CN202815965U - Network remote guest room check-in control system - Google Patents

Network remote guest room check-in control system Download PDF

Info

Publication number
CN202815965U
CN202815965U CN 201220358194 CN201220358194U CN202815965U CN 202815965 U CN202815965 U CN 202815965U CN 201220358194 CN201220358194 CN 201220358194 CN 201220358194 U CN201220358194 U CN 201220358194U CN 202815965 U CN202815965 U CN 202815965U
Authority
CN
China
Prior art keywords
door lock
password
timeliness
cipher door
guest room
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 201220358194
Other languages
Chinese (zh)
Inventor
石劲磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Concept Home (china) Ltd
Original Assignee
Concept Home (china) Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Concept Home (china) Ltd filed Critical Concept Home (china) Ltd
Priority to CN 201220358194 priority Critical patent/CN202815965U/en
Application granted granted Critical
Publication of CN202815965U publication Critical patent/CN202815965U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The embodiment of the utility model discloses a network remote guest room check-in control system which comprises at least one password door lock and a central server which can generate an aging password, wherein the central server and the password door lock can be connected in a communicable mode; the password door lock comprises an input device, an aging password decoder, a clock output circuit, a comparer and a controlled switch member; the input device is connected with the aging password decoder; the aging password decoder is connected with the comparer; the clock output circuit is connected with the comparer; and the controlled switch member is connected with the comparer. Based on the network remote guest room check-in control system provided by the embodiment of the utility model, the operation convenience and the efficiency in guest room check-in in industries providing accommodation, such as hotels and service apartments, are improved.

Description

Control system is moved in a kind of network remote guest room
Technical field
The utility model relates to electronic technology field, is specifically related to a kind of network remote guest room and moves in control system.
Background technology
At present, when carrying out hotel occupancy, by being to arrive first by internet or phone reservations, then paying the fees and exchange CUSTOM HOUSE HOTEL for to reception counter of hotel, then with CUSTOM HOUSE HOTEL to specifying the guest room just to live.Practice finds, this mode needs the participations that much manually grasp, wastes time and energy and grasping easily and makeing mistakes.
The utility model content
The utility model embodiment provides a kind of network remote guest room to move in control method and relevant apparatus, in the hope of improving simple operation and the efficient of hotel occupancy.
The utility model embodiment provides a kind of cipher door lock network remote guest room to move in control system, comprising:
At least one cipher door lock and produce the central server of timeliness password, but described central server be connected cipher door lock and connect with communication mode;
Wherein, described cipher door lock comprises: input media, timeliness cryptogram decoding device, clock output circuit, comparer and controlled switch parts; Wherein, described input media be connected that timeliness cryptogram decoding device connects, described timeliness cryptogram decoding device and the comparer of being connected connects, described clock output circuit and the comparer of being connected connects, described controlled switch parts and the comparer of being connected connect.
Optionally, central server is used for, and receives the booking guest room request; The time of moving in, check-out time and cipher door lock sign based on the booking guest room request that receives is carried calculate the timeliness password according to default cryptographic algorithm; Send the timeliness password that calculates to subscriber terminal equipment.
Optionally, described timeliness cryptogram decoding device, move in instruction and timeliness password if be used for receiving the client by the input media input, the timeliness password of input media being inputted according to default decipherment algorithm is decrypted computing, obtain the time of moving in, check-out time and cipher door lock sign that this timeliness password comprises, and identify to the time of moving in, check-out time and the cipher door lock that the timeliness password that the comparer transmission obtains comprises;
Described comparer, whether the sign that is used for the password comparison door lock is identical with the cipher door lock sign that timeliness cryptogram decoding device decryption limitation password obtains; What whether the current time of comparison clock output circuit output was later than or equaled that timeliness cryptogram decoding device decryption limitation password obtains moves in the time, the current time of comparison clock output circuit output, whether equal the check-out time that timeliness cryptogram decoding device decryption limitation password obtains early than the person; If the sign of cipher door lock is identical with the cipher door lock sign that timeliness cryptogram decoding device decryption limitation password obtains, and what the current time of clock output circuit output was later than or equaled that timeliness cryptogram decoding device decryption limitation password obtains moves in the time, and the current time of clock output circuit output early than or equal the check-out time that timeliness cryptogram decoding device decryption limitation password obtains, then send unlocking signal to the controlled switch parts; If the sign of cipher door lock is different from the cipher door lock sign that timeliness cryptogram decoding device decryption limitation password obtains, or the current time of clock output circuit output is early than moving in the time that timeliness cryptogram decoding device decryption limitation password obtains, and the current time of clock output circuit output is later than the check-out time that timeliness cryptogram decoding device decryption limitation password obtains, and then sends block signal to the controlled switch parts;
Described controlled switch parts are used for unblanking locking after receiving the block signal that comparer sends after receiving the unlocking signal that described comparer sends.
Optionally, described cipher door lock also comprises the communication unit that is connected with described comparer;
Wherein, communication unit is used for, and sends to central server and successfully moves in instruction.
Optionally, described communication unit also is used for, and can send to subscriber terminal equipment by communication and successfully move in prompting message.
Optionally, described cipher door lock also can comprise the alarm device that is connected with described comparer;
Wherein, described alarm device is used for, and is different from the cipher door lock sign that the decryption limitation password obtains if comparer compares the sign of cipher door lock, then sends the room number fault alarm.
Optionally, described alarm device also is used for, if the sign that comparer compares cipher door lock is identical with the cipher door lock sign that the decryption limitation password obtains, and the current time early than moving in the time that the decryption limitation password obtains, then send and move in too early alarm;
Optionally, described alarm device also is used for, if the sign that comparer compares cipher door lock is identical with the cipher door lock sign that the decryption limitation password obtains, and the current time be later than the check-out time that the decryption limitation password obtains, then send and moved in late alarm.
Optionally, described cipher door lock also can comprise the inductor that is connected with described controlled switch parts.
Therefore the utility model embodiment cipher door lock network remote guest room is moved in control system and is comprised: at least 1 cipher door lock and produce the central server of timeliness password, but central server is connected communication mode and is connected with cipher door lock; Wherein, cipher door lock comprises: input media, timeliness cryptogram decoding device, clock output circuit, comparer and controlled switch parts.Input media is connected with timeliness cryptogram decoding device, timeliness cryptogram decoding device with comparer connection be connected that clock output circuit is connected with comparer, the controlled switch parts are connected with comparer.The cipher door lock of this hardware structure is for to have established hardware foundation based on timeliness cipher switch door lock.Based on this hardware structure, the timeliness password that the user utilizes predetermined guest room to obtain just can be directly into the dweller room, reduce hotel service personnel's operation and then be conducive to avoid maloperation, be conducive to improve simple operation and efficient that the industry guest room of accommodating in hotel, service formula apartment etc. is moved in.
Description of drawings
In order to be illustrated more clearly in the technical scheme of the utility model embodiment, the below will describe to embodiment the simply introduction of accompanying drawing do of required use, apparently, accompanying drawing in the following describes only is embodiment more of the present utility model, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the schematic flow sheet that control method is moved in a kind of network remote guest room that the utility model embodiment provides;
Fig. 2-a is the synoptic diagram of a kind of cipher door lock of providing of the utility model embodiment;
Fig. 2-b is the synoptic diagram of the another kind of cipher door lock that provides of the utility model embodiment;
Fig. 2-c is the synoptic diagram of the another kind of cipher door lock that provides of the utility model embodiment;
Fig. 2-d is the synoptic diagram of the another kind of cipher door lock that provides of the utility model embodiment;
Fig. 3 is that the control system synoptic diagram is moved in a kind of network remote guest room that the utility model embodiment provides.
Embodiment
The utility model embodiment provides the network remote guest room to move in control method and relevant apparatus, in the hope of improving simple operation and the efficient of hotel occupancy.
For so that utility model purpose of the present utility model, feature, advantage can be more obvious and understandable, below in conjunction with the accompanying drawing among the utility model embodiment, technical scheme among the utility model embodiment is clearly and completely described, obviously, the embodiments described below only are the utility model part embodiment, but not whole embodiment.Based on the embodiment in the utility model, those of ordinary skills are not making all other embodiment that obtain under the creative work prerequisite, all belong to the scope of the utility model protection.
Term " first " in instructions of the present utility model and claims and the above-mentioned accompanying drawing, " second ", " the 3rd " " 4th " etc. (if exist) are be used to distinguishing similar object, and needn't be used for describing specific order or precedence.The data that should be appreciated that such use suitably can exchanged in the situation, so as embodiment of the present utility model described herein for example can with except diagram here or describe those order enforcement.In addition, term " comprises " and " having " and their any distortion, intention is to cover not exclusive comprising, for example, comprised those steps or unit that process, method, system, product or the equipment of series of steps or unit are not necessarily limited to clearly list, but can comprise clearly do not list or for these processes, method, product or equipment intrinsic other step or unit.
An embodiment of control method is moved in the utility model network remote guest room, and method can comprise: central server receives the booking guest room request; The time of moving in that central server carries based on the booking guest room request that receives, check-out time and cipher door lock sign calculate the timeliness password according to default cryptographic algorithm; Central server sends the timeliness password that calculates to subscriber terminal equipment; If the cipher door lock in the first guest room, hotel receives the client and moves in instruction and timeliness password by input media input; Then the cipher door lock in the first guest room is decrypted computing according to default decipherment algorithm to the timeliness password of inputting, and obtains the time of moving in, check-out time and cipher door lock sign that this timeliness password comprises; If the sign of the cipher door lock in the first guest room is identical with the cipher door lock sign that the decryption limitation password obtains, and what the current time was later than or equaled that the decryption limitation password obtains moves in the time, and the current time equals the check-out time that the decryption limitation password obtains early than the person, and then the cipher door lock in the first guest room is opened; If the sign of the cipher door lock in the first guest room is different from the cipher door lock sign that the decryption limitation password obtains, or the current time is early than moving in the time that the decryption limitation password obtains, or the current time be later than the check-out time that the decryption limitation password obtains, then the cipher door lock in the first guest room keeps closed condition.
Referring to Fig. 1, the utility model embodiment provides a kind of network remote guest room to move in control method, can comprise:
101, central server receives the booking guest room request.
102, central server calculates the timeliness password based on the entrained time of moving in of the booking guest room request that receives, check-out time and cipher door lock sign according to default cryptographic algorithm.
In embodiment more of the present utility model, the timeliness password that above-mentioned central server calculates can comprise a plurality of characters (for example, at least 9 numerals and/or letter and/or other character), can obtain the information such as its time of moving in that comprises, check-out time and cipher door lock sign by the decryption limitation password.
Wherein, for example numbering, the network address of cipher door lock or can be used in the out of Memory of distinctive mark cipher door lock of cipher door lock sign.
103, central server sends the timeliness password that calculates to subscriber terminal equipment.
In embodiment more of the present utility model, subscriber terminal equipment for example is mobile phone, notebook computer or personal digital assistant equipment or other terminal device.
If the cipher door lock in the first guest room, 104 hotels receives the client and moves in instruction and timeliness password by input media (such as keyboard or touch-screen etc.) input, then the cipher door lock in the first guest room is decrypted computing according to default decipherment algorithm to the timeliness password of inputting, and obtains the time of moving in, check-out time and cipher door lock sign that this timeliness password comprises.
If the sign of the cipher door lock in 105 first guest rooms is identical with the cipher door lock sign that the decryption limitation password obtains, and what the current time was later than or equaled that the decryption limitation password obtains moves in the time, and the current time early than or equal the check-out time that the decryption limitation password obtains, then the cipher door lock in the first guest room is opened; If the sign of the cipher door lock in the first guest room is different from the cipher door lock sign that the decryption limitation password obtains, or the current time is early than moving in the time that the decryption limitation password obtains, or the current time be later than the check-out time that the decryption limitation password obtains, then the cipher door lock in the first guest room keeps closed condition.
In embodiment more of the present utility model, the cipher door lock in the first guest room receive first the client by input media input move in instruction and timeliness password, then the cipher door lock in the first guest room also can send to central server after opening and successfully move in instruction.Central server can begin to move in charging after successfully moving in instruction receiving.
In embodiment more of the present utility model, after central server receives and successfully moves in instruction, also can send to subscriber terminal equipment by communication and successfully move in prompting message.
In embodiment more of the present utility model, if the cipher door lock in the first guest room receives first the client and moves in instruction and timeliness password by input media input, the cipher door lock in the first guest room also can send to subscriber terminal equipment by communication and successfully move in prompting message after opening.
In embodiment more of the present utility model, if the cipher door lock in the first guest room sign is different from the cipher door lock sign that the decryption limitation password obtains, then the cipher door lock in the first guest room can send room number fault alarm (or other literal, image or the alarm of sound/light).If the cipher door lock in the first guest room sign is identical with the cipher door lock sign that the decryption limitation password obtains, and then the cipher door lock in the first guest room can send and move in too early alarm (or other literal, image or the alarm of sound/light) early than moving in the time that the decryption limitation password obtains the current time.If the cipher door lock in the first guest room sign is identical with the cipher door lock sign that the decryption limitation password obtains, and the current time is later than the check-out time that the decryption limitation password obtains, and then the cipher door lock in the first guest room also can send and move in late alarm (or other literal, image or the alarm of sound/light).
In embodiment more of the present utility model, for ease of hotel management personal management and guest room cleaning, super code also can prestore in the cipher door lock in guest room; When the cipher door lock in guest room received the password identical with the super code that prestores from input media, the cipher door lock in this guest room also can be opened.
In embodiment more of the present utility model, if the cipher door lock in the first guest room, hotel receives the client by check out instruction and the timeliness password of input media input; Then the cipher door lock in the first guest room is decrypted computing according to default decipherment algorithm to the timeliness password of inputting, and obtains check-out time and cipher door lock sign that this timeliness password comprises; If the cipher door lock in the first guest room sign is identical with the cipher door lock sign that the decryption limitation password obtains, and the current time early than or equal the check-out time that the decryption limitation password obtains, then the cipher door lock in the first guest room is closed and is sent the instruction of checking out to central server.
In embodiment more of the present utility model, if the cipher door lock in the first guest room, hotel receives the client by check out instruction and the timeliness password of input media input; Then the cipher door lock in the first guest room is decrypted computing according to default decipherment algorithm to the timeliness password of inputting, and obtains check-out time and cipher door lock sign that this timeliness password comprises; If the cipher door lock in the first guest room sign is identical with the cipher door lock sign that the decryption limitation password obtains, and the current time early than or equal the check-out time that the decryption limitation password obtains, then the cipher door lock in the first guest room also can further send the prompting message of successfully checking out by communication to subscriber terminal equipment after closing.
In other embodiment of the present utility model, central server receives after the instruction of checking out, and also can send the prompting message of successfully checking out to subscriber terminal equipment.
In some embodiment of the utility model, also can dispose I.D. (or other identification documents) induction recognition unit in the cipher door lock in the first guest room, make the cipher door lock in the first guest room have I.D. (or other identification documents) recognition function.The cipher door lock in the first guest room receives first the client and moves in instruction and certain timeliness password by input media input, if the sign of the cipher door lock in the first guest room is identical with the cipher door lock sign that this timeliness password of deciphering obtains, and the current time is later than or equals to decipher moving in the time that this timeliness password obtains, and the current time early than or equal to decipher the check-out time that this timeliness password obtains, then the cipher door lock in the first guest room is opened, if the cipher door lock in the first guest room is also sensed I.D. (or other identification documents), the cipher door lock in the first guest room can record this I.D. (or other identification documents) number, after this early than or equal to decipher any time of the check-out time that this timeliness password obtains, if the cipher door lock in the first guest room is sensed again identical I.D. (or other identification documents), then the cipher door lock in the first guest room also can be opened.So, after utilizing first the timeliness password to move in the guest room, the user just can directly utilize I.D. freely to open this guest room in the time range allowing to move in.In addition, also can use I.D. (or other identification documents) number to carry out booking guest room, directly utilize afterwards I.D. freely to open corresponding guest room door in the time range allowing to move in.
In other embodiment of the present utility model, also can dispose fingerprint (or helix exterior feature or eyeball or other biological characteristic) induction recognition unit in the cipher door lock in the first guest room, so that make the cipher door lock in the first guest room have fingerprint (or helix exterior feature or eyeball or other biological characteristic) recognition function.The cipher door lock in the first guest room receives first the client and moves in instruction and certain timeliness password by input media input, if the sign of the cipher door lock in the first guest room is identical with the cipher door lock sign that this timeliness password of deciphering obtains, and the current time is later than or equals to decipher moving in the time that this timeliness password obtains, and the current time early than or equal to decipher the check-out time that this timeliness password obtains, then the cipher door lock in the first guest room is opened, if also responding to, the cipher door lock in the first guest room recognizes user fingerprints (or helix exterior feature or eyeball or other biological characteristic), the cipher door lock in the first guest room can record this and identify user fingerprints (or helix exterior feature or eyeball or other biological characteristic), after this early than or equal to decipher any time of the check-out time that this timeliness password obtains, if the cipher door lock in the first guest room is sensed again identical (or helix exterior feature or eyeball or other biological characteristic), then the cipher door lock in the first guest room also can be opened.So, after utilizing first the timeliness password to move in the guest room, the user just can directly utilize (or helix exterior feature or eyeball or other biological characteristic) freely to open this guest room in the time range allowing to move in.
In other embodiment of the present utility model, central server also can be realized the comprehensive displaying in hotel, comprises the displaying of the information such as Online Map, room video, room picture, room-size and configuration.Central server can be provided on the gauze subscribes online charging function, automatically calculates rent according to guest's ticket reserving time section, and with fast money, Alipay, Net silver docks online, the guest can pay the bill by payment way.Select room number after finishing payment, finish subscribe pay after, the guest receives subscription information and timeliness password, consume complete after by self-service the checking out of cipher door lock realization.Further, central server also can be set up central database, comprises the guest room data management, hotel's building data management, company personnel's data management, customer data management, and central database docked with third party's SMS platform, realize the short message prompt function that the guest books rooms and password is accepted.The guest room sends data to central database by the network terminal device of cipher door lock, and central database arranges etc. according to guest and the customer service operational order current state to the guest room.
Therefore the present embodiment central server goes out the timeliness password according to the booking guest room information calculations, and sends the timeliness password that calculates to subscriber terminal equipment; If the cipher door lock in guest room, hotel receives the client and moves in instruction and timeliness password by input media input; Then this cipher door lock is decrypted computing according to default decipherment algorithm to the timeliness password of inputting, and obtains the time of moving in, check-out time and cipher door lock sign that this timeliness password comprises; If the sign of the cipher door lock in guest room is identical with the cipher door lock sign that the decryption limitation password obtains, and what the current time was later than or equaled that the decryption limitation password obtains moves in the time, and the current time equals the check-out time that the decryption limitation password obtains early than the person, and then this guest room cipher door lock is opened; If the sign of the cipher door lock in this guest room is different from the cipher door lock sign that the decryption limitation password obtains, or the current time is early than moving in the time that the decryption limitation password obtains, or the current time be later than the check-out time that the decryption limitation password obtains, then the cipher door lock in this guest room keeps closed condition.Based on this mechanism, the timeliness password that the user directly utilizes predetermined guest room to obtain just can be directly into the dweller room, reduce hotel service personnel's operation and then be conducive to avoid maloperation, be conducive to improve simple operation and efficient that the industry guest room of accommodating in hotel, service formula apartment etc. is moved in.
Referring to Fig. 2-a, the utility model embodiment also provides a kind of cipher door lock 200, can comprise: input media 210(such as keyboard or touch-screen), timeliness cryptogram decoding device 220, clock output circuit 230, comparer 240 and controlled switch parts 250.
Wherein, input media 210 is connected connection, timeliness cryptogram decoding device 220 and is connected connection, clock output circuit 230 with comparer and is connected connection, controlled switch parts 250 with comparer and is connected connection with comparer with timeliness cryptogram decoding device.
Wherein, timeliness cryptogram decoding device 220, move in instruction and timeliness password if be used for receiving the client by input media 210 inputs, the timeliness password of input media 210 being inputted according to default decipherment algorithm is decrypted computing, obtain the time of moving in, check-out time and cipher door lock sign that this timeliness password comprises, and the time of moving in, check-out time and cipher door lock that the timeliness password that obtains to comparer 240 transmission comprises identify.
Comparer 240, whether the sign that is used for password comparison door lock 200 is identical with the cipher door lock sign that timeliness cryptogram decoding device 220 decryption limitation passwords obtain; What whether the current time of comparison clock output circuit 230 output was later than or equaled that timeliness cryptogram decoding device 220 decryption limitation passwords obtain moves in the time, the current time of comparison clock output circuit 230 outputs, whether equal the check-out time that timeliness cryptogram decoding device 220 decryption limitation passwords obtain early than the person; If the sign of cipher door lock 200 is identical with the cipher door lock sign that timeliness cryptogram decoding device 220 decryption limitation passwords obtain, and what the current time of clock output circuit 230 output was later than or equaled that timeliness cryptogram decoding device 220 decryption limitation passwords obtain moves in the time, and the current time of clock output circuit 230 output early than or equal the check-out time that timeliness cryptogram decoding device 220 decryption limitation passwords obtain, then send unlocking signal to controlled switch parts 250; If the sign of cipher door lock 200 is different from the cipher door lock sign that timeliness cryptogram decoding device 220 decryption limitation passwords obtain, or the current time of clock output circuit 230 outputs is early than moving in the time that timeliness cryptogram decoding device 220 decryption limitation passwords obtain, and the current time of clock output circuit 230 outputs is later than the check-out time that timeliness cryptogram decoding device 220 decryption limitation passwords obtain, and then sends block signal to controlled switch parts 250.
Controlled switch parts 250 are used for unblanking locking after receiving the block signal that comparer 240 sends after receiving the unlocking signal that comparer 240 sends.
Referring to Fig. 2-b, cipher door lock 200 also can comprise communication unit 260, and communication unit 260 is connected connection with comparer.
In embodiment more of the present utility model, communication unit 260 can be used for, and after first based on above-mentioned timeliness password unlocking controlled switch parts 250, sends to central server and successfully to move in instruction.
In embodiment more of the present utility model, communication unit 260 also can be used for, and after first based on above-mentioned timeliness password unlocking controlled switch parts 250, can send to subscriber terminal equipment by communication and successfully move in prompting message.
Referring to Fig. 2-c, cipher door lock 200 also can comprise alarm device 270.Alarm device 270 is connected connection with comparer.
Alarm device 270 is used for, and is different from the cipher door lock sign that the decryption limitation password obtains if comparer 240 compares the sign of cipher door lock 200, then sends room number fault alarm (or other literal, image or the alarm of sound/light).
Alarm device 270 also is used for, if it is identical with the cipher door lock sign that the decryption limitation password obtains that comparer 240 compares the sign of cipher door lock 200, and the current time then sends and moves in too early alarm (or other literal, image or the alarm of sound/light) early than moving in the time that the decryption limitation password obtains.
Alarm device 270 also is used for, if it is identical with the cipher door lock sign that the decryption limitation password obtains that comparer 240 compares the sign of cipher door lock 200, and the current time is later than the check-out time that the decryption limitation password obtains, and then also can send and move in late alarm (or other literal, image or the alarm of sound/light).
In some embodiment of the utility model, timeliness cryptogram decoding device 220 also is used for, if receive the client by check out instruction and the timeliness password of input media 210 inputs; Then according to default decipherment algorithm the timeliness password of inputting is decrypted computing, obtain check-out time and cipher door lock sign that this timeliness password comprises, and check-out time and cipher door lock that the timeliness password that obtains to comparer 240 transmission comprises identifies.
Comparer 240, whether the sign that is used for password comparison door lock 200 is identical with the cipher door lock sign that timeliness cryptogram decoding device 220 decryption limitation passwords obtain; The current time of comparison clock output circuit 230 outputs, whether equal the check-out time that timeliness cryptogram decoding device 220 decryption limitation passwords obtain early than the person; If the sign of cipher door lock 200 is identical with the cipher door lock sign that timeliness cryptogram decoding device 220 decryption limitation passwords obtain, and the current time of clock output circuit 230 output early than or equal the check-out time that timeliness cryptogram decoding device 220 decryption limitation passwords obtain, then send block signal to controlled switch parts 250, and communication unit 260 sends the instruction of checking out.
Communication unit 260 also can be used for, receive the instruction of checking out that comparer 240 sends after, send the instruction of checking out to central server.
In other embodiment of the present utility model, communication unit 260 also can be used for, and receives after the instruction of checking out of comparer 240 transmissions, sends the prompting message of successfully checking out by communication to subscriber terminal equipment.
Referring to Fig. 2-d, cipher door lock 200 also can comprise inductor 280.Inductor 280 can be connected with controlled switch parts 250.
Inductor 280 is used for induction identification I.D. (or other identification documents).
In other embodiment of the present utility model, after first based on above-mentioned timeliness password unlocking controlled switch parts 250, if inductor 280 is also sensed I.D. (or other identification documents), then record this I.D. (or other identification documents) number, after this early than or equal to decipher any time of the check-out time that this timeliness password obtains, if inductor 280 is sensed again identical I.D. (or other identification documents), then inductor 280 can send unlocking signal to controlled switch parts 250.
In other embodiment of the present utility model, inductor 280 is used for induction identification fingerprint (or helix exterior feature or eyeball or other biological characteristic).
In some embodiment of the utility model, after first based on above-mentioned timeliness password unlocking controlled switch parts 250, if inductor 280 is also sensed fingerprint (or helix exterior feature or eyeball or other biological characteristic), then record this fingerprint (or helix exterior feature or eyeball or other biological characteristic), after this early than or equal to decipher any time of the check-out time that this timeliness password obtains, if inductor 280 is sensed again identical fingerprint (or helix exterior feature or eyeball or other biological characteristic), then inductor 280 can send unlocking signal to controlled switch parts 250.
Wherein, controlled switch parts 250 also are used for, and unblank after receiving the unlocking signal that inductor 280 sends.
Be understandable that the cipher door lock 200 of present embodiment can be such as the access device in the above-mentioned embodiment of the method, the function of its each functional unit can according to the method specific implementation among the said method embodiment, repeat no more herein.
Therefore the cipher door lock in the present embodiment comprises: input media, timeliness cryptogram decoding device, clock output circuit, comparer and controlled switch parts.Input media is connected with timeliness cryptogram decoding device, timeliness cryptogram decoding device with comparer connection be connected that clock output circuit is connected with comparer, the controlled switch parts are connected with comparer.The cipher door lock of this hardware structure is for to have established hardware foundation based on timeliness cipher switch door lock.Based on this hardware structure, the timeliness password that the user utilizes predetermined guest room to obtain just can be directly into the dweller room, reduce attendant's operation and then be conducive to avoid maloperation, be conducive to improve simple operation and efficient that the industry guest room of accommodating in hotel, service formula apartment etc. is moved in.
Referring to Fig. 3, the utility model embodiment also provides a kind of network remote guest room to move in control system, can comprise:
The central server 310 of at least one guest room cipher door lock 320 and generation timeliness password.Wherein, the cipher door lock 320 that comprises the first guest room at least one guest room cipher door lock 320.
Wherein, but central server 310 are connected with cipher door lock and can communication mode connect.
Wherein, central server 310 can be used for, and receives the booking guest room request; The time of moving in, check-out time and cipher door lock sign based on the booking guest room request that receives is carried calculate the timeliness password according to default cryptographic algorithm; Send the timeliness password that calculates to subscriber terminal equipment.
The cipher door lock 320 in the first guest room is moved in instruction and timeliness password if be used for receiving the client by the input media input; Then according to default decipherment algorithm the timeliness password of inputting is decrypted computing, obtains the time of moving in, check-out time and cipher door lock sign that this timeliness password comprises; If the sign of the cipher door lock in the first guest room is identical with the cipher door lock sign that the decryption limitation password obtains, and what the current time was later than or equaled that the decryption limitation password obtains moves in the time, and the current time equals the check-out time that the decryption limitation password obtains early than the person, then opens the cipher door lock in the first guest room; If the sign of the cipher door lock in the first guest room is different from the cipher door lock sign that the decryption limitation password obtains, or the current time is early than moving in the time that the decryption limitation password obtains, or the current time be later than the check-out time that the decryption limitation password obtains, then keep the closed condition of the cipher door lock in the first guest room.
In embodiment more of the present utility model, the cipher door lock 320 in the first guest room receive first the client by input media input move in instruction and timeliness password after, send to central server 310 after the cipher door lock 320 in the first guest room also is used in and opens and successfully move in instruction.Central server 310 also is used in to receive successfully to move in and can begins to move in charging after the instruction.
In embodiment more of the present utility model, after central server 310 also can be further used for receiving and successfully move in instruction, send to subscriber terminal equipment by communication and successfully to move in prompting message.
In other embodiment of the present utility model, if the cipher door lock 320 in the first guest room receives first the client and moves in instruction and timeliness password by input media input, after the cipher door lock 320 in the first guest room also is used in and opens, send to subscriber terminal equipment by communication and successfully to move in prompting message.
In embodiment more of the present utility model, the cipher door lock 320 in the first guest room also can be used for, if the cipher door lock in the first guest room sign is different from the cipher door lock sign that the decryption limitation password obtains, then send room number fault alarm (or the warning information such as other literal, image or the alarm of sound/light).The cipher door lock 320 in the first guest room also can be used for, if the cipher door lock in the first guest room sign is identical with the cipher door lock sign that the decryption limitation password obtains, and the current time then sends and moves in too early alarm (or other literal, image or the alarm of sound/light) early than moving in the time that the decryption limitation password obtains.The cipher door lock 320 in the first guest room also can be used for, if the cipher door lock in the first guest room sign is identical with the cipher door lock sign that the decryption limitation password obtains, and the current time is later than the check-out time that the decryption limitation password obtains, and then can send and move in late alarm (or other literal, image or the alarm of sound/light).
In embodiment more of the present utility model, for ease of hotel management personal management and guest room cleaning, super code also can prestore in the cipher door lock in guest room; When the cipher door lock 320 in guest room received the password identical with the super code that prestores from input media, the cipher door lock in this guest room also can be opened.
In embodiment more of the present utility model, the cipher door lock 320 in the first guest room also can be used for, if receive the client by check out instruction and the timeliness password of input media input, according to default decipherment algorithm the timeliness password of inputting is decrypted computing, obtains check-out time and cipher door lock sign that this timeliness password comprises; If the cipher door lock in the first guest room sign is identical with the cipher door lock sign that the decryption limitation password obtains, and the current time early than or equal the check-out time that the decryption limitation password obtains, then close the cipher door lock in the first guest room and send the instruction of checking out to central server.
In embodiment more of the present utility model, the cipher door lock 320 in the first guest room also can be used for, if receive the client by check out instruction and the timeliness password of input media input; According to default decipherment algorithm the timeliness password of inputting is decrypted computing, obtains check-out time and cipher door lock sign that this timeliness password comprises; If the cipher door lock in the first guest room sign is identical with the cipher door lock sign that the decryption limitation password obtains, and the current time early than or equal the check-out time that the decryption limitation password obtains, send the prompting message of successfully checking out by communication to subscriber terminal equipment after then closing the cipher door lock in the first guest room.
In other embodiment of the present utility model, central server 310 also can be used for, and receives the instruction of checking out and sends the prompting message of successfully checking out to subscriber terminal equipment afterwards.
In embodiment more of the present utility model, also can further dispose I.D. (or other identification documents) induction recognition unit in the cipher door lock 320 in the first guest room, make the cipher door lock 320 in the first guest room have I.D. (or other identification documents) recognition function.The cipher door lock 320 in the first guest room receives first the client and moves in instruction and certain timeliness password by input media input, if the sign of the cipher door lock in the first guest room is identical with the cipher door lock sign that this timeliness password of deciphering obtains, and the current time is later than or equals to decipher moving in the time that this timeliness password obtains, and the current time early than or equal to decipher the check-out time that this timeliness password obtains, then the cipher door lock 320 in the first guest room is opened, if the cipher door lock 320 in the first guest room is also sensed I.D. (or other identification documents), the cipher door lock 320 in the first guest room can record this I.D. (or other identification documents) number, after this, early than or equal to decipher any time of the check-out time that this timeliness password obtains, if the cipher door lock 320 in the first guest room is sensed again identical I.D. (or other identification documents), then the cipher door lock 320 in the first guest room also can be opened.So, after utilizing first the timeliness password to move in the guest room, the user just can directly utilize I.D. freely to open this guest room in the time range allowing to move in.In addition, also can use I.D. (or other identification documents) number to carry out booking guest room, directly utilize afterwards I.D. freely to open corresponding guest room door in the time range allowing to move in.
In other embodiment of the utility model, also can dispose fingerprint (or helix exterior feature or eyeball or other biological characteristic) induction recognition unit in the cipher door lock 320 in the first guest room, so that make the cipher door lock 320 in the first guest room have fingerprint (or helix exterior feature or eyeball or other biological characteristic) recognition function.The cipher door lock 320 in the first guest room receives first the client and moves in instruction and certain timeliness password by input media input, if the sign of the cipher door lock in the first guest room is identical with the cipher door lock sign that this timeliness password of deciphering obtains, and the current time is later than or equals to decipher moving in the time that this timeliness password obtains, and the current time early than or equal to decipher the check-out time that this timeliness password obtains, then the cipher door lock 320 in the first guest room can be opened, if also responding to, the cipher door lock 320 in the first guest room recognizes user fingerprints (or helix exterior feature or eyeball or other biological characteristic), the cipher door lock 320 in the first guest room also can record this and identify user fingerprints (or helix exterior feature or eyeball or other biological characteristic), after this early than or equal to decipher any time of the check-out time that this timeliness password obtains, if the cipher door lock 320 in the first guest room is sensed again identical (or helix exterior feature or eyeball or other biological characteristic), then the cipher door lock 320 in the first guest room also can be opened.So, after utilizing first the timeliness password to move in the guest room, the user just can directly utilize (or helix exterior feature or eyeball or other biological characteristic) freely to open this guest room in the time range allowing to move in.
Be appreciated that the concrete structure of present embodiment code door lock 320, can be such as code door lock 200 or its distressed structure of describing among the above-mentioned embodiment, associated description can with reference to the description of above-described embodiment, be given unnecessary details herein no longer one by one.
Be understandable that the function of each equipment of present embodiment system can according to the method specific implementation among the said method embodiment, repeat no more herein.
Therefore the present embodiment central server goes out the timeliness password according to the booking guest room information calculations, and sends the timeliness password that calculates to subscriber terminal equipment; If the cipher door lock in guest room, hotel receives the client and moves in instruction and timeliness password by input media input; Then this cipher door lock is decrypted computing according to default decipherment algorithm to the timeliness password of inputting, and obtains the time of moving in, check-out time and cipher door lock sign that the timeliness password comprises; If the sign of the cipher door lock in this guest room is identical with the cipher door lock sign that the decryption limitation password obtains, and what the current time was later than or equaled that the decryption limitation password obtains moves in the time, and the current time equals the check-out time that the decryption limitation password obtains early than the person, and then this guest room cipher door lock is opened; If the sign of the cipher door lock in this guest room is different from the cipher door lock sign that the decryption limitation password obtains, or the current time is early than moving in the time that the decryption limitation password obtains, or the current time be later than the check-out time that the decryption limitation password obtains, then the cipher door lock in this guest room keeps closed condition.Based on this mechanism, the timeliness password that the user directly utilizes predetermined guest room to obtain just can be directly into the dweller room, reduce attendant's operation and then be conducive to avoid maloperation, be conducive to improve simple operation and efficient that the industry guest room of accommodating in hotel, service formula apartment etc. is moved in.
More than network remote guest room that the utility model embodiment is provided move in control method and relevant apparatus is described in detail, used specific case herein principle of the present utility model and embodiment are set forth, the explanation of above embodiment just is used for helping to understand method of the present utility model and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present utility model, all will change in specific embodiments and applications, to sum up, this description should not be construed as restriction of the present utility model.

Claims (9)

1. control system is moved in a network remote guest room, it is characterized in that, comprising:
At least one cipher door lock and produce the central server of timeliness password, but described central server be connected cipher door lock and connect with communication mode;
Wherein, described cipher door lock comprises: input media, timeliness cryptogram decoding device, clock output circuit, comparer and controlled switch parts; Wherein, described input media be connected that timeliness cryptogram decoding device connects, described timeliness cryptogram decoding device and the comparer of being connected connects, described clock output circuit and the comparer of being connected connects, described controlled switch parts and the comparer of being connected connect.
2. control system is moved in network remote according to claim 1 guest room, it is characterized in that,
Central server is used for, and receives the booking guest room request; The time of moving in, check-out time and cipher door lock sign based on the booking guest room request that receives is carried calculate the timeliness password according to default cryptographic algorithm; Send the timeliness password that calculates to subscriber terminal equipment.
3. control system is moved in network remote according to claim 1 guest room, it is characterized in that,
Described timeliness cryptogram decoding device, move in instruction and timeliness password if be used for receiving the client by the input media input, the timeliness password of input media being inputted according to default decipherment algorithm is decrypted computing, obtain the time of moving in, check-out time and cipher door lock sign that this timeliness password comprises, and identify to the time of moving in, check-out time and the cipher door lock that the timeliness password that the comparer transmission obtains comprises;
Described comparer, whether the sign that is used for the password comparison door lock is identical with the cipher door lock sign that timeliness cryptogram decoding device decryption limitation password obtains; What whether the current time of comparison clock output circuit output was later than or equaled that timeliness cryptogram decoding device decryption limitation password obtains moves in the time, the current time of comparison clock output circuit output, whether equal the check-out time that timeliness cryptogram decoding device decryption limitation password obtains early than the person; If the sign of cipher door lock is identical with the cipher door lock sign that timeliness cryptogram decoding device decryption limitation password obtains, and what the current time of clock output circuit output was later than or equaled that timeliness cryptogram decoding device decryption limitation password obtains moves in the time, and the current time of clock output circuit output early than or equal the check-out time that timeliness cryptogram decoding device decryption limitation password obtains, then send unlocking signal to the controlled switch parts; If the sign of cipher door lock is different from the cipher door lock sign that timeliness cryptogram decoding device decryption limitation password obtains, or the current time of clock output circuit output is early than moving in the time that timeliness cryptogram decoding device decryption limitation password obtains, or the current time of clock output circuit output be later than the check-out time that timeliness cryptogram decoding device decryption limitation password obtains, then send block signal to the controlled switch parts;
Described controlled switch parts are used for unblanking locking after receiving the block signal that comparer sends after receiving the unlocking signal that described comparer sends.
4. control system is moved in network remote according to claim 1 guest room, it is characterized in that,
Described cipher door lock also comprises the communication unit that is connected with described comparer;
Wherein, communication unit is used for, and sends to described central server and successfully moves in instruction.
5. control system is moved in network remote according to claim 4 guest room, it is characterized in that,
Described communication unit also is used for, and can send to subscriber terminal equipment by communication and successfully move in prompting message.
6. control system is moved in network remote according to claim 1 guest room, it is characterized in that,
Described cipher door lock also can comprise the alarm device that is connected with described comparer;
Wherein, described alarm device is used for, and is different from the cipher door lock sign that the decryption limitation password obtains if comparer compares the sign of cipher door lock, then sends the room number fault alarm.
7. control system is moved in network remote according to claim 6 guest room, it is characterized in that,
Described alarm device also is used for, if the sign that comparer compares cipher door lock is identical with the cipher door lock sign that the decryption limitation password obtains, and the current time early than moving in the time that the decryption limitation password obtains, then send and move in too early alarm.
According to claim 6 or 7 described network remote guest rooms move in control system, it is characterized in that,
Described alarm device also is used for, if the sign that comparer compares cipher door lock is identical with the cipher door lock sign that the decryption limitation password obtains, and the current time be later than the check-out time that the decryption limitation password obtains, then send and moved in late alarm.
9. control system is moved in network remote according to claim 1 guest room, it is characterized in that described cipher door lock also can comprise the inductor that is connected with described controlled switch parts.
CN 201220358194 2012-07-23 2012-07-23 Network remote guest room check-in control system Expired - Fee Related CN202815965U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201220358194 CN202815965U (en) 2012-07-23 2012-07-23 Network remote guest room check-in control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201220358194 CN202815965U (en) 2012-07-23 2012-07-23 Network remote guest room check-in control system

Publications (1)

Publication Number Publication Date
CN202815965U true CN202815965U (en) 2013-03-20

Family

ID=47874811

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201220358194 Expired - Fee Related CN202815965U (en) 2012-07-23 2012-07-23 Network remote guest room check-in control system

Country Status (1)

Country Link
CN (1) CN202815965U (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107004316A (en) * 2014-12-02 2017-08-01 开利公司 Using automatically move voucher authorize service switching metering-in control system
CN110462691A (en) * 2017-01-21 2019-11-15 云丁网络技术(北京)有限公司 Method for unlocking, mobile terminal, intelligent door lock and the Cloud Server of intelligent door lock
CN112102533A (en) * 2020-09-16 2020-12-18 深圳市迈航信息技术有限公司 Computer room access control system and method based on biological feature recognition
US11928904B2 (en) 2019-08-02 2024-03-12 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107004316A (en) * 2014-12-02 2017-08-01 开利公司 Using automatically move voucher authorize service switching metering-in control system
CN110462691A (en) * 2017-01-21 2019-11-15 云丁网络技术(北京)有限公司 Method for unlocking, mobile terminal, intelligent door lock and the Cloud Server of intelligent door lock
US11335144B2 (en) 2017-01-21 2022-05-17 Yunding Network Technology (Beijing) Co., Ltd. Method for unlocking intelligent lock, mobile terminal, intelligent lock and server
US11928904B2 (en) 2019-08-02 2024-03-12 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock
CN112102533A (en) * 2020-09-16 2020-12-18 深圳市迈航信息技术有限公司 Computer room access control system and method based on biological feature recognition

Similar Documents

Publication Publication Date Title
CN102779323A (en) Network remotely-control door lock integrated system
CN103729818B (en) Hotel self-service check-in and check-out system and method
CN104376621B (en) The realization method and system that hotel checks out
CN202523131U (en) Intelligent visitor management system based on Android operating platform
CN104182798A (en) Self-service room reservation method and system based on mobile device
CN104134253A (en) Entrance guard system and entrance guard opening method
CN103903319A (en) Electronic lock system based on internet dynamic authorization
CN103778702A (en) Access control method, NFC (near field communication) terminal, access control device and access control system
CN102663846A (en) Intelligent visitor management system based on android operating platform and control method thereof
WO2010148832A1 (en) Entrance guard control and information display system, method and terminal
CN202815965U (en) Network remote guest room check-in control system
KR20160050841A (en) System, apparatus and method for managing entrance and exit
CN106157394A (en) Community's networked door access control system and community based on this system access method
KR20130133532A (en) Unmanned-accommodating system using digital door lock
CN101770659A (en) Remote messaging and security system
CN102385740A (en) Multifunctional self-service system for hotels
CN104735168A (en) Unlocking method of network-based password generation and decryption
KR20160140363A (en) Method for providing door-lock control service based on internet of things and server for providing service
KR20210033154A (en) Accommodation Management System on Real Time
CN108171829A (en) A kind of intelligent hotel moves in system
Govindraj et al. Smart door using biometric NFC band and OTP based methods
CN107678382A (en) Unattended apartment complexes, implementation method and readable storage medium storing program for executing
KR101340148B1 (en) Digital Door Lock
CN207440868U (en) A kind of access control system of identity-based card
CN202810395U (en) Password door lock

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130320

Termination date: 20160723