door automatically.

Q: What happens if my internet goes down?

A: Each ByteGate controller stores access data locally. If your internet connection drops, registered users can still access immediately using the stored local data. The system continues working without interruption. Once internet reconnects, access logs automatically sync to your cloud dashboard.

Q: What happens during a power outage?

A: The system automatically restarts when power returns. All your settings, access permissions, and time restrictions remain exactly as configured - nothing is lost.

Managing Access & Locations

Q: How do I control who can access my locations?

A: Access is managed through your dashboard. Regular customers are automatically granted access once they complete registration through ByteKey.

For staff members, you can add them to the allowlist - a special designation that:

  • Grants access even outside normal operating hours
  • Excludes their entries from customer traffic counting
  • Helps you easily distinguish between staff activity and customer activity in your logs

You can also maintain a blocklist to immediately revoke access from specific users if needed. All changes take effect in real-time across all locations.

Q: Can I manage multiple locations from one place?

A: Yes. Your cloud dashboard shows all locations in one view. You can monitor access logs, check device status, and manage user permissions across all your sites from any device with internet access.

Q: Can different locations have different operating hours?

A: Absolutely. Each location can have its own operating hours. For example, Location A can operate 24/7 while Location B is restricted to 6 AM - 11 PM. The system enforces these hours automatically.

Q: Can I block specific users immediately?

A: Yes. From your dashboard, you can block any user in real-time. Their access is revoked immediately across all locations.

Monitoring & Data

Q: Can I see who entered and when?

A: Yes. Your dashboard displays access logs showing exactly who entered which location and at what time. You can filter by location, date range, or specific users.

Q: How do I know if my ByteGate controllers are working properly?

A: The dashboard includes device health monitoring. You can see which controllers are online, offline, or experiencing issues. You'll know immediately if a device needs attention.

Q: What data can I access?

A: You can view:

  • Complete access logs (who, when, where)
  • Device status for all locations
  • User permission lists (allowlist/blocklist)
  • Operating hours per location
  • Real-time entry activity

Integration & Customization

Q: Can ByteGate integrate with my existing systems?

A: Yes. ByteGate offers API integration for connecting with your CRM, POS, or membership management systems. We currently integrate with systems like PepperShop and can work with you to connect to your specific platform.

Q: Does this work with my current membership or payment system?

A: ByteGate is designed to integrate with existing systems rather than replace them. Through our API, we can sync with your current membership database, payment platform, or customer management system. The complexity depends on your specific setup - contact us to discuss your integration needs.

User Experience

Q: What do my customers need to access my locations?

A: Customers need a smartphone that can access App Store (iOS) or Play Store (Android) to download ByteKey. The registration process requires:

  • Basic personal information (name, contact details)
  • Phone number verification via SMS
  • Internet connection for initial setup

Once registered, they receive a QR code that works at all your locations.

Q: Why do customers need to provide personal information?

A: Basic customer information serves two purposes:

  • Access verification - ensures only registered, verified users can enter
  • Accountability - helps you identify who accessed your locations and when

This registration process creates a secure, accountable access system for your business.

Q: Is ByteKey difficult for customers to use?

A: No. The process is simple:

  • Download ByteKey app from App Store or Play Store
  • Enter basic personal information
  • Enter phone number and verify with SMS code
  • Receive QR code
  • Scan at door to enter

Most users complete registration in under 2 minutes. Once registered, accessing your locations is as simple as opening the app and scanning their QR code.

Support & Maintenance

Q: Do I need technical knowledge to manage ByteGate?

A: No. The dashboard is designed for business operators, not IT specialists. You can manage access permissions, view logs, and adjust settings without any technical background. If you do have technical knowledge, you'll have more flexibility with customization and API integration.

Q: Do I need to hire IT staff to maintain this?

A: No. We provide support as part of your subscription. Email us or call during working hours, and we'll help you solve any issues. For urgent problems, we respond within 12 hours. During business hours, response is even faster.

Q: What languages does your support team speak?

A: We provide support in German and English.

Hardware & Ownership

Q: What hardware do I need at each location?

A: Each door requires:

  • ByteGate controller (Raspberry Pi-based)
  • QR code scanner
  • Door relay mechanism

We handle hardware selection, installation, and initial configuration as part of the implementation process.

Q: Who owns the hardware after installation?

A: You own the physical hardware. However, ByteGate's cloud platform and software require an active subscription to function.

If you cancel your subscription:

  • You keep the physical hardware
  • Cloud dashboard access ends
  • Software updates stop
  • System integrations (POS/CRM) stop working
  • Local controllers stop syncing new user data

Grace period: You have one month after cancellation to reconsider. During this grace period, all features remain fully active.

Q: What happens to my data if I cancel?

A: Your data belongs to you. Here's what happens:

  • During subscription: Access all your data anytime through the dashboard
  • After cancellation (1-month grace period): Full access continues
  • After grace period: We retain your data for 90 days, then permanently delete it

Important: Request your data export before the grace period ends. After that, data retrieval may require an administration fee.

Q: Where is my data stored?

A: Data is stored in a secure cloud environment with local backup on each controller. Only authorized admins from your business can access it. We comply with GDPR requirements - customers can request data deletion at any time.

Scaling & Growth

Q: Can ByteGate grow with my business?

A: Yes. ByteGate scales from single locations to multi-site operations. The more locations you add, the more efficient your per-location costs become. We work with clients from single-door installations to networks of multiple locations.

Q: What's the implementation timeline?

A: Implementation typically takes 3-4 months from initial consultation to full operation, including:

  • Needs assessment and system design
  • Data migration from existing systems
  • Hardware installation
  • Testing and debugging
  • Staff training and onboarding

Timeline varies based on your data complexity and number of locations.

Current Status

Q: Is ByteGate ready for production use?

A: ByteGate is a beta product actively deployed with select clients. We're honest about this status because it affects both pricing and expectations:

Benefits of beta:

  • Lower costs - significantly more affordable than enterprise systems
  • Direct development input - your needs directly shape future features
  • Flexible customization - we adapt as your requirements evolve
  • Partnership approach - close collaboration, not just vendor-client relationship

Beta realities:

  • System continues evolving based on real-world usage
  • Occasional debugging as new scenarios emerge
  • Features may be added or refined over time

Who this works for: Businesses that prioritize practical solutions and efficiency over brand names, and are willing to provide feedback during real use in exchange for better pricing and customization.

Q: Why choose a beta product?

A: Beta products are ideal for businesses that:

  • Value affordability over enterprise-level pricing
  • Prefer action and efficiency over perfection
  • Are comfortable providing feedback during real-world use
  • Want influence over feature development
  • Need customization flexibility as requirements change

In exchange, you get access to professional access control technology at a significantly lower price point than established enterprise solutions.

Q: How do I get started?

A: Contact us to schedule a consultation. We'll discuss your specific access control needs, assess your current systems, and develop an implementation plan tailored to your business.

Contact Us