CN109523659B - Guest room check-in method, device, server and storage medium - Google Patents

Guest room check-in method, device, server and storage medium Download PDF

Info

Publication number
CN109523659B
CN109523659B CN201811163465.3A CN201811163465A CN109523659B CN 109523659 B CN109523659 B CN 109523659B CN 201811163465 A CN201811163465 A CN 201811163465A CN 109523659 B CN109523659 B CN 109523659B
Authority
CN
China
Prior art keywords
tenant
room
checked
identity
guest room
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811163465.3A
Other languages
Chinese (zh)
Other versions
CN109523659A (en
Inventor
关岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Heyuan Hongjia Agricultural Technology Co ltd
Original Assignee
Shenzhen Chunmuyuan Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Chunmuyuan Holdings Co Ltd filed Critical Shenzhen Chunmuyuan Holdings Co Ltd
Priority to CN201811163465.3A priority Critical patent/CN109523659B/en
Publication of CN109523659A publication Critical patent/CN109523659A/en
Priority to PCT/CN2019/091690 priority patent/WO2020062952A1/en
Application granted granted Critical
Publication of CN109523659B publication Critical patent/CN109523659B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/12Hotels or restaurants
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like

Landscapes

  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A method of room check-in, the method comprising: after receiving a guest room booking requirement of a tenant, determining a guest room to be checked in which the guest room booking requirement is matched; determining that the identity verification of the tenant is successful; sending the unlocking identification code of the guest room to be checked to the user terminal of the tenant; when the guest room to be checked in is in an idle state, triggering the unlocking identification code to take effect; receiving an unlocking identification code in an effective state sent by the user terminal; verifying the unlocking identification code; and if the verification is successful, controlling the door of the guest room to be checked to unlock. The invention can determine the guest room to be checked in for the tenant after the guest room is successfully reserved, and simultaneously, the efficiency of checking in for the tenant is improved.

Description

Guest room check-in method, device, server and storage medium
Technical Field
The invention relates to the technical field of information, in particular to a guest room check-in method, a guest room check-in device, a guest room check-in server and a storage medium.
Background
With the development of the internet of things, intelligent accommodation becomes an emerging accommodation mode. The renters can select proper house types on the network according to the demands of the renters, and book hotel rooms in advance, without finding hotels and houses on site, so that the house finding time of the renters is saved to a great extent.
In the current booking mode, a tenant can only book a room type required by the tenant in advance, when the tenant really enters the room, the tenant needs to transact the entering procedure on site, usually, identity verification is performed on a foreground, after the verification is successful, hotel personnel allocate a current idle room for the tenant on site, and the tenant can only realize the entering. Therefore, in the check-in mode, the tenant cannot know which guest room the tenant checked in advance, and the process of checking in is complicated when the tenant transacts the check-in procedure, which brings great inconvenience to the travel of the tenant.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a room check-in method, device, server and storage medium, which can determine a room to be checked in for a tenant after the room reservation is successful, and improve the check-in efficiency of the tenant.
A method of room check-in, the method comprising:
after receiving a guest room booking requirement of a tenant, determining a guest room to be checked in which the guest room booking requirement is matched;
determining that the identity verification of the tenant is successful;
sending the unlocking identification code of the guest room to be checked to the user terminal of the tenant;
when the guest room to be checked in is in an idle state, triggering the unlocking identification code to take effect;
receiving an unlocking identification code in an effective state sent by the user terminal;
verifying the unlocking identification code;
and if the verification is successful, controlling the door of the guest room to be checked to unlock.
In one possible implementation, after receiving a room reservation requirement of a tenant, and determining a room to be checked in matching with the room reservation requirement, the method further includes:
storing the room number of the guest room to be checked into guest room information corresponding to the tenant;
and monitoring the room state of the guest room to be checked, storing the room state of the guest room to be checked into guest room information corresponding to the tenant, and dynamically updating the room state in the guest room information according to a preset time period.
In one possible implementation, the determining that the identity verification of the tenant is successful includes:
when receiving identity verification information aiming at the tenant sent by a foreground device, determining that the identity verification of the tenant is successful; or
When identity verification information aiming at the tenant and sent by self-service equipment is received, determining that the identity verification of the tenant is successful; or
Receiving an identity authentication request which is sent by the user terminal and carries an identity image; identifying identity information of the identity image; when the identity information is consistent with the identity information scheduled by the tenant, determining that the identity verification of the tenant is successful; or
Sending an identity verification request to the user terminal; receiving an identity image sent by the user terminal aiming at the identity verification request; identifying identity information of the identity image; and when the identity information is consistent with the identity information scheduled by the tenant, determining that the identity verification of the tenant is successful.
In one possible implementation manner, after determining that the identity verification of the tenant is successful, the method further includes:
if the guest room to be checked in cannot be checked in the preset time of the tenant, reallocating the guest room for the tenant from the current idle room of the same room type; or
And if the guest room to be checked in cannot be checked in within the preset time of the tenant and no idle same room type exists at present, reallocating the guest room for the tenant from the idle high-level room type.
A room check-in device comprising:
the system comprises a first determining unit, a first judging unit and a second determining unit, wherein the first determining unit is used for determining a guest room to be checked in which the guest room booking requirement is matched with a guest room booking requirement of a tenant after the guest room booking requirement of the tenant is received;
the second determination unit is used for determining that the identity verification of the tenant is successful;
the sending unit is used for sending the unlocking identification code of the guest room to be checked to the user terminal of the tenant;
the triggering unit is used for triggering the unlocking identification code to take effect when the guest room to be checked in is in an idle state;
the receiving unit is used for receiving the unlocking identification code in the effective state sent by the user terminal;
the verification unit is used for verifying the unlocking identification code;
and the control unit is used for controlling the door of the guest room to be checked to be unlocked if the verification is successful.
In one possible implementation, the guest room check-in device further includes:
the storage unit is used for storing the room number of the room to be checked into the room information corresponding to the tenant after the determining unit determines the room to be checked matched with the room booking requirement after receiving the room booking requirement of the tenant;
the monitoring unit is used for monitoring the room state of the guest room to be checked in;
the storage unit is further configured to store the room state of the guest room to be checked into guest room information corresponding to the tenant.
In one possible implementation manner, the determining, by the second determining unit, that the identity verification of the tenant is successful includes:
when receiving identity verification information aiming at the tenant sent by a foreground device, determining that the identity verification of the tenant is successful; or
When identity verification information aiming at the tenant and sent by self-service equipment is received, determining that the identity verification of the tenant is successful; or
Receiving an identity authentication request which is sent by the user terminal and carries an identity image; identifying identity information of the identity image; when the identity information is consistent with the identity information scheduled by the tenant, determining that the identity verification of the tenant is successful; or
Sending an identity verification request to the user terminal; receiving an identity image sent by the user terminal aiming at the identity verification request; identifying identity information of the identity image; and when the identity information is consistent with the identity information scheduled by the tenant, determining that the identity verification of the tenant is successful.
In one possible implementation, the guest room check-in device further includes:
the first allocation unit is used for reallocating guest rooms for the tenants from the current idle rooms of the same room type if the guest rooms to be checked cannot be checked within the preset time of the tenants; or
And the second distribution unit is used for redistributing the guest rooms from the idle high-level room types if the guest rooms to be checked cannot be checked in the preset time of the guest and the current idle same room type does not exist.
A server comprising a memory for storing at least one instruction and a processor for executing the at least one instruction to implement the room check-in method.
A computer readable storage medium having stored thereon at least one instruction which, when executed by a processor, implements the room check-in method.
According to the technical scheme, after receiving the guest room booking requirement of the tenant, the guest room to be checked in which the guest room booking requirement is matched can be determined; further, when the tenant needs to check in, the identity verification of the tenant can be determined to be successful; sending the unlocking identification code of the guest room to be checked to the user terminal of the tenant; when the guest room to be checked in is in an idle state, triggering the unlocking identification code to take effect; furthermore, the unlocking identification code in the effective state sent by the user terminal can be received; verifying the unlocking identification code; and if the verification is successful, controlling the door of the guest room to be checked to unlock. Therefore, through the embodiment of the invention, after the guest room reservation is successfully carried out by the tenant, the server can immediately determine the guest room to be checked for the tenant, the tenant can know the room number of the guest room to be checked, when the tenant needs to check, the server can send the unlocking identification code of the guest room to be checked after the identity verification of the tenant is successful, once the guest room to be checked is in an idle state, the unlocking identification code takes effect immediately, the tenant can send the effective unlocking identification code to the server, and after the verification is successful, the server can control the door of the guest room to be checked to be unlocked.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a flow chart of a preferred embodiment of a room check-in method disclosed in the present invention.
Fig. 2 is a flow chart of another preferred embodiment of the room check-in method disclosed in the present invention.
Fig. 3 is a functional block diagram of a preferred embodiment of a room check-in apparatus according to the present invention.
FIG. 4 is a schematic structural diagram of a server according to a preferred embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
A server may refer to a computer system that provides services to other devices in a network. A personal computer may also be called a server if it can externally provide a File Transfer Protocol (FTP) service. In a narrow sense, a server refers to a high-performance computer, which can provide services to the outside through a network, and compared with a common personal computer, the server has higher requirements on stability, security, performance and the like, and therefore, hardware such as a CPU, a chipset, a memory, a disk system, a network and the like is different from that of the common personal computer.
The user terminal may include, but is not limited to, any electronic product that can perform human-computer interaction with a user through a keyboard, a mouse, a remote controller, a touch panel, or a voice control device, for example, a Personal computer, a tablet computer, a smart phone, a Personal Digital Assistant (PDA), an interactive Internet Protocol Television (IPTV), an intelligent wearable device, and the like.
The foreground device may include, but is not limited to, any electronic product that can perform human-computer interaction with a user through a keyboard, a mouse, a remote controller, a touch panel, or a voice control device, for example, a Personal computer, a tablet computer, a smart phone, a Personal Digital Assistant (PDA), an interactive Internet Protocol Television (IPTV), an intelligent wearable device, and the like.
Referring to fig. 1, fig. 1 is a flowchart illustrating a room check-in method according to a preferred embodiment of the present invention. The order of the steps in the flowchart may be changed, and some steps may be omitted.
S11, after receiving the room booking requirement of the tenant, the server determines the room to be checked which is matched with the room booking requirement.
In the embodiment of the invention, when the tenant needs to reserve a hotel room, the tenant can remotely use the user terminal to reserve on the hotel website, and when reserving, the tenant can select a proper room type according to the own needs, such as a large bed room, a standard room, a president room and the like. After the house type is selected, the tenant can register and input relevant information, such as the information of the personnel living in, the arrival time, the contact information and the like. After the tenant determines the reservation, the server can randomly select one room from the idle rooms with the same room type to distribute to the tenant, and returns the successful room reservation information and the room to be checked including the room number of the room to be checked to the user terminal.
For example, if the tenant subscribes to a large bed room of 10 months and 1 days, the server may query the system for large bed rooms (e.g., 105 rooms, 202 rooms, 308 rooms) that are not allocated in an idle state for 10 months and 1 day, and randomly select one room (e.g., 202 rooms) from the large bed rooms to allocate to the tenant.
S12, the server determines that the identity verification of the tenant is successful.
In the embodiment of the invention, after the room reservation of the tenant is successful, the tenant can check in the hotel at the preset arrival time. Before check-in, the identity of the tenant is typically verified, and the tenant can check-in after verification is successful.
There are various ways to verify the identity of the tenant.
Specifically, the determining that the identity verification of the tenant is successful includes:
when receiving identity verification information aiming at the tenant sent by a foreground device, determining that the identity verification of the tenant is successful; or
When identity verification information aiming at the tenant and sent by self-service equipment is received, determining that the identity verification of the tenant is successful; or
Receiving an identity authentication request which is sent by the user terminal and carries an identity image; identifying identity information of the identity image; when the identity information is consistent with the identity information scheduled by the tenant, determining that the identity verification of the tenant is successful; or
Sending an identity verification request to the user terminal; receiving an identity image sent by the user terminal aiming at the identity verification request; identifying identity information of the identity image; and when the identity information is consistent with the identity information scheduled by the tenant, determining that the identity verification of the tenant is successful.
In this optional embodiment, after the tenant arrives at the hotel, the identity verification can be performed manually at the foreground, and after the verification is successful, the foreground device can send the identity verification information to the server, and the server can determine that the identity verification of the tenant is successful.
Or, the tenant may perform identity verification on the self-service device of the hotel, and specifically, the tenant may take the identity card of the person to be checked into the self-service device to perform the identity verification. The self-service equipment is terminals convenient for the tenant to operate.
Or, the tenant may use the user terminal to send an authentication request carrying an identity image to the server, and after receiving the authentication request, the server may recognize the identity image, extract identity information therefrom, and determine that the identity verification of the tenant is successful when the identity information is consistent with the identity information scheduled by the tenant.
Or, the server can also send an identity verification request to the user terminal spontaneously; and after receiving the identity verification request, the user terminal is used for self-shooting and sending an identity image to the server, and after receiving the identity image, the server can identify the identity image, extract identity information from the identity image and determine that the identity verification of the tenant is successful when the identity information is consistent with the identity information preset by the tenant. Optionally, when a plurality of tenants reserve the same room type on the same day and live in the same time, the server may initiate an identity verification request to the user terminal according to the order of the room reservation times. For example, if the tenant A, B, C successively reserves a large bed room of 10 months and 1 day, the guest room of the tenant a is earlier than the guest B, the guest room of the tenant B is earlier than the guest C, and the check-in time of the tenant A, B, C is the same, the server may initiate the identity check of the tenant a first, the identity check of the tenant B first, and the identity check of the tenant C last.
S13, the server sends the unlocking identification code of the guest room to be checked to the user terminal of the tenant.
The unlocking identification code is mainly used for unlocking a door of a guest room to be checked in. The unlocking identification code may include, but is not limited to, two-dimensional code, number, letter, number plus letter, bar code.
The unlocking identification code has two states, namely failure or effective, the two states depend on the state of the guest room to be checked in, if the guest room to be checked in is in an idle state, the unlocking identification code is effective, and if the guest room to be checked in is occupied by a person, the unlocking identification code is ineffective.
Wherein, the unlocking identification code is a dynamic identification code. After the door of the guest room to be checked in is opened every time, the server can update the unlocking identification code and send the updated unlocking identification code to the user terminal of the tenant. It should be noted that after the tenant opens the door for the first time and stays in the house, the updated unlocking identification code is always in the valid state.
And S14, when the room to be checked in is in an idle state, the server triggers the unlocking identification code to take effect.
In the embodiment of the invention, a tenant generally arrives at a hotel in advance, when the registered check-in time does not arrive, the room to be checked in may have three situations, the first situation is that the room to be checked in is in an idle state, the second situation is that a person lives in the room to be checked in at the moment, but when the check-in time arrives, a user living at present may handle a check-out procedure, and the third situation is that the person lives in the room to be checked in at the moment, but the user is handling the check-in procedure and conflicts with the check-in time of the tenant.
In the embodiment of the invention, in order to prevent the tenant from randomly entering the guest room without the authority, the server can control the time for the identification code to take effect. When the tenant arrives at the hotel in advance, the server can trigger the unlocking identification code to take effect only when the guest room to be checked is in an idle state, otherwise, the unlocking identification code is in a failure state all the time.
And S15, the server receives the unlocking identification code in the effective state sent by the user terminal.
In the embodiment of the invention, after the unlocking identification code takes effect, the tenant can arrive at the front of the door of the room to be checked and sends the unlocking identification code in an effective state to the server.
And S16, the server verifies the unlocking identification code.
In the embodiment of the invention, after the server receives the unlocking identification code in the effective state, the server can verify the unlocking identification code in the effective state, if the verification is successful, the server can control the door of the guest room to be checked to be unlocked, and if the verification is failed, the door of the guest room to be checked is always in the closed state.
And S17, if the verification is successful, the server controls the door of the guest room to be checked to unlock.
As an optional implementation manner, after the step S12 determining that the identity verification of the tenant is successful, the method further includes:
if the guest room to be checked in cannot be checked in the preset time of the tenant, reallocating the guest room for the tenant from the current idle room of the same room type; or
And if the guest room to be checked in cannot be checked in within the preset time of the tenant and no idle same room type exists at present, reallocating the guest room for the tenant from the idle high-level room type.
In this alternative embodiment, when a tenant arrives at a hotel, the room to be checked in is occupied at this time, but the user is in the process of checking in and conflicts with the check-in time of the tenant, so that the room to be checked in cannot be checked in the predetermined time of the tenant, at this time, there are 2 solutions, the first is that the server can reallocate the room for the tenant from an idle room of the current same room type, and the second is that the server can reallocate the room for the tenant from an idle high-level room type if there is no idle same room type at present. The high-level room type is higher than the level of the guest room to be checked in, which is predetermined by the tenant, and generally, the higher the level of the guest room is, the better the living condition of the guest room is, and the higher the tenant experience is. The guest rooms can be classified into general rooms, middle rooms and upper rooms.
In the method flow depicted in fig. 1, after receiving a room reservation requirement of a tenant, a room to be checked in matching with the room reservation requirement may be determined; further, when the tenant needs to check in, the identity verification of the tenant can be determined to be successful; sending the unlocking identification code of the guest room to be checked to the user terminal of the tenant; when the guest room to be checked in is in an idle state, triggering the unlocking identification code to take effect; furthermore, the unlocking identification code in the effective state sent by the user terminal can be received; verifying the unlocking identification code; and if the verification is successful, controlling the door of the guest room to be checked to unlock. Therefore, through the embodiment of the invention, after the guest room reservation is successfully carried out by the tenant, the server can immediately determine the guest room to be checked for the tenant, the tenant can know the room number of the guest room to be checked, when the tenant needs to check, the server can send the unlocking identification code of the guest room to be checked after the identity verification of the tenant is successful, once the guest room to be checked is in an idle state, the unlocking identification code takes effect immediately, the tenant can send the effective unlocking identification code to the server, and after the verification is successful, the server can control the door of the guest room to be checked to be unlocked.
Referring to fig. 2, fig. 2 is a flow chart of another preferred embodiment of the room check-in method disclosed in the present invention. The order of the steps in the flowchart may be changed, and some steps may be omitted.
S21, after receiving the room booking requirement of the tenant, the server determines the room to be checked which is matched with the room booking requirement.
In the embodiment of the invention, when the tenant needs to reserve a hotel room, the tenant can remotely use the user terminal to reserve on the hotel website, and when reserving, the tenant can select a proper room type according to the own needs, such as a large bed room, a standard room, a president room and the like. After the house type is selected, the tenant can register and input relevant information, such as the information of the personnel living in, the arrival time, the contact information and the like. After the tenant determines the reservation, the server can randomly select one room from the idle rooms with the same room type to distribute to the tenant, and returns the successful room reservation information and the room to be checked including the room number of the room to be checked to the user terminal.
For example, if the tenant subscribes to a large bed room of 10 months and 1 days, the server may query the system for large bed rooms (e.g., 105 rooms, 202 rooms, 308 rooms) that are not allocated in an idle state for 10 months and 1 day, and randomly select one room (e.g., 202 rooms) from the large bed rooms to allocate to the tenant.
And S22, the server stores the room number of the guest room to be checked into the guest room information corresponding to the tenant.
In the embodiment of the invention, after the server determines the guest room to be checked in for the tenant, the server can store the room number of the guest room to be checked in the guest room information corresponding to the tenant. The guest room information may include, but is not limited to, a room number of the guest room, living facilities of the guest room, a location of the guest room, a state of the guest room, and the like.
The renters can use the user terminals to enter the guest room web pages of the hotel, namely, the relevant guest room information of the self-booking guest rooms can be inquired in the personal center in real time, and the renters can better arrange the self-travel.
S23, the server monitors the room state of the guest room to be checked, stores the room state of the guest room to be checked into guest room information corresponding to the tenant, and dynamically updates the room state in the guest room information according to a preset time period.
In the embodiment of the invention, the room state of the guest room to be checked in may be idle or occupied, the server may monitor the room state of the guest room to be checked in, store the room state of the guest room to be checked in the guest room information corresponding to the tenant, and dynamically update the room state in the guest room information according to a preset time period, so that the tenant can inquire the guest room state of the guest room to be checked in real time before the guest room is not checked in, and if the guest room to be checked in is in the idle state on the day of the expected check-in time period, the tenant can check in advance or delay check in according to the travel of the tenant.
S24, the server determines that the identity verification of the tenant is successful.
In the embodiment of the invention, after the room reservation of the tenant is successful, the tenant can check in the hotel at the preset arrival time. Before check-in, the identity of the tenant is typically verified, and the tenant can check-in after verification is successful.
There are various ways to verify the identity of the tenant.
Specifically, the determining that the identity verification of the tenant is successful includes:
when receiving identity verification information aiming at the tenant sent by a foreground device, determining that the identity verification of the tenant is successful; or
When identity verification information aiming at the tenant and sent by self-service equipment is received, determining that the identity verification of the tenant is successful; or
Receiving an identity authentication request which is sent by the user terminal and carries an identity image; identifying identity information of the identity image; when the identity information is consistent with the identity information scheduled by the tenant, determining that the identity verification of the tenant is successful; or
Sending an identity verification request to the user terminal; receiving an identity image sent by the user terminal aiming at the identity verification request; identifying identity information of the identity image; and when the identity information is consistent with the identity information scheduled by the tenant, determining that the identity verification of the tenant is successful.
In this optional embodiment, after the tenant arrives at the hotel, the identity verification can be performed manually at the foreground, and after the verification is successful, the foreground device can send the identity verification information to the server, and the server can determine that the identity verification of the tenant is successful.
Or, the tenant may perform identity verification on the self-service device of the hotel, and specifically, the tenant may take the identity card of the person to be checked into the self-service device to perform the identity verification. The self-service equipment is terminals convenient for the tenant to operate.
Or, the tenant may use the user terminal to send an authentication request carrying an identity image to the server, and after receiving the authentication request, the server may recognize the identity image, extract identity information therefrom, and determine that the identity verification of the tenant is successful when the identity information is consistent with the identity information scheduled by the tenant.
Or, the server can also send an identity verification request to the user terminal spontaneously; and after receiving the identity verification request, the user terminal is used for self-shooting and sending an identity image to the server, and after receiving the identity image, the server can identify the identity image, extract identity information from the identity image and determine that the identity verification of the tenant is successful when the identity information is consistent with the identity information preset by the tenant. Optionally, when a plurality of tenants reserve the same room type on the same day and live in the same time, the server may initiate an identity verification request to the user terminal according to the order of the room reservation times. For example, if the tenant A, B, C successively reserves a large bed room of 10 months and 1 day, the guest room of the tenant a is earlier than the guest B, the guest room of the tenant B is earlier than the guest C, and the check-in time of the tenant A, B, C is the same, the server may initiate the identity check of the tenant a first, the identity check of the tenant B first, and the identity check of the tenant C last.
S25, the server sends the unlocking identification code of the guest room to be checked to the user terminal of the tenant.
The unlocking identification code is mainly used for unlocking a door of a guest room to be checked in. The unlocking identification code may include, but is not limited to, two-dimensional code, number, letter, number plus letter, bar code.
The unlocking identification code has two states, namely failure or effective, the two states depend on the state of the guest room to be checked in, if the guest room to be checked in is in an idle state, the unlocking identification code is effective, and if the guest room to be checked in is occupied by a person, the unlocking identification code is ineffective.
Wherein, the unlocking identification code is a dynamic identification code. After the door of the guest room to be checked in is opened every time, the server can update the unlocking identification code and send the updated unlocking identification code to the user terminal of the tenant. It should be noted that after the tenant opens the door for the first time and stays in the house, the updated unlocking identification code is always in the valid state.
And S26, when the room to be checked in is in an idle state, the server triggers the unlocking identification code to take effect.
In the embodiment of the invention, a tenant generally arrives at a hotel in advance, when the registered check-in time does not arrive, the room to be checked in may have three situations, the first situation is that the room to be checked in is in an idle state, the second situation is that a person lives in the room to be checked in at the moment, but when the check-in time arrives, a user living at present may handle a check-out procedure, and the third situation is that the person lives in the room to be checked in at the moment, but the user is handling the check-in procedure and conflicts with the check-in time of the tenant.
In the embodiment of the invention, in order to prevent the tenant from randomly entering the guest room without the authority, the server can control the time for the identification code to take effect. When the tenant arrives at the hotel in advance, the server can trigger the unlocking identification code to take effect only when the guest room to be checked is in an idle state, otherwise, the unlocking identification code is in a failure state all the time.
And S27, the server receives the unlocking identification code in the effective state sent by the user terminal.
In the embodiment of the invention, after the unlocking identification code takes effect, the tenant can arrive at the front of the door of the room to be checked and sends the unlocking identification code in an effective state to the server.
And S28, the server verifies the unlocking identification code.
In the embodiment of the invention, after the server receives the unlocking identification code in the effective state, the server can verify the unlocking identification code in the effective state, if the verification is successful, the server can control the door of the guest room to be checked to be unlocked, and if the verification is failed, the door of the guest room to be checked is always in the closed state.
And S29, if the verification is successful, the server controls the door of the guest room to be checked to unlock.
In the method flow described in fig. 2, the server stores the room number of the guest room to be checked and the room state of the guest room to be checked into the guest room information corresponding to the tenant, which is beneficial for the tenant to use the user terminal of the tenant, and the user terminal enters the hotel system interface to inquire the relevant information of the guest room to be checked, so that the travel of the tenant can be better arranged, the time of the tenant is saved, and the user experience is improved.
Referring to fig. 3, fig. 3 is a functional block diagram of a room check-in apparatus according to a preferred embodiment of the present invention. The room check-in device depicted in fig. 3 is used to perform some or all of the steps of the room check-in method depicted in fig. 1 or fig. 2. The unit referred to in the present invention is a series of computer program segments capable of being executed by a processor and performing a fixed function, and is stored in a memory. In the present embodiment, the functions of the units will be described in detail in the following embodiments.
The room check-in apparatus depicted in fig. 3 includes:
the first determining unit 101 is configured to determine a guest room to be checked in, which is matched with a guest room booking demand, after receiving the guest room booking demand of a tenant;
a second determining unit 102, configured to determine that the identity verification of the tenant is successful;
a sending unit 103, configured to send the unlocking identification code of the guest room to be checked to the user terminal of the tenant;
the triggering unit 104 is configured to trigger the unlocking identification code to take effect when the guest room to be checked in is in an idle state;
a receiving unit 105, configured to receive the unlocking identification code in the valid state sent by the user terminal;
a verification unit 106 configured to verify the unlocking identification code;
and the control unit 107 is used for controlling the door of the guest room to be checked to be unlocked if the verification is successful.
Optionally, the guest room check-in device shown in fig. 3 further includes:
the storage unit is used for storing the room number of the room to be checked into the room information corresponding to the tenant after the determining unit determines the room to be checked matched with the room booking requirement after receiving the room booking requirement of the tenant;
the monitoring unit is used for monitoring the room state of the guest room to be checked in;
the storage unit is further used for storing the room state of the guest room to be checked into guest room information corresponding to the tenant;
and the updating unit is used for dynamically updating the room state in the guest room information according to a preset time period.
The second determining unit 102 determining that the identity verification of the tenant is successful includes:
when receiving identity verification information aiming at the tenant sent by a foreground device, determining that the identity verification of the tenant is successful; or
When identity verification information aiming at the tenant and sent by self-service equipment is received, determining that the identity verification of the tenant is successful; or
Receiving an identity authentication request which is sent by the user terminal and carries an identity image; identifying identity information of the identity image; when the identity information is consistent with the identity information scheduled by the tenant, determining that the identity verification of the tenant is successful; or
Sending an identity verification request to the user terminal; receiving an identity image sent by the user terminal aiming at the identity verification request; identifying identity information of the identity image; and when the identity information is consistent with the identity information scheduled by the tenant, determining that the identity verification of the tenant is successful.
Optionally, the guest room check-in device shown in fig. 3 further includes:
the first allocation unit is used for reallocating guest rooms for the tenants from the current idle rooms of the same room type if the guest rooms to be checked cannot be checked within the preset time of the tenants; or
And the second distribution unit is used for redistributing the guest rooms from the idle high-level room types if the guest rooms to be checked cannot be checked in the preset time of the guest and the current idle same room type does not exist.
In the guest room check-in device described in fig. 3, after guest room reservation is successfully performed by a tenant, the server can immediately determine a guest room to be checked in for the tenant, the tenant can know the number of the guest room to be checked in, when the tenant needs to check in, the server can send an unlocking identification code of the guest room to be checked in after the identity verification of the tenant is successful, once the guest room to be checked in is in an idle state, the unlocking identification code takes effect immediately, the tenant can send the effective unlocking identification code to the server, and after the verification is successful, the server can control a door of the guest room to be checked in to unlock, the operation of the whole check-in process is convenient, and the tenant does not need to take a long time to perform procedures, so that the check-in efficiency can be improved.
The integrated unit implemented in the form of a software functional module may be stored in a computer readable storage medium. Wherein the computer readable storage medium may store a computer program which, when executed by a processor, may implement the steps of the various method embodiments described above. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable storage medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable storage medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as subject to legislation and patent practice.
Fig. 4 is a schematic structural diagram of a server according to a preferred embodiment of the method for realizing room check-in of the present invention. The server 1 comprises a memory 12 and a processor 13. It will be understood by those skilled in the art that the schematic diagram shown in fig. 4 is only an example of the server 1, and does not constitute a limitation to the server 1, and may include more or less components than those shown, or combine some components, or different components, for example, the server 1 may further include input and output devices, network access devices, buses, etc.
The server 1 refers to a computer system that can provide some services to other machines in the network, such as user terminals. A personal computer may also be called a server if it can externally provide a File Transfer Protocol (FTP) service. In addition, the server 1 may also refer to a high performance computer, which can provide services to the outside through a network, and compared with a common personal computer, the server has higher requirements on stability, security, performance and the like, and thus hardware such as a CPU, a chipset, a memory, a disk system, a network and the like is different from that of the common personal computer.
The memory 12 optionally includes one or more computer-readable storage media for storing a program and various data for a room check-in method and enabling high-speed, automated access to the program or data during operation. The memory 12 optionally includes high speed random access memory, and also optionally includes non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid-state memory devices.
The processor 13 is also called a Central Processing Unit (CPU), and is an ultra-large scale integrated circuit, which is an operation Core (Core) and a Control Core (Control Unit) of the server 1. The processor 13 may execute the operating system of the server 1 and various types of applications, program codes, etc. installed, such as the room check-in device 11.
With reference to fig. 1 or fig. 2, the memory 12 in the server 1 stores a plurality of instructions to implement a room check-in method, and the processor 13 can execute the plurality of instructions to implement:
after receiving a guest room booking requirement of a tenant, determining a guest room to be checked in which the guest room booking requirement is matched;
determining that the identity verification of the tenant is successful;
sending the unlocking identification code of the guest room to be checked to the user terminal of the tenant;
when the guest room to be checked in is in an idle state, triggering the unlocking identification code to take effect;
receiving an unlocking identification code in an effective state sent by the user terminal;
verifying the unlocking identification code;
and if the verification is successful, controlling the door of the guest room to be checked to unlock.
In an alternative embodiment, after receiving a room reservation requirement for a tenant and determining a room to be checked in matching the room reservation requirement, the processor 13 may execute the instructions to:
storing the room number of the guest room to be checked into guest room information corresponding to the tenant;
and monitoring the room state of the guest room to be checked, storing the room state of the guest room to be checked into guest room information corresponding to the tenant, and dynamically updating the room state in the guest room information according to a preset time period.
In an optional embodiment, the determining that the identity verification of the tenant is successful comprises:
when receiving identity verification information aiming at the tenant sent by a foreground device, determining that the identity verification of the tenant is successful; or
When identity verification information aiming at the tenant and sent by self-service equipment is received, determining that the identity verification of the tenant is successful; or
Receiving an identity authentication request which is sent by the user terminal and carries an identity image; identifying identity information of the identity image; when the identity information is consistent with the identity information scheduled by the tenant, determining that the identity verification of the tenant is successful; or
Sending an identity verification request to the user terminal; receiving an identity image sent by the user terminal aiming at the identity verification request; identifying identity information of the identity image; and when the identity information is consistent with the identity information scheduled by the tenant, determining that the identity verification of the tenant is successful.
In an alternative embodiment, after determining that the identity verification of the tenant is successful, the processor 13 may execute the plurality of instructions to:
if the guest room to be checked in cannot be checked in the preset time of the tenant, reallocating the guest room for the tenant from the current idle room of the same room type; or
And if the guest room to be checked in cannot be checked in within the preset time of the tenant and no idle same room type exists at present, reallocating the guest room for the tenant from the idle high-level room type.
Specifically, the processor 13 may refer to the description of the relevant steps in the embodiment corresponding to fig. 1 or fig. 2, and is not described herein again.
In the server 1 depicted in fig. 4, after receiving the room reservation requirement of the tenant, the room to be checked in matching with the room reservation requirement may be determined; further, when the tenant needs to check in, the identity verification of the tenant can be determined to be successful; sending the unlocking identification code of the guest room to be checked to the user terminal of the tenant; when the guest room to be checked in is in an idle state, triggering the unlocking identification code to take effect; furthermore, the unlocking identification code in the effective state sent by the user terminal can be received; verifying the unlocking identification code; and if the verification is successful, controlling the door of the guest room to be checked to unlock. Therefore, through the embodiment of the invention, after the guest room reservation is successfully carried out by the tenant, the server can immediately determine the guest room to be checked for the tenant, the tenant can know the room number of the guest room to be checked, when the tenant needs to check, the server can send the unlocking identification code of the guest room to be checked after the identity verification of the tenant is successful, once the guest room to be checked is in an idle state, the unlocking identification code takes effect immediately, the tenant can send the effective unlocking identification code to the server, and after the verification is successful, the server can control the door of the guest room to be checked to be unlocked.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the system claims may also be implemented by one unit or means in software or hardware. The terms second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (8)

1. A method of room check-in, the method comprising:
after receiving a guest room booking requirement of a tenant, determining a guest room to be checked in which the guest room booking requirement is matched;
storing the room number of the guest room to be checked into guest room information corresponding to the tenant;
monitoring the room state of the guest room to be checked, storing the room state of the guest room to be checked into guest room information corresponding to the tenant, and dynamically updating the room state in the guest room information according to a preset time period;
determining that the identity verification of the tenant is successful;
sending the unlocking identification code of the guest room to be checked to the user terminal of the tenant;
when the guest room to be checked in is in an idle state, triggering the unlocking identification code to take effect;
receiving an unlocking identification code in an effective state sent by the user terminal;
verifying the unlocking identification code;
and if the verification is successful, controlling the door of the guest room to be checked to unlock.
2. The method of claim 1, wherein the determining that the identity verification of the tenant was successful comprises:
when receiving identity verification information aiming at the tenant sent by a foreground device, determining that the identity verification of the tenant is successful; or
When identity verification information aiming at the tenant and sent by self-service equipment is received, determining that the identity verification of the tenant is successful; or
Receiving an identity authentication request which is sent by the user terminal and carries an identity image; identifying identity information of the identity image; when the identity information is consistent with the identity information scheduled by the tenant, determining that the identity verification of the tenant is successful; or
Sending an identity verification request to the user terminal; receiving an identity image sent by the user terminal aiming at the identity verification request; identifying identity information of the identity image; and when the identity information is consistent with the identity information scheduled by the tenant, determining that the identity verification of the tenant is successful.
3. The method according to claim 1 or 2, wherein after the identity verification of the tenant is determined to be successful, the method further comprises:
if the guest room to be checked in cannot be checked in the preset time of the tenant, reallocating the guest room for the tenant from the current idle room of the same room type; or
And if the guest room to be checked in cannot be checked in within the preset time of the tenant and no idle same room type exists at present, reallocating the guest room for the tenant from the idle high-level room type.
4. A room check-in device, comprising:
the system comprises a first determining unit, a first judging unit and a second determining unit, wherein the first determining unit is used for determining a guest room to be checked in which the guest room booking requirement is matched with a guest room booking requirement of a tenant after the guest room booking requirement of the tenant is received;
the storage unit is used for storing the room number of the room to be checked into the room information corresponding to the tenant after the determining unit determines the room to be checked matched with the room booking requirement after receiving the room booking requirement of the tenant;
the monitoring unit is used for monitoring the room state of the guest room to be checked in;
the storage unit is further used for storing the room state of the guest room to be checked into guest room information corresponding to the tenant;
the updating unit is used for dynamically updating the room state in the guest room information according to a preset time period;
the second determination unit is used for determining that the identity verification of the tenant is successful;
the sending unit is used for sending the unlocking identification code of the guest room to be checked to the user terminal of the tenant;
the triggering unit is used for triggering the unlocking identification code to take effect when the guest room to be checked in is in an idle state;
the receiving unit is used for receiving the unlocking identification code in the effective state sent by the user terminal;
the verification unit is used for verifying the unlocking identification code;
and the control unit is used for controlling the door of the guest room to be checked to be unlocked if the verification is successful.
5. The room occupancy apparatus according to claim 4, wherein the second determination unit determining that the identity verification of the tenant is successful comprises:
when receiving identity verification information aiming at the tenant sent by a foreground device, determining that the identity verification of the tenant is successful; or
When identity verification information aiming at the tenant and sent by self-service equipment is received, determining that the identity verification of the tenant is successful; or
Receiving an identity authentication request which is sent by the user terminal and carries an identity image; identifying identity information of the identity image; when the identity information is consistent with the identity information scheduled by the tenant, determining that the identity verification of the tenant is successful; or
Sending an identity verification request to the user terminal; receiving an identity image sent by the user terminal aiming at the identity verification request; identifying identity information of the identity image; and when the identity information is consistent with the identity information scheduled by the tenant, determining that the identity verification of the tenant is successful.
6. The room check-in device of claim 4 or 5, further comprising:
the first allocation unit is used for reallocating guest rooms for the tenants from the current idle rooms of the same room type if the guest rooms to be checked cannot be checked within the preset time of the tenants; or
And the second distribution unit is used for redistributing the guest rooms from the idle high-level room types if the guest rooms to be checked cannot be checked in the preset time of the guest and the current idle same room type does not exist.
7. A server, characterized in that the server comprises a memory for storing at least one instruction and a processor for executing the at least one instruction to implement the room check-in method according to any one of claims 1 to 3.
8. A computer-readable storage medium having stored thereon at least one instruction which, when executed by a processor, implements a room check-in method according to any of claims 1 to 3.
CN201811163465.3A 2018-09-30 2018-09-30 Guest room check-in method, device, server and storage medium Active CN109523659B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811163465.3A CN109523659B (en) 2018-09-30 2018-09-30 Guest room check-in method, device, server and storage medium
PCT/CN2019/091690 WO2020062952A1 (en) 2018-09-30 2019-06-18 Room check-in method and apparatus, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811163465.3A CN109523659B (en) 2018-09-30 2018-09-30 Guest room check-in method, device, server and storage medium

Publications (2)

Publication Number Publication Date
CN109523659A CN109523659A (en) 2019-03-26
CN109523659B true CN109523659B (en) 2021-05-14

Family

ID=65771742

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811163465.3A Active CN109523659B (en) 2018-09-30 2018-09-30 Guest room check-in method, device, server and storage medium

Country Status (2)

Country Link
CN (1) CN109523659B (en)
WO (1) WO2020062952A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109523659B (en) * 2018-09-30 2021-05-14 深圳春沐源控股有限公司 Guest room check-in method, device, server and storage medium
CN111915036A (en) * 2019-05-10 2020-11-10 阿里巴巴集团控股有限公司 Hotel self-service check-in method, device, equipment, computing equipment and medium
CN110599639B (en) * 2019-08-13 2021-05-07 深圳市天彦通信股份有限公司 Identity verification method and related product
CN110956292A (en) * 2019-11-20 2020-04-03 深圳春沐源控股有限公司 Intelligent accommodation method, server and storage medium
CN111916220A (en) * 2020-07-31 2020-11-10 北京睿家科技有限公司 Information display method and device and information acquisition equipment
CN112767073A (en) * 2021-01-07 2021-05-07 北京码牛科技有限公司 Check-in management control method and device, mobile terminal and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182798A (en) * 2014-09-02 2014-12-03 广州商景网络科技有限公司 Self-service room reservation method and system based on mobile device
CN105376065A (en) * 2015-12-09 2016-03-02 姜恒 Method and system for authenticating and checking identity in checking in hotel
CN108596352A (en) * 2018-04-28 2018-09-28 深圳春沐源控股有限公司 Room state method for tracing and system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001250006A (en) * 2000-03-03 2001-09-14 Primelink:Kk Hotel lodging reserving system
JP2002175457A (en) * 2000-12-06 2002-06-21 Yoshiaki Masuno Hotel reservation system
US20050154620A1 (en) * 2004-01-08 2005-07-14 Lexyl Travel Technologies, Inc. Online Group Reservation System
CN101540034A (en) * 2008-03-21 2009-09-23 当代天启技术(北京)有限公司 Room management system and room management method
CN102262801A (en) * 2010-05-28 2011-11-30 无锡市美普索特电子科技有限公司 Self-service check-in system of hotel
KR20140124557A (en) * 2013-04-17 2014-10-27 전북대학교산학협력단 System and method for reserving rooms
CN105761340B (en) * 2016-01-29 2018-05-01 北京三快在线科技有限公司 A kind of network control method of door lock, device, server and PMS
CN109523659B (en) * 2018-09-30 2021-05-14 深圳春沐源控股有限公司 Guest room check-in method, device, server and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182798A (en) * 2014-09-02 2014-12-03 广州商景网络科技有限公司 Self-service room reservation method and system based on mobile device
CN105376065A (en) * 2015-12-09 2016-03-02 姜恒 Method and system for authenticating and checking identity in checking in hotel
CN108596352A (en) * 2018-04-28 2018-09-28 深圳春沐源控股有限公司 Room state method for tracing and system

Also Published As

Publication number Publication date
WO2020062952A1 (en) 2020-04-02
CN109523659A (en) 2019-03-26

Similar Documents

Publication Publication Date Title
CN109523659B (en) Guest room check-in method, device, server and storage medium
US11068964B2 (en) Method and device for processing service request
CN111127778B (en) Bank self-service terminal recommendation method and device
WO2017128922A1 (en) Network-based control method, apparatus, server and pms for use of door lock
US7986817B2 (en) Verification apparatus, verification method and verification program
CN108829506A (en) Batch tasks processing method, device and service system
CN113050900B (en) Screen sharing method, device, equipment and storage medium
US20140108275A1 (en) Property management system
US20240054584A1 (en) Accomodation management system and accomodation management apparatus
CN104376452A (en) System and method for managing payment success rate on basis of international card payment channel
CN113112654B (en) Access control service host switching method and device
CN114070847B (en) Method, device, equipment and storage medium for limiting current of server
CN110535962B (en) Data synchronization method, device, equipment and storage medium based on authentication equipment
KR102288687B1 (en) Server of system for managing rooms of accommodations
CN112183161B (en) Face database processing method, device and equipment
CN115829070A (en) Library space reservation management method, system and storage medium
CN106570685B (en) Service processing method and device
US9129090B2 (en) Distributed service point transaction system
CN108021597B (en) Parallel counter, server and counting method
US20190089688A1 (en) Twin factor authentication for controller
US10181229B2 (en) Method and system for implementing a universal key card
CN113763609A (en) Access control method and access control system based on permission verification
CN111901299A (en) Application authentication method and device, electronic equipment and storage medium
WO2019098205A1 (en) Authentication device, authentication method, and computer-readable recording medium
CN110956292A (en) Intelligent accommodation method, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220505

Address after: 517000 room 317-1, enterprise service center building, No. 8, Longling Third Road, Longling Industrial Park, Yuancheng District, Heyuan City, Guangdong Province

Patentee after: HEYUAN HONGJIA AGRICULTURAL TECHNOLOGY CO.,LTD.

Address before: 518052 Room 201, building A, 1 front Bay Road, Shenzhen Qianhai cooperation zone, Shenzhen, Guangdong

Patentee before: SHENZHEN SPRINGWOODS HOLDING Co.,Ltd.

TR01 Transfer of patent right