CN115601092A - Management method and system of network booking room - Google Patents

Management method and system of network booking room Download PDF

Info

Publication number
CN115601092A
CN115601092A CN202110718125.8A CN202110718125A CN115601092A CN 115601092 A CN115601092 A CN 115601092A CN 202110718125 A CN202110718125 A CN 202110718125A CN 115601092 A CN115601092 A CN 115601092A
Authority
CN
China
Prior art keywords
house
information
door lock
east
room
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110718125.8A
Other languages
Chinese (zh)
Inventor
黄仕豪
陆俊骏
孙伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changzhou Yonganhang Intelligent Technology Co ltd
Original Assignee
Changzhou Yonganhang Intelligent Technology Co ltd
Youon Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changzhou Yonganhang Intelligent Technology Co ltd, Youon Technology Co Ltd filed Critical Changzhou Yonganhang Intelligent Technology Co ltd
Priority to CN202110718125.8A priority Critical patent/CN115601092A/en
Publication of CN115601092A publication Critical patent/CN115601092A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0637Strategic management or analysis, e.g. setting a goal or target of an organisation; Planning actions based on goals; Analysis or evaluation of effectiveness of goals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Educational Administration (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Tourism & Hospitality (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides a management method and a system of a network-bound house, which effectively and comprehensively collect information of landlords, tenants and house resources, record house information and house renting records in detail, and are provided with a flow type identity verification link in two important links of on-line of the house resources and house unlocking, so that the safety of landlord identity, house information and tenant identity is ensured; the system is also connected with a public security system, and the public security system can call the information in real time to carry out public security management; the intelligent house renting management system has the advantages that flexible application and management mechanisms of renting at any time and withdrawing at any time are realized, functions of tracking the whole renting state, opening a door by a tenant without a key, entering the house and the like are further realized, the convenience in use of house renting service is greatly improved, the popularization rate and the utilization rate are improved, and the safety risk of renting in a cyber-contractor house is reduced.

Description

Management method and system of network booking room
Technical Field
The invention relates to the technical field of network reservation rooms, in particular to a management method and a management system of the network reservation rooms.
Background
The house leasing is used as an important component of urban service, and the house leasing is used as a mode for solving housing problems for people to a new place for relieving problems of urban house resources and the like, has irreplaceable effect, and the house leasing industry in the world enters a brisk development stage.
The current house leasing mode comprises a hotel mode providing services by an enterprise, a short lease mode and a long lease mode provided by family individuals, and the like, and the implementation mechanism of an internet platform connecting a client and a house leasing provider is that the house leasing provider manually adds house source information by using an intelligent mobile terminal APP and a website, and the client realizes the management of leasing by clicking an order through the intelligent mobile terminal APP and the website. The management mechanism of the internet house leasing system is mainly characterized in that house state information is manually input by a house leasing provider on a service management background system, a house leasing client clicks and places an order, and then the house leasing provider receives the order through the internet.
The traditional house leasing internet leasing platform system has the following problems in popularization and application: 1. because the hotel room renting and room returning are based on manual entry to update information, one hotel needs to arrange full-time personnel to process the order information of customers, the operation cost is increased, and errors of manual entry information are frequently encountered in the actual use process; 2. in a hotel, a professional must be arranged to handle an access card or provide a key for the entrance of a client, and the client may not keep the access card or the key well and is inconvenient; 3. the short-rent house renting willingness is low due to the fact that the short-rent personal landlord cannot stay in a room all the time due to personal time arrangement reasons such as working and the like, and the client cannot see that the landlord cannot hold the key, and the short-rent house renting willingness is limited; 4. state information such as the absence or the presence of a house cannot be shared in time, for example: the hotel or the individual landlord already rents out the house, and the new client cannot share the information because the information is not updated on the network platform, so that the client has to return the house after repeatedly ordering, and in addition, the client misses the ordering of the new client because the information is not updated in time after returning the house. In addition, the existing network contract room has complicated personnel entering and exiting, difficult identity verification of tenants and security loopholes in public areas.
Disclosure of Invention
In order to overcome the technical defects, the invention aims to provide a method and a system for managing a network contract house, which can comprehensively collect identity information of landlords and tenants to ensure the safety of the field of the network contract house.
The invention discloses a management method of a network contract house, which comprises the following steps: the user side uploads user identity information to the management side, the management side audits the user information, and the user information which passes the audit is marked as an authentication user; the east-house end uploads the identity information of the east-house to the management end, the management end audits the east-house information, and the east-house information passing the audit is marked as an authenticated east-house; the east end of the house controls the opening or closing of each room door lock, and the authenticated user and the east end of the house perform information interaction to realize the opening or closing of the room door lock; each east end of the house is associated with at least one room door lock, the room door lock associated with the authenticated east is connected with the management end, and the opening or closing information of the room door lock is obtained; the safety guarantee system is connected with the management end and used for acquiring the landlord information, the house source information corresponding to the room door lock associated with the landlord end and the information of the authenticated user and the opening and booking records of the authenticated user.
Preferably, the user uploading the user identity information to the management terminal, the management terminal auditing the user information, and marking the user information that is approved as the authenticated user includes: the user side uploads the identity card information of the user to the management side and carries out face recognition, the management side verifies the authenticity of the identity card information of the user and verifies whether a face recognition result is matched with the identity card information, and if the identity card information passes the verification, the user information is marked as an authenticated user; the east end uploads the identity information of the landlord to the management end, the management end audits the landlord information, and the landlord information which passes the audit is marked as the certified landlord, wherein the landlord identity information comprises the following steps: the east-house end uploads the identity card information of the east-house and the registration information of the house source to the management end, carries out face recognition, and the management end examines the authenticity of the identity card information of the east-house and the registration information of the house source and examines whether the face recognition result is matched with the identity card information, and if the identity card information and the registration information of the house source pass through, the east-house end marks the east-house information as an authenticated east-house.
Preferably, the user side and the landlord side comprise door lock lists integrated with all room door locks related to the certified landlord, the door lock lists comprise an online chamber booking door lock and an offline chamber booking door lock, and the display priority of the online chamber booking door lock is higher than that of the offline chamber booking door lock.
Preferably, each room door lock in the door lock list is provided with a tag, and the tags include a plurality of types of default tags and a plurality of types of other tags; the door lock name of each room door lock in the door lock list is an editable name, and the label is an editable label; the landlord end edits the room door lock and the label, and the edited door lock name and the label are displayed at the landlord end and the user end; the room door locks of the same type of tags in the door lock list have the same display priority, and the display priority of the room door locks without the type of tags is the sequence of the first letters of the tags; the system further comprises a top room door lock, and the top room door lock is highest in display priority.
Preferably, the associating of each east end of the house with at least one room door lock comprises: and the east end of the house adds the related room door lock through the online request and the offline request, and if the request is the online request, the east end of the house needs to perform operating qualification authentication and face identification.
Preferably, the authenticating the user and the landlord terminal to perform information interaction to open or close the door lock of the room includes: the authentication user sends a lodging request to the east end, the east end receives the lodging request and issues an unlocking authority to the authentication user through the management end, and the authentication user unlocks a room door lock through the unlocking authority within a preset time period after receiving the unlocking authority; the unlocking authority comprises a randomly generated password and a two-dimensional code; and the room door lock after successful unlocking sends unlocking information to the management terminal.
Preferably, the authenticated user sends a lodging request to the east end, the east end receives the lodging request and issues an unlocking authority to the authenticated user through the management end, and the authenticated user unlocks the room door lock through the unlocking authority within a preset time period after receiving the unlocking authority further comprises: the method comprises the steps that an authenticated user sends a lodging reservation request to a homeowner end, the lodging reservation request comprises a lodging time period, the homeowner end receives the lodging request and issues unlocking authority to the authenticated user through a management end, and the authenticated user unlocks a room door lock through the unlocking authority in the lodging time period.
Preferably, the authenticating the room door lock associated with the landlord is connected to the management end, and the landlord end controlling the opening or closing of each room door lock includes: the authentication landlord sets the associated room door locks as available door locks and standby door locks, the available door locks are connected with the management end, and the landlord end controls the opening or closing of each available door lock.
Preferably, the authenticating user sends a lodging request to the east end, and the east end receives the lodging request and issues an unlocking right to the authenticating user through the management end, and then the method further includes: when the door lock of the room is in an unlocked state, the room is automatically electrified; the method comprises the steps that a user side sends refuge information to a landlord side, wherein the refuge information comprises refuge time; and after the room retreating time, the power supply of the room with the locked door lock of the room is automatically closed.
The invention also discloses a management system of the cyber-contracting room, which is characterized by comprising a user side, an east side, a management side and a room door lock; the user side uploads user identity information to the management side, the management side audits the user information, and the user information which passes the audit is marked as an authentication user; the east-house end uploads the identity information of the east-house to the management end, the management end audits the information of the east-house and marks the information of the east-house passing the audit as a certified east-house; the east end of the house controls the opening or closing of the door lock of each room, and the authenticated user performs information interaction with the east end of the house to open or close the door lock of the room; each east end of the house is associated with at least one room door lock, and the room door lock associated with the authenticated east end of the house is connected with the management end to obtain the opening or closing information of the room door lock; the safety guarantee system is connected with the management end and used for acquiring the landlord information, the house source information corresponding to the room door lock associated with the landlord end, and the information of the authenticated user and the records of room opening and room booking of the authenticated user.
After the technical scheme is adopted, compared with the prior art, the method has the following beneficial effects:
1. the method has the advantages that the information of the landlord, the tenant and the house source is effectively and comprehensively collected, the house information and the house renting record are recorded in detail, and a flow type identity verification link is arranged in two important links of the house source online and house unlocking, so that the safety of the landlord identity, the house information and the tenant identity is ensured; the system is also in butt joint with a safety guarantee system, and the safety guarantee system can call the information in real time to carry out public safety management; the intelligent house renting management system has the advantages that flexible application and management mechanisms of renting at any time and withdrawing at any time are realized, functions of tracking the whole renting state, opening a door by a tenant without a key, entering the house and the like are further realized, the convenience in use of house renting service is greatly improved, the popularization rate and the utilization rate are improved, and the safety risk of renting in a cyber-contractor house is reduced.
Drawings
FIG. 1 is a flow chart of a management method of a network contract house provided by the invention;
fig. 2 is a schematic diagram of information flow interaction in the management method of the network contract room provided by the invention.
Detailed Description
The advantages of the invention are further illustrated in the following description of specific embodiments in conjunction with the accompanying drawings.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings in which the same numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. The word "if," as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination," depending on the context.
In the description of the present invention, it is to be understood that the terms "longitudinal", "lateral", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on those shown in the drawings, and are used merely for convenience of description and for simplicity of description, and do not indicate or imply that the referenced devices or elements must have a particular orientation, be constructed in a particular orientation, and be operated, and thus, are not to be construed as limiting the present invention.
In the description of the present invention, unless otherwise specified and limited, it is to be noted that the terms "mounted," "connected," and "connected" are to be interpreted broadly, and may be, for example, a mechanical connection or an electrical connection, a communication between two elements, a direct connection, or an indirect connection via an intermediate medium, and specific meanings of the terms may be understood by those skilled in the art according to specific situations.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
Referring to fig. 1, the present invention discloses a management method of a network contract house, including:
auditing user identity information: the user side uploads user identity information to the management side, the management side verifies the user information, and the user information passing the verification is marked as an authentication user, namely, a user qualified for online house reservation.
And (4) auditing the identity information of the landlord: the east-house end uploads the identity information of the east-house to the management end, the management end audits the east-house information, and the east-house information which passes the audit is marked as a certified east-house, namely the east-house which is qualified to rent and manage the online house;
the on-line interaction between the landlord and the user comprises the steps of booking a house, issuing unlocking authority and the like: the east end of the house controls the opening or closing of each door lock of the house, and the authentication user performs information interaction with the east end of the house to realize the opening or closing of the door lock of the house;
the information of the contracted housing is uploaded to the management end, and the information interaction content between the landlord and the user is uploaded to the management end or the management end participates in a plurality of links, for example, the unlocking authority of the management end is issued to the user: each east end of the house is associated with at least one room door lock, the room door lock associated with the authenticated east is connected with the management end, and the opening or closing information of the room door lock is obtained;
all the network contracting room information comprises user information, landlord information, house information and housing information which are all in butt joint with the safety guarantee system, and the safety guarantee system is convenient to acquire in real time according to needs: the safety guarantee system is connected with the management end and used for acquiring the landlord information, the house source information corresponding to the room door lock associated with the landlord end, and information of the authenticated user and the record of opening and booking the house of the authenticated user.
Generally, the method is realized based on the mobile terminal APP and the background management platform. Referring to fig. 2, the landlord controls the switching authority of the intelligent door lock. The information interaction between the background management platform and the tenants comprises house booking information uploaded by the tenants to the background management platform, identity card information uploaded by the tenants, tenant information uploaded by the background management platform, unlocking authority issued by the background management platform to the tenants, a successful check-in notification short message and the like. After the tenant obtains the unlocking authority, the intelligent door lock is successfully unlocked, and the unlocking information is uploaded to the background management platform to be stored. And the information interaction between the background management platform and the landlord comprises house source registration information, door lock installation/maintenance information and the like. The information interaction between the safety guarantee system and the background management platform comprises the steps that the background management platform uploads house source information, unlocking information, house returning information and the like to the safety guarantee system, and the safety guarantee system sends a tenant information comparison result, a remote unlocking request and the like to the background management platform. The information interaction between the security guarantee system and the landlord comprises that the landlord uploads identity registration and house source information to the security guarantee system, and the security guarantee system issues registration identification and the like to the landlord.
The method for managing the network contract room has strong safety and high information transmission rate, meets the actual requirements of different identity users such as a safety guarantee system, a network contract room owner, a network contract room tenant and the like, and is suitable for the whole life cycle of a mobile terminal APP and a door lock management background.
Preferably, the auditing the user identity information specifically includes:
the user side uploads the identity card information of the user to the management side to verify the legal identity of the user and stores the identity card information, silent type living body detection is carried out, and face recognition is generally adopted;
the management terminal verifies the authenticity of the identity card information of the user and verifies whether the face recognition result is matched with the identity card information, if the face recognition result is passed through the identity card information, the user information is marked as an authenticated user, and the network contract can be normally carried out; if one item does not pass, rejecting the contracting application and indicating which information is uploaded again to pass the examination;
and uploading the house source registration identification on the landlord, carrying out authenticity identification on the house source registration identification by the management terminal, and storing and recording if the house source registration identification passes the management terminal.
The landlord identity information auditing method specifically comprises the following steps:
the east-house end uploads the identity card information of the east-house and the registration information of the house source to the management end to verify the legal identity and store the legal identity, silent living body detection is carried out, and face recognition is generally adopted;
the management end examines the authenticity of the identity card information of the landlord and the registration information of the house source, examines whether the face recognition result is matched with the identity card information or not, if the identity card information and the face recognition result are passed, the landlord information is marked as an authenticated landlord, and the landlord can be normally contracted; if one item does not pass, the house source on the shelf is refused to apply or the house source management qualification is refused, and the information of which is uploaded again is indicated to pass the examination.
Preferably, the mobile terminals APP of the user side and the east side of the house comprise a door lock list integrated with all room door locks related to the authenticated owner of the house, and the door lock list comprises an online booking door lock and an offline booking door lock. The offline room-booking door lock is the owner's individual door lock and is not managed by the background management platform. On the mobile terminal APP, the display priority of the on-line booking door lock is higher than that of the off-line booking door lock, namely, the front of the off-line door lock of the on-line door lock is preferentially displayed.
Specifically, the display of the door lock on the mobile terminal APP is classified and displayed according to the systems of 'all', 'network contract door lock' and 'non-network contract door lock'.
Preferably, each room door lock in the door lock list is provided with a tag, the tag is an editable tag, the editing authority is only provided for the landlord, the tag comprises a plurality of types of default tags and a plurality of types of other tags, the default tags can be tags with strong universality such as 'home', 'company', 'school', and the like, and the other tags are personalized and customized for the landlord. The display of the subsequent door lock on the mobile terminal APP is carried out according to the label: the display priorities of the door locks on the same label are the same, and the display priorities of the door locks on different labels can be sorted according to the first letter.
The door lock name of each room door lock in the door lock list is an editable name, and the display of the door locks in the same tag may be sorted by the first letter of the door lock name or the door lock number.
The edited door lock name and label are displayed at the east end of the house and the user side at the same time, so that the management of the east end of the house and the use of the user are facilitated.
The system is characterized by further comprising a top room door lock, the display priority of the top room door lock is highest, top display is carried out on the APP at the mobile terminal, and the APP can be used as a main management house of a landlord and can also be used as a most frequently used house of a user to display.
Preferably, the landlord end requests to add the related room door lock through online and offline, and when the added house source is a non-network-constrained room door lock, the adding can be directly performed without face recognition; when the door lock is a door lock for the cyber-contract, the operation qualification certification and the face recognition of the owner are required.
Specifically, the method comprises the steps of firstly selecting network contract door lock addition or non-network contract door lock addition on a mobile terminal APP, uploading a registration mark on a qualification certification page when the network contract door lock addition is selected, firstly uploading the front and back of an identity card in an identity certification link, automatically reading certificate information, and manually modifying if the certificate information is wrongly read.
Preferably, the authenticated user sends a lodging request to the landlord end, the landlord end receives the lodging request and issues the unlocking authority to the authenticated user through the management end, and the authenticated user unlocks the room door lock through the unlocking authority within a preset time period after receiving the unlocking authority. The unlocking authority comprises a randomly generated password and a two-dimensional code. And the room door lock after successful unlocking sends unlocking information to the management terminal.
Furthermore, the authenticated user can also send a lodging reservation request to the homeowner end, the lodging reservation request comprises a lodging time period, the homeowner end receives the lodging reservation request and issues the unlocking authority to the authenticated user through the management end, and the authenticated user unlocks the room door lock through the unlocking authority in the lodging time period.
It can be understood that the opening time of each unlocking authority is limited, the unlocking time of the first unlocking mode is automatically calculated from the time of issuing the unlocking authority until the opening time is full, and the authority is closed; and the second reserved unlocking mode can automatically select the opening time starting point of the unlocking authority, so that the method is more flexible.
It should be noted that, in order to ensure security, the user needs to perform identity authentication when the user uses the unlocking right for the first time, and if the first authentication is successful, the user is regarded as a reassuring user, and the identity authentication is not performed any more in the subsequent unlocking.
Preferably, the authenticating of the room door lock associated with the landlord is connected to the management end, and the landlord end controlling the opening or closing of each room door lock includes: the authentication landlord sets the associated room door locks as available door locks and standby door locks, the available door locks are connected with the management end, and the landlord end controls the opening or closing of each available door lock.
Preferably, in order to guarantee the electricity utilization safety of the network-constrained room, when the door lock of the room is in an unlocked state, the room is automatically powered on, namely when the door lock of the room is unlocked, the room is automatically powered on. And when the user side sends the room returning information to the landlord side, the room returning information comprises room returning time, and after the room returning time, the power supply system of the room with the lock of the room in the locked state considers that the tenant leaves, and then the power supply system is automatically closed.
The interface starting of the mobile terminal APP has various shortcuts, including long-time pressing of the back hand, namely display, and long-time pressing of the back hand, namely popping up of the interface after 2s without hand release.
The invention also discloses a management system of the network contract house, which comprises the following steps:
-a user end, i.e. a tenant;
the east end of the house is associated with at least one intelligent room door lock, the intelligent room door lock associated with the east end of the house is authenticated and connected with the management end, and opening or closing information of the intelligent room door lock is obtained;
the management end uploads user identity information to the management end, and the management end verifies the user information and marks the user information passing the verification as an authenticated user; the east-house end uploads the identity information of the east-house to the management end, the management end audits the information of the east-house and marks the information of the east-house passing the audit as a certified east-house;
the system comprises a room intelligent door lock, a landlord end and an authenticated user, wherein the landlord end controls the opening or closing of each room intelligent door lock, and the authenticated user performs information interaction with the landlord end to realize the opening or closing of the room intelligent door lock.
The safety guarantee system is connected with the management end and is used for acquiring the landlord information, the house source information corresponding to the intelligent room door lock associated with the landlord end, and the information of the authenticated user and the record of opening and booking the house of the authenticated user.
It should be noted that the embodiments of the present invention have been described in a preferred embodiment and not limited to the embodiments, and those skilled in the art may modify and modify the above-disclosed embodiments to equivalent embodiments without departing from the scope of the present invention.

Claims (10)

1. A method for managing a cyber-contracting room, comprising:
the user side uploads user identity information to the management side, the management side audits the user information, and the user information which passes the audit is marked as an authentication user;
the east-house end uploads the identity information of the east-house to the management end, the management end audits the information of the east-house and marks the information of the east-house passing the audit as a certified east-house; the east end of the house controls the opening or closing of each room door lock, and the authenticated user and the east end of the house perform information interaction to realize the opening or closing of the room door lock;
each east end of the house is associated with at least one room door lock, the room door lock associated with the authenticated east is connected with the management end, and the opening or closing information of the room door lock is obtained;
the safety guarantee system is connected with the management end and used for acquiring the landlord information, the house source information corresponding to the room door lock associated with the landlord end and acquiring the information of the authenticated user and the record of opening and booking the house of the authenticated user.
2. The method for managing a network contract room according to claim 1, wherein the user side uploads user identity information to the management side, the management side checks the user information, and the step of marking the user information that passes the check as an authenticated user comprises:
the user side uploads the identity card information of the user to the management side, face recognition is carried out, the management side verifies the authenticity of the identity card information of the user and verifies whether a face recognition result is matched with the identity card information or not, and if the identity card information passes, the user information is marked as an authenticated user;
the east end of the house uploads the identity information of the east to the management end, the management end audits the east information of the house, and the east information which passes the audit is marked as the certified east, wherein the east end of the house comprises the following steps:
the east-house end uploads the identity card information of the east-house and the registration information of the house source to the management end, carries out face recognition, and the management end examines the authenticity of the identity card information of the east-house and the registration information of the house source and examines whether the face recognition result is matched with the identity card information or not, and if the identity card information of the east-house and the registration information of the house source pass through, the east-house information is marked as the authenticated east-house.
3. The method for managing the cyber-contracting room as claimed in claim 1, wherein the user side and the landlord side include a door lock list integrated with all room door locks associated with the certified landlord, the door lock list includes an online booking door lock and an offline booking door lock, and the online booking door lock has a higher display priority than the offline booking door lock.
4. The method for managing the cyber-contracted rooms according to claim 3, wherein each room door lock in the door lock list is provided with a tag, and the tags comprise a plurality of types of default tags and a plurality of types of other tags; the door lock name of each room door lock in the door lock list is an editable name, and the label is an editable label; the landlord end edits the room door lock and the label, and the edited door lock name and the label are displayed at the landlord end and the user end;
the room door locks of the same type of tags in the door lock list have the same display priority, and the display priority of the room door locks without the type of tags is the sequence of the first letters of the tags;
the system also comprises a top room door lock, and the top room door lock has the highest display priority.
5. The method for managing a cyber-contracting room as claimed in claim 4, wherein the associating of each east end with at least one room door lock comprises:
and the east end of the house adds the related room door lock through the online request and the offline request, and if the request is the online request, the east end of the house needs to perform operating qualification authentication and face identification.
6. The method for managing the cyber-contracting room as claimed in claim 1, wherein the authenticating the user to perform information interaction with the landlord end to open or close the door lock of the room comprises:
the authentication user sends a lodging request to the east end of the house, the east end of the house receives the lodging request and issues an unlocking authority to the authentication user through the management end, and the authentication user unlocks a room door lock through the unlocking authority within a preset time period after receiving the unlocking authority;
the unlocking authority comprises a randomly generated password and/or a two-dimensional code;
and the room door lock after successful unlocking sends unlocking information to the management terminal.
7. The method for managing the contracted house according to claim 6, wherein the authenticated user sends a lodging request to an east end, the east end receives the lodging request and issues an unlocking right to the authenticated user through a management end, and the authenticated user unlocks the room door lock through the unlocking right within a preset time period after receiving the unlocking right further comprises:
the method comprises the steps that an authenticated user sends a lodging reservation request to a homeowner end, the lodging reservation request comprises a lodging time period, the homeowner end receives the lodging request and issues unlocking authority to the authenticated user through a management end, and the authenticated user unlocks a room door lock through the unlocking authority in the lodging time period.
8. The method for managing the cyber-contracting room as claimed in claim 1, wherein the room door lock associated with the certified landlord is connected to a management side, and the landlord side controls opening or closing of each room door lock includes:
the authentication landlord sets the associated room door locks as available door locks and standby door locks, the available door locks are connected with the management end, and the landlord end controls the opening or closing of each available door lock.
9. The method for managing the contracted building according to claim 1, wherein the authenticated user sends a lodging request to the east end, and the east end receives the lodging request and issues an unlocking right to the authenticated user through a management end, and then the method further comprises:
when the door lock of the room is in an unlocked state, the room is automatically electrified;
the method comprises the steps that a user side sends refund information to a landlord side, wherein the refund information comprises refund time; and after the room retreating time, the power supply of the room with the locked door lock of the room is automatically closed.
10. A management system of a cyber-contracted house is characterized by comprising a user side, an east end of the house, a management end and a room door lock;
the user side uploads user identity information to the management side, the management side audits the user information, and the user information which passes the audit is marked as an authentication user;
the east-house end uploads the identity information of the east-house to the management end, the management end audits the information of the east-house and marks the information of the east-house passing the audit as a certified east-house; the east end of the house controls the opening or closing of the door lock of each room, and the authenticated user performs information interaction with the east end of the house to realize the opening or closing of the door lock of the room;
each east end of the house is associated with at least one room door lock, and the room door lock associated with the authenticated east end of the house is connected with the management end to obtain the opening or closing information of the room door lock;
the safety guarantee system is connected with the management end and used for acquiring the landlord information, the house source information corresponding to the room door lock associated with the landlord end, and the information of the authenticated user and the records of room opening and room booking of the authenticated user.
CN202110718125.8A 2021-06-28 2021-06-28 Management method and system of network booking room Pending CN115601092A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110718125.8A CN115601092A (en) 2021-06-28 2021-06-28 Management method and system of network booking room

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110718125.8A CN115601092A (en) 2021-06-28 2021-06-28 Management method and system of network booking room

Publications (1)

Publication Number Publication Date
CN115601092A true CN115601092A (en) 2023-01-13

Family

ID=84840762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110718125.8A Pending CN115601092A (en) 2021-06-28 2021-06-28 Management method and system of network booking room

Country Status (1)

Country Link
CN (1) CN115601092A (en)

Similar Documents

Publication Publication Date Title
CN109166055A (en) A kind of unmanned hotel intelligently moves in system and method
CN108257267B (en) Cloud access management system
CN104751545A (en) System, method and device for processing permissions of door lock
JP7038293B2 (en) Gate open / close control device and gate open / close control method
CN110111501B (en) Mobile house management platform
JP6998568B2 (en) Face recognition system and face recognition method
CN107578502A (en) A kind of cell caller management method and device
JP2024038422A (en) Face recognition management server and face recognition management method
WO2009081570A1 (en) Authentication system and electronic lock
CN107678382A (en) Unattended apartment complexes, implementation method and readable storage medium storing program for executing
JP2003090155A (en) Unlocking system
KR20080085106A (en) A seat management system and method for applying thereof
JP2023157932A (en) Face authentication registration device, and a face authentication registration method
CN115601092A (en) Management method and system of network booking room
CN114863597B (en) Access management method, system and device based on trusted bar code
US8584203B2 (en) Identifier authenticating system
US8291476B2 (en) Identifier authenticating system
JP2009270366A (en) Door handle with noncontact ic card-compatible electronic lock
CN108171835B (en) Intelligent lock control application method and system based on personal information communication processing system (PICA)
CN116777396A (en) Management method and system for network appointment room
JP2015161163A (en) Access management system and access management method
CN109255736A (en) A kind of rental housing management platform and its management method
CN211454691U (en) Automatically controlled access door system
JP7266185B2 (en) Face authentication system and face authentication method
JP7296607B2 (en) Face recognition machine and face recognition method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
TA01 Transfer of patent application right

Effective date of registration: 20240402

Address after: No.400, Hanjiang Road, Xinbei District, Changzhou City, Jiangsu Province 213000

Applicant after: Changzhou yonganhang Intelligent Technology Co.,Ltd.

Country or region after: China

Address before: No.400, Hanjiang Road, Xinbei District, Changzhou City, Jiangsu Province 213000

Applicant before: Changzhou yonganhang Intelligent Technology Co.,Ltd.

Country or region before: China

Applicant before: YOUON TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination