CN114241646A - Guest room door lock remote control method based on identity authentication - Google Patents

Guest room door lock remote control method based on identity authentication Download PDF

Info

Publication number
CN114241646A
CN114241646A CN202110866332.8A CN202110866332A CN114241646A CN 114241646 A CN114241646 A CN 114241646A CN 202110866332 A CN202110866332 A CN 202110866332A CN 114241646 A CN114241646 A CN 114241646A
Authority
CN
China
Prior art keywords
user
room
door lock
customer
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110866332.8A
Other languages
Chinese (zh)
Other versions
CN114241646B (en
Inventor
尚镒森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wangyuefang Intermodal Transportation Management Wuxi Co ltd
Original Assignee
Wangyuefang Intermodal Transportation Management Wuxi Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wangyuefang Intermodal Transportation Management Wuxi Co ltd filed Critical Wangyuefang Intermodal Transportation Management Wuxi Co ltd
Priority to CN202110866332.8A priority Critical patent/CN114241646B/en
Publication of CN114241646A publication Critical patent/CN114241646A/en
Application granted granted Critical
Publication of CN114241646B publication Critical patent/CN114241646B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/02Reservations, e.g. for tickets, services or events
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/24Credit schemes, i.e. "pay after"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • G06Q30/0637Approvals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/12Hotels or restaurants
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides a guest room door lock remote control method based on identity authentication, which comprises the following steps: receiving room information issued by a first user, creating a virtual key for each room, and generating a time limit of the first user according to the room information of the first user if the group attribute of the first user is a preset attribute; receiving borrowing and replacing request information of a second user, and sending a borrowing and replacing request to a first user; assigning a room of a first user to a second user; receiving reservation request information sent by a first client to a second user; associating the personal information of the first customer with the room number assigned by the second user, and assigning a virtual key of the room number to the first customer; and the first customer opens the intelligent door lock of the guest room according to the virtual key. The invention improves the utilization rate of idle guest rooms, better meets the check-in requirements of team customers, and saves the on-site labor cost by transacting accommodation affairs on line by self-help.

Description

Guest room door lock remote control method based on identity authentication
Technical Field
The invention belongs to the field of hotel safety control, and particularly relates to a remote control method for a guest room door lock based on identity authentication.
Background
With the development of the travel industry and the mobile internet, the traditional service apartment/hotel apartment/property hotel, etc. are increasingly added to the e-commerce platform. Taking service apartments and residential homes as an example, owners generally want to combine self-use with business, self-use while on vacation or at rest, and business the rooms to the outside for the rest of the time. General external renting modes include daily renting and long renting, the rent of the daily renting is high, but the house owner needs to spend much energy to search for the house guests every day, and due to unbalanced and unpredictable amount of orders, the room is vacant, so that the investment return of the house owner cannot be guaranteed. On the other hand, some residents may still have order demands when there is no room, and supply shortage occurs, while other residents nearby have no reservation and supply is larger than demand. And traditional hotel, resident's room etc. are mostly through the managers handle flows such as visitor's registration, receive silver and management of returning a house, but have the problem that the operation cost is high, and user experience is relatively poor.
Disclosure of Invention
In view of the above, the present invention overcomes the defects of the prior art, and performs resource sharing on owner users having idle guest room resources through an information platform, and controls the exchange of guest room usage rights, so as to improve the utilization rate of guest room resources, meet the requirements of both owners and guests, and solve the problems of high operation cost of the traditional lodging industry, etc.
The invention provides a guest room door lock remote control method based on identity authentication in a first aspect, which comprises the following steps:
s1: receiving room information issued by a first user, wherein the room information comprises a room number and a position, and calculating the number of rooms input by the first user;
s2: creating a virtual key for each room information published by the first user;
s3: acquiring group attributes of a first user, and generating a time limit of the first user according to room information of the first user if the group attributes of the first user are preset attributes;
s4: receiving borrowing and replacing request information of a second user, and sending the borrowing and replacing request to the first user;
s5: when borrowing and exchanging confirmation information of the first user is received, distributing the room of the first user to the second user;
s6: updating the time limit of the second user, generating a borrowing and exchanging order and initiating a first payment operation of the second user to the first user;
s7: receiving reservation request information sent by a first client to a second user;
s8: receiving reservation confirmation information of the second user aiming at the reservation request information, generating a reservation order, receiving personal information of the first client, and initiating a second payment operation of the first client to the second user;
s9: associating the personal information of the first customer with the first room number assigned by the second user and assigning a virtual key for the first room number to the first customer;
s10: and when the position of the first customer is positioned at the position of the first room number, unlocking the intelligent door lock of the guest room according to the virtual key provided by the first customer.
Preferably, the virtual key comprises a one-time password, the smart door lock comprises a keypad, and the method further comprises:
and when the first customer inputs the one-time password of the virtual key on the keyboard, remotely controlling the intelligent door lock to be unlocked.
Preferably, the virtual key comprises a two-dimensional code, the smart door lock comprises a camera, and the method further comprises:
and when the camera shoots and identifies the two-dimensional code of the virtual key provided by the first customer, remotely controlling the intelligent door lock to be unlocked.
Preferably, the virtual key comprises a signal, the method further comprising:
and when the first client approaches the mobile equipment to the intelligent door lock and the signal receiving module of the intelligent door lock verifies that the signal is legal, remotely controlling the intelligent door lock to be opened.
Preferably, the group attribute is setting information of the first user, and is used for setting whether the first user agrees to room lending; the preset attribute is that the first user sets the group attribute to allow room lending.
Preferably, the time limit represents the using time amount of the loanable room, namely the current using days of the current year, which are calculated from the current on-line room; the updating the time limit of the second user further comprises:
and deducting the using time amount of the current preset room to obtain the updated time limit of the second user.
Preferably, before step S1, the method further comprises:
the first user, the second user and the first customer complete the registration of the unmanned hotel platform through mobile equipment and are assigned with the security identity, and the security identity is associated with the network identity card.
Preferably, the first client is a team client, and the step S8 further includes:
and generating an interface for the client to reserve rooms, and processing registration, namely uploading personal information and paying the check-in fee by the team check-in personnel through the interface.
Preferably, after the first customer completes registration and confirms that the identity verification is passed, the first customer is directly allocated with a virtual key corresponding to the room, so that the first customer is allowed to directly arrive at the room to unlock the door lock without field registration and room allocation.
Preferably, after the step S10, the method further comprises:
and when a check-out request of the first customer is received, determining a second payment amount which needs to be paid by the first customer, and informing the second user to execute a third payment operation.
Preferably, after the step S10, the method further comprises:
when a check-in request of the first customer is received, a third payment amount which needs to be paid by the first customer is determined, and the first customer is allocated with an associated room number.
Compared with the prior art, the invention has the following advantages:
the utilization rate of the idle guest room is improved to the maximum extent, and the check-in orders of the team customers are better matched. In addition, the client can perform online self-service processing on reservation, check-in, identity verification, check-in and check-out, so that the field labor cost of the hotel is saved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
To illustrate the embodiments of the present invention or the technical solutions in the prior art more clearly, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
Figure 1 illustrates a block diagram of a direct stay unmanned hospitality management platform according to an embodiment of the present invention.
Fig. 2 shows a flow chart of a method for remotely controlling a door lock of a guest room based on identity authentication according to the invention.
Figure 3 illustrates a schematic diagram of the operational steps of a direct stay unmanned hospitality management platform according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention allows the owners to borrow the rooms of other owners by time-sharing transfer of the house use right on the basis of operating the original rooms, realizes the borrowing and changing of guest rooms and the integrated operation, can borrow and change more rented rooms at one time, and meets the team orders with the batch guest room booking requirements.
Referring to fig. 1, the direct-standing unmanned hotel platform system of the present invention comprises the following functional modules:
the room information publishing and displaying module is used for receiving a room online request submitted by an owner user, and the owner user can publish the room information to the unmanned hotel platform for other users to check; the owner user can add, modify, and delete room information at any time and specify whether to add a room to the room exchange plan.
The borrowing and changing days management module is used for generating borrowing and changing days of a specific room, correspondingly deducting the borrowing and changing days after an owner user completes borrowing and changing the rooms of other users, transferring the deducted borrowing and changing days to the owner user who borrows the room, and carrying out zero clearing and updating on the borrowing and changing days at the end of each year;
the booking judgment and primary payment module is used for generating a borrowing and exchanging order when the second owner user requests to borrow and exchange the idle room of the first owner user, and initiating the payment operation of the second owner user to the first owner user to indicate that the second owner user successfully reserves and borrows the guest room of the first owner user;
the room reservation display and secondary payment module is used for generating an interface for reserving the room by the resident when the resident team sends reservation request information, and the team attendance in the interface transacts registration, namely uploads personal information and pays the attendance fee;
the identity network card information module is used for making a network identity card according to the requirement of the electronic network identity card when a user registers through mobile equipment such as a mobile phone and the like;
the position checking and check-in person judging module is used for sending the identity information of the check-in person to the door, determining whether the identity information is consistent with the identity information of the subscriber through the network identity card and the position checking, and sending the determination result to the door lock control module;
the system comprises a plurality of entrant gender judgment modules, a door lock control module and a door lock control module, wherein the gender judgment modules are used for judging the gender of a second entrant after a first entrant exists in a room, and sending the judgment result to the door lock control module;
the system comprises a check-in and check-out information prompting module, a general manager or a housework manager and a sweeper, wherein the check-in and check-out information prompting module is used for sending check-in and check-out information to the general manager or the housework manager and the sweeper so that relevant personnel can check and clean rooms;
the door lock control module is used for unlocking the intelligent door lock of the guest room according to the virtual key provided by the client;
the guest room synchronous electric control module is used for automatically controlling the on-off of circuits in the house according to the state of a guest room door lock, automatically getting electricity after a customer enters and opens the door lock, and automatically turning off after the customer leaves and closes the door lock;
the personnel management module is used for managing and maintaining basic information and role information of field operator users, including a general manager, a house service manager, a sweeper and the like;
the refuge charging module is used for automatically settling the house fee according to the length of the client check-in time;
the settlement and accounting module is used for transferring the final house fee to an account of the owner receiving the team order;
the cleaning and checking module is used for storing and updating the room checking and cleaning results and informing a field operator user;
the evaluation module is used for receiving subjective evaluation information of the order form by the resident, and the information can be checked by all users who directly live the unmanned hotel platform;
the point accumulation and point consumption module is used for calculating points of platform users, increasing corresponding points for the resident users and the owner users after each order is completed, and performing point consumption through the point gift exchange platform; and
and the marketing statistic module is used for counting the order quantity, the sales income, the room borrowing and changing income of each hotel according to a preset period and the variation trend of each income.
For simplicity of explanation, the method embodiments of the present invention are described as a series of acts or combinations of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts or acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also realize that the embodiments described in the specification are presently preferred embodiments and that the acts and elements referred to are not necessarily required in the present application.
Referring to fig. 2, based on the above-mentioned unmanned hotel platform system for standing by, the method for remotely controlling a door lock of a guest room based on identity authentication specifically includes the following steps:
step 1: and receiving room information issued by a first user, wherein the room information comprises a room number and a position, and calculating the number of rooms input by the user.
The first user of the present invention may be a home owner. Before the steps, a registration request of a user through a mobile device is received, and a security identity is distributed to the first user. Namely, when a house owner registers and directly lives on the unmanned hotel platform through mobile equipment such as a mobile phone, a network identity card can be manufactured according to the requirement of the electronic network identity card. After the registration is completed, the house owner becomes a house owner user of the direct-holding unmanned hotel platform, the own room information can be issued in the direct-holding unmanned hotel platform, and the room information and the personal information are modified or reset, so that other house owner users or house booking clients of the direct-holding unmanned hotel platform can search and browse the room information and the house owner personal information. The room information includes, but is not limited to, room area, pictures, geographic location, floors, facilities, and rental prices.
Step 2: and creating a virtual key for each room, and sending the virtual key to a first user to which the room belongs.
Wherein, the door of each room is pre-installed with an intelligent door lock. The intelligent door lock can be unlocked through the virtual key, so that the door is opened. Specifically, the virtual key may be a password, and the smart door lock includes a keyboard, and when a user inputs the password of the virtual key on the keyboard, the door lock is unlocked. The virtual key also can be bar code, two-dimensional code etc. intelligence lock includes the camera, when shooing and discerning the bar code, the two-dimensional code etc. of the virtual key that the user provided, the lock is opened. The virtual key can also be a Bluetooth signal, an NFC signal and the like, when a user enables the mobile device to approach the intelligent door lock, and the signal receiving module of the intelligent door lock verifies that the signal is legal, the door lock is unlocked. Preferably, the virtual key information such as the password, the barcode, the two-dimensional code, the bluetooth signal and the NFC signal has a predefined validity period.
And step 3: the group attribute of the first user is obtained. And if the group attribute of the first user is a preset attribute, generating the time limit of the first user according to the room information of the first user.
Specifically, the group attribute is setting information of whether or not to participate in "room lending" selected by the user. And if the house owner determines to join the guest room exchange, determining the group attribute as a preset attribute of 'allowing the guest room exchange'. In this case, the time limit of the house owner, i.e., the remaining amount of time used by the house owner, needs to be generated, and may be expressed as "day ticket for loan and exchange". For example, the amount of time used may be calculated by starting the day the house owner's current room is on line, and ending at 31 months of the year, the number of days.
Preferably, the number of "day tickets borrowed" is automatically generated for the room after the rental price for the room is obtained.
And 4, step 4: and receiving borrowing and exchanging request information of a second user, and sending the borrowing and exchanging request to the first user.
Wherein the second user is a home owner who has completed registration in the direct-check unmanned hotel platform. For example, the second user is another house owner who directly lives on the unmanned hotel platform, when the second user receives the team check-in reservation requirement and the number of the team is larger than the capacity of the second user, the second user needs to meet the check-in requirement of the team through room borrowing, and a request can be sent to all the first users whose group attribute is the preset attribute, namely other house owners who agree to the 'room borrowing' to request to temporarily rent or borrow rooms of other house owners.
And 5: when borrowing confirmation information of the first user is received, distributing the room of the first user to the second user.
The direct-living unmanned hotel platform sets a unique identification number for each owner user or hotel in advance, or sets a cell identification number managed by the same hotel property, and the identification number is called as a shop number. The door lock of each room is also identified using the number. For example: apartments a and hotels B have store numbers a and B, respectively. Thus 1 room 201 in apartment a and 1 room 201 in hotel B are identified as a-1-201 and B-1-201, respectively. By using the shop number identification code, the repetition can not occur, and the coded lock of A can not unlock the room with the same house number of B.
The second user may search for a free room under the same store number before sending a loan request to the first user. If the free room is deemed to meet the required throughput, a loan request may be sent to the first user. The order requirements may include number of rooms, room configuration, room location, etc.
The step of allocating the room of the first user to the second user specifically includes that after the first user agrees to rent the room of the first user to the second user, the direct-holding unmanned hotel platform locks the batch rooms which the second user applies for renting, and only allows the order allocation of the second user. At this time, the operation of the batch room by other users than the second user is prohibited. Preferably, the operations include room lending requests, room booking, and room information viewing.
In an alternative embodiment, when the loan confirmation message of the first user is not received, the room of the first user is prohibited from being allocated to the second user, and the method ends.
Step 6: and updating the time limit of the second user, generating a borrowing and exchanging order, and initiating a first payment operation of the second user to the first user.
As previously described, the platform has generated a time limit for each homeowner that represents the amount of usage time remaining for that homeowner. The second user rents the room of the first user, which is another owner, and the time limit of the second user needs to be deducted, namely the updated time limit of the second user is obtained by calculating the days/time in a mode of paying a 'borrowing and exchanging days certificate', namely the days of deducting the number of the rooms preset at the next time from the 'usable exchanging number' of the owner of the house.
Preferably, a debit order is generated with a preset validation time, for example valid within 30 minutes, and a cost charge is prepaid to the field operations manager public account indicating that the reservation was successful (this is the first payment). And if the valid time is exceeded, canceling the borrowing and exchanging order, and returning the room of the first user to the first user, namely returning to the state before the step 4.
And 7: and receiving the subscription request information sent by the first client to the second user.
The first customer is a common consumer customer of the direct-holding unmanned hotel platform, namely a room reservation with a check-in demand. Likewise, the first customer completes registration of the unmanned hotel platform via the mobile device and is assigned a secure identification. Namely, when a person who makes a reservation directly lives on the unmanned hotel platform through mobile phone registration, a network identity card is manufactured according to the requirement of the electronic network identity card. After registration is completed, the room reservation becomes a client of the direct-holding unmanned hotel platform, and room information and homeowner personal information of each hotel can be searched and browsed in the direct-holding unmanned hotel platform.
And 8: and receiving reservation confirmation information of the second user aiming at the reservation request information, generating a reservation order, receiving personal information of the first client, and initiating a second payment operation of the first client to the second user.
When the reservation request information of the first customer includes a plurality of rooms, the reservation order is a team order. It is necessary to receive personal information of all actual entrants entered by the first customer. Alternatively, when the first customer comprises a plurality of customers, the reservation order actually comprises a plurality of sub-orders, requiring receipt of personal information of the actual dwellers entered by the plurality of customers.
In practice, an interface may be generated where the customer subscribes to the room, where the team check-in registers, i.e., uploads personal information and a payment for the check-in fee (this is a second payment).
In a further preferred embodiment, the second user sets an upper limit of the number of persons and a gender attribute for each room after acquiring the rooms of the first user. The upper limit of the number of people represents the number of receivable subscribers in each room; the gender attribute includes a male room and a female room, resulting in a total number of male and female rooms. The first client transmits the reservation request information according to the upper limit of the number of persons in the disposable room and the gender attribute of the second user. In the second payment operation stage of the first client, the payment paid by each client can be calculated according to the total price of the rooms and the upper limit of the number of the rooms. For example, if 2 persons can live in the standard room, each person pays 50% of the room price.
In an alternative embodiment, when the first client does not receive the subscription confirmation information of the second user, generation of the subscription order and subsequent steps are prohibited and the method ends.
And step 9: associating the personal information of the first customer with the first room number assigned by the second user, and assigning a virtual key for the first room number to the first customer.
According to the upper limit of the number of the rooms and the gender attribute set by the second user, the personal information of each client can be associated with a specific room, namely, a specific room number is distributed to each resident of the team. The team accommodator registers the accommodations by checking numbers according to the number of the male and female rooms and the room numbers set by the owner of the borrowed and changed guest room, and distributes the virtual keys of the rooms to the subscribers after the successful registration. For each room, when a first check-in person checks for check-in by paying, the identity information of the check-in person is sent to a door, and through network identity card and position verification, if the check-in person is consistent with the identity information of a subscriber, namely, the check-in person proves that the subscriber checks in by himself, a virtual key of the room is distributed to the check-in person who is registered successfully, so that the intelligent door lock of the guest room is unlocked through the virtual key. When other entrants in the room pay for entrance, a gender determination is first made, and only when it is determined that the other entrants are the same gender as the first entrance, the other entrants may be allowed to pay for entrance. The means for determining the gender of the immigrant includes, but is not limited to, identification of identification number and face recognition.
The identity information of the check-in person and the subscriber is confirmed specifically by comparing the face information of the check-in person with the face information of the network identity card of the subscriber; or the fingerprint information of the check-in person is compared with the fingerprint information of the network identity card of the subscriber.
And after the first customer completes payment or unlocks the door lock, distributing the first payment amount of the first customer to the second customer. Thus, the house payments by the team are automatically billed to the owner account that received the team order by borrowing the room. The first payment amount may include a house fee and a pre-paid deposit. If the first client proposes an unsubscribe request, judging whether the unsubscribe request meets a predefined condition, and automatically executing a preset flow according to the check-in state and the unsubscribe time. For example, the pre-paid deposit is refunded, and the ratio of the house fee refund is determined according to the time difference between the refunding time and the check-in time; the smaller the time difference is, the lower the rate of refund of the house fee is. Or if the person who enters the hotel can not enter the hotel due to safety or equipment, and the person who enters the hotel puts forward a refund within 5 minutes after the door is opened, sending a message to the direct-holding unmanned hotel platform manager so that the direct-holding unmanned hotel platform manager can verify the door lock account and refund the payment account.
Step 10: and when the position of the first customer is positioned at the position of the first room number, unlocking the intelligent door lock of the guest room according to the virtual key provided by the first customer.
Specifically, the first customer may first scan the two-dimensional code at the door of the guest room to trigger the door opening operation. And responding to the two-dimensional code scanning of the first client, and verifying whether the positioning position of the first client is positioned at the position of the current room again to ensure that the check-in person is the same as the registered registrant. After the two-dimensional code is scanned and confirmed, a one-time password is automatically generated, and the one-time password has the validity period of 10 minutes. After receiving the one-time password, the first client inputs the password through the door lock keyboard, and controls the door lock to be opened after the password is correctly input. In an alternative embodiment, the two-dimensional code is scanned and confirmed, and then a plurality of one-time passwords are automatically generated, such as the one-time passwords respectively used for doors, crossing doors, elevator doors, guest room doors and the like of hotels and apartments. After receiving the one-time password, the first client inputs the password through a corresponding door lock keyboard, and controls the door lock to be opened after the password is correctly input.
After the door lock is successfully opened, the automatic electric control module is automatically communicated with a circuit in the room, and a customer can normally use all electric facilities in the room.
In consideration of the working environment of the narrow-band Internet of things, the intelligent door lock works in a low-voltage state, and low working energy consumption is kept as much as possible to prolong the working time of equipment. In order to ensure the uniqueness of the user virtual key, the user virtual key realizes online generation, updating and revocation management, can record and archive unlocking user information, enables the state of the door lock to be inquired, and realizes the functions of early warning and tracking.
Since wireless communication is adopted between systems, information is easy to intercept, and according to a further optimized embodiment, a time encryption mechanism is adopted, and replay attack is prevented by adding time information. When a first customer logs in the unmanned hotel platform, the user position check is started randomly, and when the user is actually within a safe distance range, the lock can be normally unlocked.
Firstly, a first client obtains a private key k through a direct-holding unmanned hotel platformpiAnd the intelligent door lock is used for connecting the intelligent door lock to send an unlocking signal and generate a position. Platform issues key to intelligent door locki. When a user needs to unlock the lock, the user firstly uses the mobile equipment to log in the platform, at the moment, the nearby equipment is designated as the verification gateway, and the user splits the own secret key into a plurality of secret key fragments KiAnd sending the data to each verification gateway through NFC. The verification gateway uses the key fragment to generate a current position coordinate for the unlocking user, the mobile equipment of the first client packs the position coordinates and sends the position coordinates to the platform, and the platformThis position coordinate is verified. When the verification is successful, the mobile device of the first client is connected with the intelligent door lock through NFC, the unlocking signal containing the position coordinate and the current time information are sent to the intelligent door lock after being encrypted through the secret key, and the intelligent door lock decrypts the sent information through the secret key issued by the platform. When the decryption is successful, the first client identity and position information is confirmed, and the lock is opened. The unauthorized party can not unlock without a secret key, and meanwhile, a first client which is not near the intelligent door lock can not unlock, and when a malicious user tries to attack the system, the security mechanism can effectively resist the attack.
And for the position coordinates, within a certain legal distance, the request equipment collects a plurality of digital signatures for authorized digital signatures provided at a certain time and then sends the signatures to the management terminal for verification. For each first client XiHeld mobile device UEiIf there are n nearby UEsiTrusted authentication gateway (UG), User Equipment (UE) generating position coordinatesiUG for UE over NFC for device to send unlock signaliPosition coordinates are generated. When X is presentiBefore unlocking, setting XiMust use its own private key kpiDividing into n key segments, and then respectively transmitting the key segments to n UGs, which are used for the UE by embedding the received key segmentsiAnd attaching its own digital signature authorization. UE (user Equipment)iAnd merging all generated position coordinates, encrypting and sending the position coordinates to the platform, verifying the time and the place of the position coordinates by the platform, and decrypting and recovering the key fragment after the verification is successful. If the original private key k can be recoveredpiI.e. the position coordinate is real, otherwise the first client X is representediIs an untrusted user. By the above process, XiThe position of the platform is required to be within an allowable range, otherwise, a legal position coordinate cannot be generated, unlocking operation cannot be refused due to illegal position coordinate verification, or the platform cannot recover the original private key k through the key fragmentpiBut is deemed to have been denied access without having completed the attestation work with all UG nearby.
Specifically, the identity authentication mechanism based on the position coordinates comprises three stages, wherein the first stage is a position coordinate generation stage, the second stage is a position coordinate authentication stage, and the third stage is a time encryption stage.
For the position generation process of the first stage, the following is specific:
1.1) if a first client UEi wishes to perform an unlocking operation at a certain time q, the UEi needs to broadcast a request generation location coordinate to the surrounding authentication gateway UG and wait for a response from the nearby authentication gateway UG. The location coordinate generation request is denoted as RQ:
RQ=HMAC(UE_IDi,rani)|q|L
wherein: UE _ IDiIs a UEiThe unique identity of (2); raniIs a preset random number; l is UEiTransmitting position information included in the position coordinate generation request RQ; HMAC () hashing the UE _ IDiAnd raniGenerate a corresponding hash value, any user cannot receive the HMAC (UE _ ID) due to its irreversibilityi,rani) Then calculates the UE _ IDiAnd raniAnd the platform may pass the sent UE _ IDiAnd raniThe validity of the information is verified, and the user identity information is prevented from being leaked to other participants.
1.2) when the nearby authentication gateway UG receives the position coordinate generation request RQ, the UE is informed by sending a response packet AkiA request is received and position coordinates are prepared for generation thereof.
1.3)UEiAfter receiving Aks sent by n verification gateways UG, the private key k of the gateway is usedpiDivided into n key fragments. The key fragment generation method is as follows, and the degree is lambda:
KGN(x)=ω01x+…+ωλxλ
wherein: omegai(i ∈ [ 0, λ ]) is a set of non-zero random integers, ω0=kpi. For n authentication gateways UG, each gateway UGiThe received key fragment K1=KGN(1),K2=KGN(2),…,Ki=KGN(i),…,Kn= KGN (n) eachGenerating a key fragment set:
{Ki|i∈{1,2,…,n-1,n}}
then, the UEiGenerating an intermediate key k for the negotiation results of all authentication gateways UG simultaneouslytAnd to corresponding UGiSending a key fragment K encrypted with this keyiThe packet Tk of (1).
Tk=E(kt(Ki))
Wherein: e is the encryption algorithm DES. Meanwhile, in order to ensure that the private key is not leaked, the first client mobile device generates different key fragments at different time and positions.
1.4) authentication gateway UGiAfter Tk is received, the intermediate key k is passedtDecrypting a key fragment KiThen is the UEiThe unauthorized locations are generated as follows:
LU=HMAC(UE_IDi,rani)|HMAC(L,ran_UGi)|E(kt(Ki))
ran_UGiis UGiFor UEiThe random number corresponding to the position is generated by adopting a hash function SHA, namely: ran _ UGi=SHA(L|UG_IDi);
UG after position coordinates are generatediWill use its own private key kUGiGenerating signatures for position coordinates and using platform public key k0Associating location coordinates with a UEiIntermediate key ktAnd generating an authorized position coordinate ELU after the self identification is encrypted.
ELU=Ek0(UG_IDi|kt|LU|EkUGi(LU))
UGiLocation coordinates ELU and UG to authorizeiFor UEiRandom number ran _ UG of HMAC () of position(s)iAre respectively sent to UEi
1.5) if the UEiFrom n UGiThe authorized location coordinates ELU are successfully received, and the final location coordinates FNL are generated by using n ELUs.
FNL=ELU1|ran_UG1|ELU2|ran_UG2,…,|ELUn|ran_UGn|L|q
For the location coordinate verification process of the second stage, the following is specific:
2.1) when a certain UEiWhen a platform is expected to be in a position L at a certain time q, firstly generating self final position coordinates FNL, and then identifying self identity UE _ IDiRandom number ran associated with HMAC () in RQ at time of position coordinate generationiAnd sending the information to the platform for verification, wherein the verification request information is marked as RC.
RC=ELU1|ran_UG1|ELU2|ran_UG2,…,|ELUn|ran_UGn|L|q|UE_IDi|rani
2.2) platform receives UEiAfter the sent verification request information RC is sent, each position coordinate and UE are extractediAnd the random number in its HMAC () and constitutes the new information RC'.
RC’=ELU1|ELU2,…,ELUn|UE_IDi|rani
2.3) after the platform extracts RC', the ELU is processediVerifying the validity; then recovering the UE from the RCiPrivate key k ofpiTo distinguish the first client UEiWhether collusion spoofing is performed.
Original private key kpiThe recovery process is as follows:
for a set of key fragments KiAnd selecting any k +1 key fragments, wherein | i belongs to {1, 2, …, n-1, n } }, and the generated polynomial KGN (x) can be recovered by using an interpolation algorithm.
Wherein: m isjCorresponding key fragment Ki(ii) a x corresponds to the number of the authentication gateway UG; each elementary polynomial nj(x) Expressed as:
when KGN (x) is obtained, let x =0, i.e., KGN (0) = ω0=kpiObtaining UEiThe original private key. If the recovered key is the same as the original private key kpiIf the consistency is kept, the UE is indicatediAnd the platform allows the platform to proceed to the next process to send an unlocking signal instead of collusion-generated false position coordinates.
For the time encryption phase process of the third phase, the following is specific:
3.1) after completion of the location verification, the UE is allowediAnd sending an unlocking signal with the intelligent door lock. First, the UEiSending UE _ ID over NFCi|Ekpi(res, q) sniffing the packet to the intelligent door lock to confirm whether the connection establishment is successful.
Wherein: e () is DES encryption algorithm, res is packet type identification, and the intelligent door lock is informed that the type of the message is sniffing packet; q is the current time; UE _ IDiIs identified by the first client mobile device identity.
3.2) remote private key sent by intelligent door lock through using platformiThe sniff packet is decrypted. For authorized users, their keysi=kpiAnd after decryption succeeds, comparing the current time q'. If | q-q' | > T and T is allowed time difference, representing that the information is replay information, refusing to return to UEi(ii) a Otherwise, returning confirmation information.
3.3) when UEiAfter receiving the confirmation information, the connection is successfully established, and an unlocking signal UE _ ID is sent to the intelligent door locki|Ekpi(setup,q)
Where setup is the unlock enable signal. After the intelligent door lock receives the unlocking instruction, the setup and the instruction sending time q are extracted through the private key. And if the time difference between q and the self-time is within an allowable range, executing an unlocking enabling signal. If the time difference exceeds the predefined allowable range, the unlocking enable signal setup is rejected.
Step 11: and when a check-out request of the first customer is received, determining a second payment amount which needs to be paid by the first customer, and informing the second user to execute a third payment operation.
In the normal check-in stage, the resident can click the 'check-out' button to check out the house through the mobile terminal, the house fee is automatically settled according to the check-in time length, and the final house fee is transferred to the account of the owner who receives the team order form by the second user. And sending the room returning request to a management end of the direct-standing unmanned hotel platform, and automatically informing management personnel of carrying out operations such as sanitation and cleanness. And finally paying the cost of water, electricity, sanitation and grass arrangement according to the number of the borrowing and exchanging days tickets paid by the second user.
Accordingly, after the check-out settlement is completed and the door lock is determined to be closed, the automatic electric control module automatically cuts off the circuit in the room and sets all the electric facilities in the room to the disabled state.
In addition, the resident can delay by clicking a 'check-in' button by the mobile terminal in the normal check-in stage, and when the check-in request of the resident is received, the check-in amount required to be paid by the resident is determined. If the check-in is successful, it is determined whether rooms need to be reassigned based on the room reservation status. For example, if the current room A-1-201 is not reserved, then room A-1-201 continues to be assigned to the current tenant. Otherwise, it is necessary to return to step 9 to reassign the associated room number of the current first client.
A detailed workflow of the direct stay unmanned hotel management platform can be seen in figure 3.
Through the technical scheme of the invention, a house owner rents 365-day use rights of each room in one-time and batch use in a straight-living unmanned hotel management platform system, borrows and exchanges currently-free rooms for other house owners in a neighbor house owner and a local area, uses the rooms in a combined manner to rent, gives rent income to an operator who rents, and removes cost expenses of washing water and electricity cotton fabrics of the rooms, wherein 365-day use time is used every year, and the number of single rents and the number of the users are deducted when the rooms are used in each borrowing and exchange, so that the number of the rooms which can be used at present is judged, thereby not only improving the profit of the renting operator, but also improving the utilization rate of the idle rooms to the maximum extent, better matching the order of the clients, particularly team orders and meeting the requirements of different users. The client's reservation, check-in and check-out are all handled by oneself online, need not set up the customer service proscenium, and the user can be followed to the hotel body, has saved the cost of labor, and the flexibility is high, improves user experience degree.
Those of skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It will be understood by those skilled in the art that all or part of the processes in the methods for implementing the embodiments described above can be implemented by instructing the relevant hardware through a computer program, and the program can be stored in a computer-readable storage medium, and when executed, the program can include the processes of the embodiments of the methods described above.
Although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those skilled in the art that various changes in the form and details of the embodiments may be made, or equivalents may be substituted for elements thereof; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (11)

1. A guest room door lock remote control method based on identity authentication is applied to a direct-holding unmanned hotel management platform and is characterized by comprising the following steps:
s1: receiving room information issued by a first user, wherein the room information comprises a room number and a position, and calculating the number of rooms input by the first user;
s2: creating a virtual key for each room information published by the first user;
s3: acquiring group attributes of a first user, and generating a time limit of the first user according to room information of the first user if the group attributes of the first user are preset attributes;
s4: receiving borrowing and replacing request information of a second user, and sending the borrowing and replacing request to the first user;
s5: when borrowing and exchanging confirmation information of the first user is received, distributing the room of the first user to the second user;
s6: updating the time limit of the second user, generating a borrowing and exchanging order and initiating a first payment operation of the second user to the first user;
s7: receiving reservation request information sent by a first client to a second user;
s8: receiving reservation confirmation information of the second user aiming at the reservation request information, generating a reservation order, receiving personal information of the first client, and initiating a second payment operation of the first client to the second user;
s9: associating the personal information of the first customer with the first room number assigned by the second user and assigning a virtual key for the first room number to the first customer;
s10: and when the position of the first customer is positioned at the position of the first room number, unlocking the intelligent door lock of the guest room according to the virtual key provided by the first customer.
2. The identity authentication-based guest room door lock remote control method of claim 1, wherein the virtual key comprises a one-time password, the smart door lock comprises a keyboard, the method further comprising:
and when the first customer inputs the one-time password of the virtual key on the keyboard, remotely controlling the intelligent door lock to be unlocked.
3. The identity authentication-based guest room door lock remote control method of claim 1, wherein the virtual key comprises a two-dimensional code, the smart door lock comprises a camera, the method further comprising:
and when the camera shoots and identifies the two-dimensional code of the virtual key provided by the first customer, remotely controlling the intelligent door lock to be unlocked.
4. The identity authentication-based room door lock remote control method according to claim 1, wherein the virtual key comprises a signal, the method further comprising:
and when the first client approaches the mobile equipment to the intelligent door lock and the signal receiving module of the intelligent door lock verifies that the signal is legal, remotely controlling the intelligent door lock to be opened.
5. The identity authentication-based room door lock remote control method according to claim 1, wherein the group attribute is setting information of the first user for setting whether the first user agrees room borrowing or not; the preset attribute is that the first user sets the group attribute to allow room lending.
6. The identity authentication-based guest room door lock remote control method according to claim 1, wherein the time limit represents the usage time of the loanable room, namely the current number of days of usage of the current year, which is calculated from the current day of the room online;
the updating the time limit of the second user further comprises:
and deducting the using time amount of the current preset room to obtain the updated time limit of the second user.
7. The identity authentication-based room door lock remote control method according to claim 1, wherein before step S1, the method further comprises:
the first user, the second user and the first customer complete the registration of the unmanned hotel platform through mobile equipment and are assigned with the security identity, and the security identity is associated with the network identity card.
8. The identity authentication-based remote control method for a door lock of a guest room of claim 7, wherein the first client is a team client, and the step S8 further comprises:
an interface is generated for the customer to book the room so that each team customer can process registration, i.e., upload personal information and pay for check-in fees, through the interface.
9. The method as claimed in claim 8, wherein after the first client completes registration and confirms that the identity verification is passed, the virtual key of the corresponding room is directly allocated to the first client, so as to allow the first client to directly arrive at the room to unlock the door lock without field registration and room allocation.
10. The identity authentication-based room door lock remote control method according to claim 1, wherein after the step S10, the method further comprises:
and when a check-out request of the first customer is received, determining a second payment amount which needs to be paid by the first customer, and informing the second user to execute a third payment operation.
11. The identity authentication-based room door lock remote control method according to claim 1, wherein after the step S10, the method further comprises:
when a check-in request of the first customer is received, a third payment amount which needs to be paid by the first customer is determined, and the first customer is allocated with an associated room number.
CN202110866332.8A 2021-07-29 2021-07-29 Guest room door lock remote control method based on identity authentication Active CN114241646B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110866332.8A CN114241646B (en) 2021-07-29 2021-07-29 Guest room door lock remote control method based on identity authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110866332.8A CN114241646B (en) 2021-07-29 2021-07-29 Guest room door lock remote control method based on identity authentication

Publications (2)

Publication Number Publication Date
CN114241646A true CN114241646A (en) 2022-03-25
CN114241646B CN114241646B (en) 2023-09-01

Family

ID=80742858

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110866332.8A Active CN114241646B (en) 2021-07-29 2021-07-29 Guest room door lock remote control method based on identity authentication

Country Status (1)

Country Link
CN (1) CN114241646B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108320352A (en) * 2017-01-16 2018-07-24 重庆特斯联智慧科技股份有限公司 Intelligent hotel door lock control system and its control method
CN110910280A (en) * 2019-10-30 2020-03-24 尚镒森 Borrowing and changing guest room integrated operation method for unmanned hotel
CN110910206A (en) * 2019-10-30 2020-03-24 尚镒森 Method and operation system for free exchange of residents on vacation accommodation for whole people
CN111213163A (en) * 2017-06-08 2020-05-29 深圳市创富金科技有限公司 Intelligent hotel management method and system
CN111756715A (en) * 2020-06-15 2020-10-09 尚镒森 Intelligent check-in method, device and equipment for connecting each booking network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108320352A (en) * 2017-01-16 2018-07-24 重庆特斯联智慧科技股份有限公司 Intelligent hotel door lock control system and its control method
CN111213163A (en) * 2017-06-08 2020-05-29 深圳市创富金科技有限公司 Intelligent hotel management method and system
CN110910280A (en) * 2019-10-30 2020-03-24 尚镒森 Borrowing and changing guest room integrated operation method for unmanned hotel
CN110910206A (en) * 2019-10-30 2020-03-24 尚镒森 Method and operation system for free exchange of residents on vacation accommodation for whole people
CN111756715A (en) * 2020-06-15 2020-10-09 尚镒森 Intelligent check-in method, device and equipment for connecting each booking network

Also Published As

Publication number Publication date
CN114241646B (en) 2023-09-01

Similar Documents

Publication Publication Date Title
CN108428168B (en) House renting method and system based on block chain technology
US10423921B2 (en) Delivery reservation apparatus and method
CN105915344B (en) A kind of electron key shared service system for house lease
CN101277191B (en) Non-repudiation for digital content delivery
CN111553767B (en) Shared house leasing system, method and storage medium based on block chain
CN107169826A (en) A kind of tourist attraction ticketing method and system based on block chain
CN109544302A (en) House renting management method, electronic device based on block chain
CN105931485A (en) Appointment service system for shared parking stalls
CN103765861A (en) Payment selection and authorization by a mobile device
CN110111501B (en) Mobile house management platform
CN109711847A (en) Method, apparatus, electronic equipment and the computer storage medium of near-field information certification
CN108921646A (en) On a kind of Support Line and the Management System on Public Rooms and method of offline businesses' pooling of interests
KR20200125181A (en) Method for offering real estate information by predicting moving data
CN110084665A (en) It rents a house method of commerce, device, electronic equipment and computer readable storage medium
US20190068565A1 (en) Systems and Methods for Providing Access Through Use of Security Key Pairs
JP4463497B2 (en) Point management system
CN114241646B (en) Guest room door lock remote control method based on identity authentication
US20220270423A1 (en) Identity-based enablement of event access control
KR101506384B1 (en) Cloud type Building Management Method
CN108681944A (en) A kind of house lease management method and system
CN109740326A (en) It is a kind of can the barcode scanning data processing method and system of the electric energy meter that use
CN109034976A (en) A kind of realization method and system of community's house lease service
JP6505970B2 (en) Access control system and access control method
CN112735004A (en) Virtual key distribution method, server and distribution system
CN114730404A (en) Timing rental device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant