WO2020062952A1 - 客房入住方法、装置、服务器及存储介质 - Google Patents

客房入住方法、装置、服务器及存储介质 Download PDF

Info

Publication number
WO2020062952A1
WO2020062952A1 PCT/CN2019/091690 CN2019091690W WO2020062952A1 WO 2020062952 A1 WO2020062952 A1 WO 2020062952A1 CN 2019091690 W CN2019091690 W CN 2019091690W WO 2020062952 A1 WO2020062952 A1 WO 2020062952A1
Authority
WO
WIPO (PCT)
Prior art keywords
room
tenant
checked
identity
successful
Prior art date
Application number
PCT/CN2019/091690
Other languages
English (en)
French (fr)
Inventor
关岩
Original Assignee
深圳春沐源控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳春沐源控股有限公司 filed Critical 深圳春沐源控股有限公司
Publication of WO2020062952A1 publication Critical patent/WO2020062952A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/12Hotels or restaurants
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like

Definitions

  • the present invention relates to the field of information technology, and in particular, to a method, a device, a server, and a storage medium for checking in a guest room.
  • the tenant can only book the room type they need in advance. When they actually check in, they need to check in at the tenant's site. Usually, they first check their identity at the front desk. The tenant allocates the rooms that are currently free for the tenant to move in. It can be seen that with this check-in method, the tenant cannot know in advance which room they are staying in, and the tenant is more cumbersome when checking in, which brings great inconvenience to the tenant's itinerary.
  • a guest room check-in method includes:
  • the method further includes:
  • Monitor the room status of the room to be checked in store the room status of the room to be checked into the guest room information corresponding to the tenant, and dynamically update the room status in the room information according to a preset time period.
  • determining that the identity verification of the tenant is successful includes:
  • an identity verification request carrying an identity image sent by the user terminal; identifying identity information of the identity image; determining the identity of the tenant when the identity information is consistent with the identity information when the tenant was scheduled Successful verification; or
  • the method further includes:
  • the guest is re-allocated from the free high-level room type.
  • a room check-in device includes:
  • a first determining unit configured to determine a room to be checked in that matches the room reservation demand after receiving the room reservation demand of the tenant
  • a second determining unit configured to determine that the identity verification of the tenant is successful
  • a sending unit configured to send the unlocking identification code of the room to be checked in to the user terminal of the tenant
  • a triggering unit configured to trigger the unlocking identification code to take effect when the room to be checked in is idle;
  • a receiving unit configured to receive an unlocking identification code in a valid state sent by the user terminal
  • a verification unit configured to verify the unlocking identification code
  • the control unit is configured to control the door of the guest room to be unlocked if the verification is successful.
  • the guest room check-in device further includes:
  • a storage unit configured to store the room number of the to-be-checked-in room to the tenant after the determining unit determines the to-be-checked-in room that matches the room-booking requirement after receiving the guest's room-booking demand Corresponding guest room information;
  • a monitoring unit configured to monitor a room status of the room to be checked in
  • the storage unit is further configured to store a room state of the guest room to be checked into guest room information corresponding to the tenant.
  • the determining, by the second determining unit, that the identity verification of the tenant is successful includes:
  • an identity verification request carrying an identity image sent by the user terminal; identifying identity information of the identity image; determining the identity of the tenant when the identity information is consistent with the identity information when the tenant was scheduled Successful verification; or
  • the guest room check-in device further includes:
  • a first allocating unit configured to reallocate a room for the tenant from a vacant room of the current room type if the room to be checked in cannot be checked in within the predetermined time of the tenant;
  • a second allocation unit is configured to reallocate rooms for the tenant from an idle high-level room type if the room to be checked in cannot be checked in within the predetermined time of the tenant and there is currently no free room type of the same type .
  • a server includes a memory and a processor, where the memory is configured to store at least one instruction, and the processor is configured to execute the at least one instruction to implement the guest room check-in method.
  • a computer-readable storage medium stores at least one instruction, and the at least one instruction implements the guest room check-in method when the at least one instruction is executed by a processor.
  • a room to be checked in that matches the room reservation request can be determined first; further, when the tenant needs to stay, the rent can be determined
  • the guest ’s identity verification is successful; sending the unlocking identification code of the room to be checked in to the user terminal of the tenant; triggering the unlocking identification code to take effect when the room to be checked in is idle; further, it can receive An unlocking identification code in a valid state sent by the user terminal; verifying the unlocking identification code; and if the verification is successful, controlling the door of the room to be checked in to unlock.
  • the server can immediately determine the room to be checked in for the tenant, and the tenant can know the room number of the room to be checked in.
  • the server After determining that the tenant's identity verification is successful, the unlocking identification code of the room to be checked in can be sent. Once the room to be checked in is idle, the unlocking identification code becomes effective immediately, and the tenant can send a valid unlocking identification code to the server. After the verification is successful, the server can control the door of the guest room to be unlocked.
  • the entire check-in operation is relatively convenient, and the tenant does not need to take a long time to complete the formalities, which can improve the check-in efficiency.
  • FIG. 1 is a flowchart of a preferred embodiment of a guest room check-in method disclosed in the present invention.
  • FIG. 2 is a flowchart of another preferred embodiment of a method for staying in a guest room disclosed in the present invention.
  • FIG. 3 is a functional module diagram of a preferred embodiment of a room occupancy device disclosed in the present invention.
  • FIG. 4 is a schematic structural diagram of a server according to a preferred embodiment of the method for implementing guest room check-in according to the present invention.
  • the server may refer to a computer system capable of providing services to other devices in the network. If a personal computer can provide file transfer protocol (File Transfer Protocol, FTP for short) services, it can also be called a server. In a narrow sense, a server refers to certain high-performance computers that can provide services externally through the network. Compared with ordinary personal computers, servers have higher requirements for stability, security, and performance. , Chipset, memory, disk system, network and other hardware are different from ordinary personal computers.
  • FTP File Transfer Protocol
  • the user terminal may include, but is not limited to, any electronic product that can interact with a user through a keyboard, a mouse, a remote control, a touchpad, or a voice control device, such as a personal computer, a tablet computer, a smart phone, or a personal computer.
  • Digital assistant Personal Digital Assistant, PDA
  • IPTV Internet Protocol Television
  • intelligent wearable devices etc.
  • the front-end device may include, but is not limited to, any electronic product that can interact with the user through a keyboard, mouse, remote control, touchpad, or voice-activated device, such as a personal computer, tablet, smartphone, or personal computer.
  • Digital assistant Personal Digital Assistant, PDA
  • IPTV Internet Protocol Television
  • intelligent wearable devices etc.
  • FIG. 1 is a flowchart of a preferred embodiment of a method for checking in a guest room according to the present invention. Among them, according to different requirements, the order of the steps in the flowchart can be changed, and some steps can be omitted.
  • the server After receiving the guest's room reservation requirement, the server determines a room to be checked in that matches the room reservation requirement.
  • the tenant when a tenant needs to book a hotel room, the tenant can use the user terminal to make a reservation on the hotel website remotely.
  • the tenant can select a suitable room type according to his needs, such as a double bed room , Standard room, presidential room, etc.
  • the tenant can register and enter relevant information, such as the occupant information, arrival time, and contact information.
  • the server may arbitrarily select one of the vacant rooms of the same room type to allocate to the tenant, and return to the user terminal a successful reservation information of the room and the room to be checked in, including the room number of the room to be checked in.
  • the server can query the system for a queen room (such as room 105, room 202, and room 308) that was not allocated on October 1st. , And choose any one of them (such as 202 rooms) to allocate to tenants.
  • a queen room such as room 105, room 202, and room 308
  • the server can query the system for a queen room (such as room 105, room 202, and room 308) that was not allocated on October 1st. , And choose any one of them (such as 202 rooms) to allocate to tenants.
  • the server determines that the identity verification of the tenant is successful.
  • the tenant can go to the hotel at a predetermined arrival time. Prior to check-in, the identity of the tenant is usually checked.
  • determining that the identity verification of the tenant is successful includes:
  • an identity verification request carrying an identity image sent by the user terminal; identifying identity information of the identity image; determining the identity of the tenant when the identity information is consistent with the identity information when the tenant was scheduled Successful verification; or
  • the tenant may manually perform identity verification at the front desk after arriving at the hotel. After the verification is successful, the front desk device may send identity verification information to the server, and the server may determine that the tenant ’s identity verification is successful.
  • the tenant can perform identity verification on the hotel's self-service device. Specifically, the tenant can put the identity card of the person to be checked in and put it on the self-service device for verification.
  • self-service devices are terminals that are convenient for tenants to operate on their own.
  • the tenant may use the user terminal to send an authentication request carrying an identity image to the server.
  • the server can identify the identity image, extract identity information from it, and identify the identity information with the identity information.
  • identity information of the tenants at the time of booking is consistent, it is determined that the identity verification of the tenants is successful.
  • the server may also send an identity verification request to the user terminal spontaneously; after receiving the identity verification request, the user terminal uses the user terminal to take a selfie and sends an identity image to the server. After the server receives the identity image, it can identify the identity An identity image, from which identity information is extracted, and when the identity information is consistent with the identity information when the tenant is scheduled, it is determined that the identity verification of the tenant is successful.
  • the server may initiate an identity verification request to the user terminal in the order of the room booking time.
  • the server may first initiate A's identity verification, first initiate B's identity verification, and finally initiate C's identity verification.
  • the server sends the unlocking identification code of the room to be checked in to the user terminal of the tenant.
  • the unlocking identification code is mainly used to unlock the door of the guest room to be checked in.
  • the unlocking identification code may include, but is not limited to, a two-dimensional code, a number, a letter, a number plus a letter, and a barcode.
  • the unlocking identification code has two states, invalid or effective. These two states depend on the status of the room to be checked in. If the room to be checked in is idle, the unlocking code is effective. If the room to be checked in is occupied, the unlocking code is recognized. The code is invalid.
  • the unlocking identification code is a dynamic identification code. After opening the door of the room to be checked in each time, the server can update the unlocking identification code and send the updated unlocking identification code to the user terminal of the tenant. It should be noted that after the tenant opens the door for the first time to check in, the updated unlocking identification code is always in effect.
  • the renter generally arrives at the hotel in advance.
  • the check-in time is not yet reached, there may be three cases of the room to be checked in. The first is that the room to be checked in is idle, and the second, The room to be checked in is occupied at this time, but when the check-in time arrives, the user who currently resides will go through check-out procedures.
  • the third type is that the room to be checked in is occupied at this time, but the user is in the process of renewing the stay. Conflicts with tenant check-in time.
  • the server in order to prevent a tenant from entering a guest room without permission, can control the time when the identification code takes effect.
  • the server can trigger the unlocking identification code to take effect only when the room to be checked in is idle; otherwise, the unlocking identification code is always in an invalid state.
  • the server receives an unlocking identification code in a valid state sent by the user terminal.
  • the tenant can reach the door of the room to be checked in and send the unlocking identification code in a valid state to the server.
  • the server may verify the unlocking identification code in the valid state. If the verification is successful, the server may control the door of the room to be unlocked. Failure, the door of the room to be checked in has been closed.
  • the method further includes:
  • the guest is re-allocated from the free high-level room type.
  • the server can reallocate rooms for the tenant from the current free room of the same room type.
  • the second if There is currently no idle room type of the same type, and the server may re-allocate guest rooms for the tenant from the idle high-level room type.
  • the high-level room type is higher than the level of the guest room to be booked by the tenant. Generally, the higher the level of the room, the better the living conditions of the room, and the higher the tenant experience.
  • the levels of guest rooms can be divided into ordinary rooms, medium rooms and superior rooms.
  • a room to be checked in that matches the room reservation demand may be determined first; further, when the tenant needs to stay, the room may be determined.
  • the identity verification of the tenant is successful; the unlocking identification code of the room to be checked in is sent to the user terminal of the tenant; when the room to be checked in is idle, the unlocking identification code is triggered to take effect; further, it may be Receiving an unlocking identification code in a valid state sent by the user terminal; verifying the unlocking identification code; and if the verification is successful, controlling the door of the guest room to be unlocked.
  • the server can immediately determine the room to be checked in for the tenant, and the tenant can know the room number of the room to be checked in.
  • the server After determining that the tenant's identity verification is successful, the unlocking identification code of the room to be checked in can be sent. Once the room to be checked in is idle, the unlocking identification code becomes effective immediately, and the tenant can send a valid unlocking identification code to the server. After the verification is successful, the server can control the door of the guest room to be unlocked.
  • the entire check-in operation is relatively convenient, and the tenant does not need to take a long time to complete the formalities, which can improve the check-in efficiency.
  • FIG. 2 is a flowchart of another preferred embodiment of a method for checking in a guest room disclosed in the present invention. Among them, according to different requirements, the order of the steps in the flowchart can be changed, and some steps can be omitted.
  • the server After receiving the guest's room reservation request, the server determines a room to be checked in that matches the room reservation request.
  • the tenant when a tenant needs to book a hotel room, the tenant can use the user terminal to make a reservation on the hotel website remotely.
  • the tenant can select a suitable room type according to his needs, such as a double bed room , Standard room, presidential room, etc.
  • the tenant can register and enter relevant information, such as the occupant information, arrival time, and contact information.
  • the server may arbitrarily select one of the vacant rooms of the same room type to allocate to the tenant, and return to the user terminal a successful reservation information of the room and the room to be checked in, including the room number of the room to be checked in.
  • the server can query the system for a queen room (such as room 105, room 202, and room 308) that was not allocated on October 1st. , And choose any one of them (such as 202 rooms) to allocate to tenants.
  • a queen room such as room 105, room 202, and room 308
  • the server can query the system for a queen room (such as room 105, room 202, and room 308) that was not allocated on October 1st. , And choose any one of them (such as 202 rooms) to allocate to tenants.
  • the server stores the room number of the guest room to be checked into the guest room information corresponding to the tenant.
  • the server may store the room number of the room to be checked in the room information corresponding to the tenant.
  • the room information may include, but is not limited to, the room number of the room, the living facilities of the room, the location of the room, and the state of the room.
  • the tenant can use the user terminal to enter the hotel's guest room webpage, and can inquire about the relevant guest room information of the booked room in the personal center in real time, which is helpful for the tenant to better arrange his own itinerary.
  • the server monitors the room status of the room to be checked in, stores the room status of the room to be checked in to the guest room information corresponding to the tenant, and performs room status in the room information according to a preset time period. Dynamic update.
  • the room status of the room to be checked in may be idle or occupied, and the server may monitor the room status of the room to be checked in and store the room status of the room to be rented to the tenant.
  • the status of the rooms in the guest room information is dynamically updated according to a preset time period. In this way, the tenant can check the guest room status of the guest room in real-time before checking in. On the day of the time period, if the guest room to be checked in is idle, the tenant can choose to check in early or check in later according to their own schedule.
  • the server determines that the identity verification of the tenant is successful.
  • the tenant can go to the hotel at a predetermined arrival time. Prior to check-in, the identity of the tenant is usually checked.
  • determining that the identity verification of the tenant is successful includes:
  • an identity verification request carrying an identity image sent by the user terminal; identifying identity information of the identity image; determining the identity of the tenant when the identity information is consistent with the identity information when the tenant was scheduled Successful verification; or
  • the tenant may manually perform identity verification at the front desk after arriving at the hotel. After the verification is successful, the front desk device may send identity verification information to the server, and the server may determine that the tenant ’s identity verification is successful.
  • the tenant can perform identity verification on the hotel's self-service device. Specifically, the tenant can put the identity card of the person to be checked in and put it on the self-service device for verification.
  • self-service devices are terminals that are convenient for tenants to operate on their own.
  • the tenant may use the user terminal to send an authentication request carrying an identity image to the server.
  • the server can identify the identity image, extract identity information from it, and identify the identity information with the identity information.
  • identity information of the tenants at the time of booking is consistent, it is determined that the identity verification of the tenants is successful.
  • the server may also send an identity verification request to the user terminal spontaneously; after receiving the identity verification request, the user terminal uses the user terminal to take a selfie and sends an identity image to the server. After the server receives the identity image, it can identify the identity An identity image, from which identity information is extracted, and when the identity information is consistent with the identity information when the tenant is scheduled, it is determined that the identity verification of the tenant is successful.
  • the server may initiate an identity verification request to the user terminal in the order of the room booking time.
  • the server may first initiate A's identity verification, first initiate B's identity verification, and finally initiate C's identity verification.
  • the server sends the unlocking identification code of the room to be checked in to the user terminal of the tenant.
  • the unlocking identification code is mainly used to unlock the door of the guest room to be checked in.
  • the unlocking identification code may include, but is not limited to, a two-dimensional code, a number, a letter, a number plus a letter, and a barcode.
  • the unlocking identification code has two states, invalid or effective. These two states depend on the status of the room to be checked in. If the room to be checked in is idle, the unlocking code is effective. The code is invalid.
  • the unlocking identification code is a dynamic identification code. After opening the door of the room to be checked in each time, the server can update the unlocking identification code and send the updated unlocking identification code to the user terminal of the tenant. It should be noted that after the tenant opens the door for the first time to check in, the updated unlocking identification code is always in effect.
  • the renter generally arrives at the hotel in advance.
  • the check-in time is not yet reached, there may be three cases of the room to be checked in. The first is that the room to be checked in is idle, and the second, The room to be checked in is occupied at this time, but when the check-in time arrives, the user who currently resides will go through check-out. Conflicts with tenant check-in time.
  • the server in order to prevent a tenant from entering a guest room without permission, can control the time when the identification code takes effect.
  • the server can trigger the unlocking identification code to take effect only when the room to be checked in is idle; otherwise, the unlocking identification code is always in an invalid state.
  • the server receives an unlocking identification code in a valid state sent by the user terminal.
  • the tenant can reach the door of the room to be checked in and send the unlocking identification code in a valid state to the server.
  • the server may verify the unlocking identification code in the valid state. If the verification is successful, the server may control the door of the room to be unlocked. Failure, the door of the room to be checked in has been closed.
  • the server stores the room number of the guest room to be checked in and the room status of the guest room to be checked into the guest room information corresponding to the tenant, which is beneficial for the tenant to use his own user terminal.
  • the terminal enter the hotel system interface to query the relevant information of the rooms to be checked in, which can better arrange its own itinerary, thereby saving the tenant's time and improving the user experience.
  • FIG. 3 is a functional module diagram of a preferred embodiment of a guest room occupancy device disclosed in the present invention.
  • the guest room occupancy device described in FIG. 3 is configured to perform some or all steps in the guest room occupancy method described in FIG. 1 or FIG. 2.
  • the unit referred to in the present invention refers to a series of computer program segments capable of being executed by a processor and capable of performing fixed functions, which are stored in a memory. In this embodiment, functions of each unit will be described in detail in subsequent embodiments.
  • the guest room check-in device depicted in FIG. 3 includes:
  • a first determining unit 101 configured to determine a room to be checked in that matches the room reservation demand after receiving the room reservation demand of the tenant;
  • a second determining unit 102 configured to determine that the identity verification of the tenant is successful
  • a sending unit 103 configured to send the unlocking identification code of the room to be checked in to the user terminal of the tenant;
  • a triggering unit 104 configured to trigger the unlocking identification code to take effect when the room to be checked in is idle;
  • a receiving unit 105 configured to receive an unlocking identification code in a valid state sent by the user terminal
  • a verification unit 106 configured to verify the unlocking identification code
  • the control unit 107 is configured to control the door of the guest room to be unlocked if the verification is successful.
  • the room check-in device described in FIG. 3 further includes:
  • a storage unit configured to store the room number of the to-be-checked-in room to the tenant after the determining unit determines the to-be-checked-in room that matches the room-booking requirement after receiving the guest's room-booking demand Corresponding guest room information;
  • a monitoring unit configured to monitor a room status of the room to be checked in
  • the storage unit is further configured to store a room state of the guest room to be checked into guest room information corresponding to the tenant;
  • the updating unit is configured to dynamically update the room status in the guest room information according to a preset time period.
  • the second determining unit 102 determining that the identity verification of the tenant is successful includes:
  • an identity verification request carrying an identity image sent by the user terminal; identifying identity information of the identity image; determining the identity of the tenant when the identity information is consistent with the identity information when the tenant was scheduled Successful verification; or
  • the room check-in device described in FIG. 3 further includes:
  • a first allocating unit configured to reallocate a room for the tenant from a vacant room of the current room type if the room to be checked in cannot be checked in within the predetermined time of the tenant;
  • a second allocation unit is configured to reallocate rooms for the tenant from an idle high-level room type if the room to be checked in cannot be checked in within the predetermined time of the tenant and there is currently no free room type of the same type .
  • the server can immediately determine the room to be checked in for the tenant, and the tenant can know the room number of the room to be checked in.
  • the server determines that the identity verification of the tenant is successful, it can send the unlocking identification code of the room to be checked in.
  • the unlocking identification code takes effect immediately, and the tenant can send a valid unlocking to the server.
  • the identification code after the verification is successful, the server can control the door of the room to be checked in to unlock.
  • the entire check-in operation is relatively convenient and does not require the tenant to take a long time to complete the formalities, thereby improving the check-in efficiency.
  • the above integrated unit implemented in the form of a software functional module may be stored in a computer-readable storage medium.
  • the computer-readable storage medium may store a computer program, and the computer program, when executed by a processor, may implement the steps of the foregoing method embodiments.
  • the computer program includes computer program code, and the computer program code may be in a source code form, an object code form, an executable file, or some intermediate form.
  • the computer-readable storage medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a mobile hard disk, a magnetic disk, an optical disk, a computer memory, a read-only memory (ROM, Read-Only Memory) ), Random Access Memory (RAM, Random Access Memory), electric carrier signals, telecommunication signals, and software distribution media.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • electric carrier signals telecommunication signals
  • software distribution media any entity or device capable of carrying the computer program code
  • a recording medium a U disk, a mobile hard disk, a magnetic disk, an optical disk, a computer memory, a read-only memory (ROM, Read-Only Memory) ), Random Access Memory (RAM, Random Access Memory), electric carrier signals, telecommunication signals, and software distribution media.
  • FIG. 4 is a schematic structural diagram of a server according to a preferred embodiment of a method for implementing guest room check-in according to the present invention.
  • the server 1 includes a memory 12 and a processor 13.
  • Those skilled in the art can understand that the schematic diagram shown in FIG. 4 is only an example of the server 1, and does not constitute a limitation on the server 1, and may include more or fewer components than the illustration, or a combination thereof.
  • Certain components, or different components, for example, the server 1 may further include an input-output device, a network access device, a bus, and the like.
  • the server 1 refers to a computer system capable of providing certain services to other machines in the network, such as user terminals. If a personal computer can provide file transfer protocol (File Transfer Protocol, FTP for short) services, it can also be called a server. In addition, the server 1 may also specifically refer to certain high-performance computers that can provide services externally through the network. Compared with ordinary personal computers, they require higher stability, security, and performance. CPU, chipset, memory, disk system, network and other hardware are different from ordinary personal computers.
  • FTP File Transfer Protocol
  • the memory 12 may optionally include one or more computer-readable storage media for storing a program and various data of a guest room check-in method, and realizing high-speed and automatic completion of program or data access during operation.
  • the memory 12 optionally includes a high-speed random access memory, and also optionally a non-volatile memory, such as one or more disk storage devices, flash memory devices, or other non-volatile solid-state memory devices.
  • the processor 13 is also called a central processing unit (CPU, Central Processing Unit), which is a very large-scale integrated circuit, and is a computing core (Core) and a control core (Control Unit) of the server 1.
  • the processor 13 may execute an operating system of the server 1 and various installed applications, program codes, and the like, such as a guest room check-in device 11.
  • the memory 12 in the server 1 stores multiple instructions to implement a guest room check-in method
  • the processor 13 may execute the multiple instructions to implement:
  • the processor 13 can execute the multiple instructions to achieve:
  • Monitor the room status of the room to be checked in store the room status of the room to be checked into the guest room information corresponding to the tenant, and dynamically update the room status in the room information according to a preset time period.
  • determining that the identity verification of the tenant is successful includes:
  • an identity verification request carrying an identity image sent by the user terminal; identifying identity information of the identity image; determining the identity of the tenant when the identity information is consistent with the identity information when the tenant was scheduled Successful verification; or
  • the processor 13 may execute the multiple instructions to implement:
  • the guest is re-allocated from the free high-level room type.
  • a room to be checked in that matches the room reservation requirement may be determined first; further, when the tenant needs to stay, the room may be determined.
  • the identity verification of the tenant is successful; sending the unlocking identification code of the room to be checked in to the user terminal of the tenant; triggering the unlocking identification code to take effect when the room to be checked in is idle; Receiving an unlocking identification code in a valid state sent by the user terminal; verifying the unlocking identification code; and if the verification is successful, controlling the door of the guest room to be unlocked.
  • the server can immediately determine the room to be checked in for the tenant, and the tenant can know the room number of the room to be checked in.
  • the server After determining that the tenant's identity verification is successful, the unlocking identification code of the room to be checked in can be sent. Once the room to be checked in is idle, the unlocking identification code becomes effective immediately, and the tenant can send a valid unlocking identification code to the server. After the verification is successful, the server can control the door of the guest room to be unlocked.
  • the entire check-in operation is relatively convenient, and the tenant does not need to take a long time to complete the formalities, which can improve the check-in efficiency.
  • the modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical units, may be located in one place, or may be distributed on multiple network units. Some or all of the modules may be selected according to actual needs to achieve the objective of the solution of this embodiment.
  • each functional module in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the integrated unit can be implemented in the form of hardware, or in the form of hardware plus software functional modules.

Landscapes

  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Lock And Its Accessories (AREA)

Abstract

一种客房入住方法,包括:在接收到租客的客房预订需求后,服务器确定与客房预订需求匹配的待入住客房(S11);服务器确定租客的身份核验成功(S12);服务器向租客的用户终端发送待入住客房的开锁识别码(S13);在待入住客房处于空闲状态时,服务器触发开锁识别码生效(S14);服务器接收用户终端发送的处于生效状态的开锁识别码(S15);服务器对开锁识别码进行验证(S16);若验证成功,服务器控制待入住客房的房门进行解锁(S17)。该方法能够在客房预定成功后,为租客确定待入住客房,同时提高租客入住的效率。

Description

客房入住方法、装置、服务器及存储介质
本申请要求于2018年9月30日提交中国专利局,申请号为201811163465.3、发明名称为“客房入住方法、装置、服务器及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及信息技术领域,尤其涉及一种客房入住方法、装置、服务器及存储介质。
背景技术
随着物联网的发展,智能住宿成为了一种新兴的住宿方式。租客可以在网上按照自己的需求,挑选合适的房型,并提前预订酒店房间,而不需要现场去找酒店找房子,这很大程度上节约了租客的找房时间。
当前的这种预订方式,租客仅能提前预订自己需要的房型,真正入住时,还需要租客现场去办理入住手续,通常是先在前台进行身份核验,核验成功后,酒店人员在现场为租客分配当前空闲的客房,租客才能实现入住。可见,这种入住方式,租客无法提前知道自己入住哪个客房,租客办理入住手续时比较繁琐,这给租客的行程带来很大不便。
发明内容
鉴于以上内容,有必要提供一种客房入住方法、装置、服务器及存储介质,能够在客房预定成功后,为租客确定待入住客房,同时,提高租客入住的效率。
一种客房入住方法,所述方法包括:
在接收到租客的客房预订需求后,确定与所述客房预订需求匹配的待入住客房;
确定所述租客的身份核验成功;
向所述租客的用户终端发送所述待入住客房的开锁识别码;
在所述待入住客房处于空闲状态时,触发所述开锁识别码生效;
接收所述用户终端发送的处于生效状态的开锁识别码;
对所述开锁识别码进行验证;
若验证成功,控制所述待入住客房的房门进行解锁。
在一种可能的实现方式中,在接收到租客的客房预订需求后,确定与所述客房预订需求匹配的待入住客房之后,所述方法还包括:
将所述待入住客房的房号存储至所述租客对应的客房信息中;
监控所述待入住客房的房间状态,将所述待入住客房的房间状态存储至所述租客对应的客房信息中,并依据预设时间周期对所述客房信息中的房间状态进行动态更新。
在一种可能的实现方式中,所述确定所述租客的身份核验成功包括:
当接收到前台设备发送的针对所述租客的身份验证信息时,确定所述租客的身份核验成功;或
当接收到自助设备发送的针对所述租客的身份验证信息时,确定所述租客的身份核验成功;或
接收所述用户终端发送的携带有身份图像的身份验证请求;识别所述身份图像的身份信息;在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功;或
向所述用户终端发送身份核验请求;接收所述用户终端针对所述身份核验请求发送的身份图像;识别所述身份图像的身份信息;在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功。
在一种可能的实现方式中,所述确定所述租客的身份核验成功后,所述方法还包括:
若所述待入住客房在所述租客的预定时间内无法入住,则从当前同种房型的空闲房间中为所述租客重新分配客房;或
若所述待入住客房在所述租客的预定时间内无法入住,且当前没有空闲的同种房型,则从空闲的高级别房型中为所述租客重新分配客房。
一种客房入住装置,包括:
第一确定单元,用于在接收到租客的客房预订需求后,确定与所述客房预订需求匹配的待入住客房;
第二确定单元,用于确定所述租客的身份核验成功;
发送单元,用于向所述租客的用户终端发送所述待入住客房的开锁识别码;
触发单元,用于在所述待入住客房处于空闲状态时,触发所述开锁识别码生效;
接收单元,用于接收所述用户终端发送的处于生效状态的开锁识别码;
验证单元,用于对所述开锁识别码进行验证;
控制单元,用于若验证成功,控制所述待入住客房的房门进行解锁。
在一种可能的实现方式中,所述客房入住装置还包括:
存储单元,用于在所述确定单元在接收到租客的客房预订需求后,确定与所述客房预订需求匹配的待入住客房之后,将所述待入住客房的房号存储至所述租客对应的客房信息中;
监控单元,用于监控所述待入住客房的房间状态;
所述存储单元,还用于将所述待入住客房的房间状态存储至所述租客对应的客房信息中。
在一种可能的实现方式中,所述第二确定单元确定所述租客的身份核验成功包括:
当接收到前台设备发送的针对所述租客的身份验证信息时,确定所述租客的身份核验成功;或
当接收到自助设备发送的针对所述租客的身份验证信息时,确定所述租客的身份核验成功;或
接收所述用户终端发送的携带有身份图像的身份验证请求;识别所述身份图像的身份信息;在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功;或
向所述用户终端发送身份核验请求;接收所述用户终端针对所述身份核验请求发送的身份图像;识别所述身份图像的身份信息;在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功。
在一种可能的实现方式中,所述客房入住装置还包括:
第一分配单元,用于若所述待入住客房在所述租客的预定时间内无法入住,则从当前同种房型的空闲房间中为所述租客重新分配客房;或
第二分配单元,用于若所述待入住客房在所述租客的预定时间内无法入住,且当前没有空闲的同种房型,则从空闲的高级别房型中为所述租客重新分配客房。
一种服务器,所述服务器包括存储器以及处理器,所述存储器用于存储至 少一个指令,所述处理器用于执行所述至少一个指令以实现所述的客房入住方法。
一种计算机可读存储介质,所述计算机可读存储介质存储有至少一个指令,所述至少一个指令被处理器执行时实现所述的客房入住方法。
由以上技术方案,本发明中,在接收到租客的客房预订需求后,可以先确定与所述客房预订需求匹配的待入住客房;进一步地,当租客需要入住时,可以确定所述租客的身份核验成功;向所述租客的用户终端发送所述待入住客房的开锁识别码;在所述待入住客房处于空闲状态时,触发所述开锁识别码生效;更进一步地,可以接收所述用户终端发送的处于生效状态的开锁识别码;对所述开锁识别码进行验证;若验证成功,控制所述待入住客房的房门进行解锁。可见,通过本发明的实施例,租客在进行客房预定成功后,服务器可以立即为租客确定待入住客房,租客即可知道自己待入住客房的房号,当租客需要入住时,服务器确定所述租客的身份核验成功之后,就可以发送待入住客房的开锁识别码,一旦所述待入住客房处于空闲状态,开锁识别码立即生效,租客就可以向服务器发送生效的开锁识别码,在验证成功后,服务器就可以控制待入住客房的房门进行解锁,整个入住过程的操作比较便捷,无需租客花较长时间办手续,从而可以提高入住的效率。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图。
图1是本发明公开的一种客房入住方法的较佳实施例的流程图。
图2是本发明公开的另一种客房入住方法的较佳实施例的流程图。
图3是本发明公开的一种客房入住装置的较佳实施例的功能模块图。
图4是本发明实现客房入住方法的较佳实施例的服务器的结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做 出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
为使本发明的上述目的、特征和优点能够更加明显易懂,下面结合附图和具体实施方式对本发明作进一步详细的说明。
其中,服务器可以是指能对网络中其它设备提供服务的计算机***。如果一个个人电脑能够对外提供文件传输协议(File Transfer Protocol,简称FTP)服务,也可以叫服务器。从狭义范围上讲,服务器专指某些高性能计算机,能通过网络,对外提供服务,其相对于普通的个人电脑来说,稳定性、安全性、性能等方面都要求更高,因此在CPU、芯片组、内存、磁盘***、网络等硬件和普通的个人电脑有所不同。
其中,用户终端可以包括但不限于任何一种可与用户通过键盘、鼠标、遥控器、触摸板或声控设备等方式进行人机交互的电子产品,例如,个人计算机、平板电脑、智能手机、个人数字助理(Personal Digital Assistant,PDA)、交互式网络电视(Internet Protocol Television,IPTV)、智能式穿戴式设备等。
其中,前台设备可以包括但不限于任何一种可与用户通过键盘、鼠标、遥控器、触摸板或声控设备等方式进行人机交互的电子产品,例如,个人计算机、平板电脑、智能手机、个人数字助理(Personal Digital Assistant,PDA)、交互式网络电视(Internet Protocol Television,IPTV)、智能式穿戴式设备等。
请参见图1,图1是本发明公开的一种客房入住方法的较佳实施例的流程图。其中,根据不同的需求,该流程图中步骤的顺序可以改变,某些步骤可以省略。
S11、在接收到租客的客房预订需求后,服务器确定与所述客房预订需求匹配的待入住客房。
本发明实施例中,当租客需要预定酒店房间时,租客可以远程使用用户终端在酒店网站上进行预定,在预定的时候,租客可以按照自己的需要挑选合适的房型,比如大床房、标准房、总统房等。选好房型后,租客就可以登记,输入相关信息,比如入住人员信息、到达时间、联系方式等。在租客确定预定后,服务器可以相同房型的空闲房间中任意选择一间来分配给租客,并向用户终端返回客房预定成功信息以及待入住客房,包括待入住客房的房号。
举例来说,比如租客预定的是10月1日的大床房,服务器可以从***中查询10月1日还未分配处于空闲状态的大床房(如105房、202房、308房),并从中任意挑选一间(如202房)来分配给租客。
S12、服务器确定所述租客的身份核验成功。
本发明实施例中,在租客的客房预定成功后,租客就可以在预定的到达时间去酒店入住。在入住之前,通常会对租客的身份进行核验,核验成功后方可入住。
其中,对租客的身份进行核验的方式有多种。
具体的,所述确定所述租客的身份核验成功包括:
当接收到前台设备发送的针对所述租客的身份验证信息时,确定所述租客的身份核验成功;或
当接收到自助设备发送的针对所述租客的身份验证信息时,确定所述租客的身份核验成功;或
接收所述用户终端发送的携带有身份图像的身份验证请求;识别所述身份图像的身份信息;在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功;或
向所述用户终端发送身份核验请求;接收所述用户终端针对所述身份核验请求发送的身份图像;识别所述身份图像的身份信息;在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功。
在该可选的实施方式中,租客可以在到达酒店后,在前台通过人工进行身份核验,核验成功后,前台设备可以向服务器发送身份验证信息,服务器即可确定租客的身份核验成功。
或者,租客可以在酒店的自助设备上进行身份核验,具体的,租客可以拿待入住人员的身份证放入自助设备上进行核验。其中,自助设备为一些便于租客自己操作的终端。
或者,租客可以使用用户终端向服务器发送携带有身份图像的身份验证请求,服务器接收到该身份验证请求之后,就可以识别所述身份图像,从中提取身份信息,并在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功。
或者,服务器还可以自发地向用户终端发送身份核验请求;用户终端接收到该身份核验请求后,使用用户终端进行自拍,并向服务器发送身份图像,服 务器接收到身份图像后,就可以识别所述身份图像,从中提取身份信息,并在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功。可选的,当有多个租客预定了同一天的同种房型,且入住时间也相同的情况下,服务器可以按照客房预定时间的先后顺序向用户终端发起身份核验请求。举例来说,如租客A、B、C先后预定了10月1日的大床房,租客A的客房预定时间早于租客B,租客B的客房预定时间早于租客C,租客A、B、C的入住时间相同,则服务器可以先发起A的身份核验,在先发起B的身份核验,最后发起C的身份核验。
S13、服务器向所述租客的用户终端发送所述待入住客房的开锁识别码。
其中,该开锁识别码主要用于对待入住客房的房门进行解锁。该开锁识别码可以包括但不限于二维码、数字、字母、数字加字母、条形码。
其中,开锁识别码有两种状态,失效或生效,这两种状态取决于待入住客房的状态,如果待入住客房处于空闲状态,则开锁识别码生效,如果待入住客房有人居住,则开锁识别码失效。
其中,开锁识别码为动态识别码。在每次开启待入住客房的房门后,服务器可以更新开锁识别码,并将更新后的开锁识别码发送给租客的用户终端。需要说明的是,在租客第一次打开房门入住后,更新后的开锁识别码一直处于生效状态。
S14、在所述待入住客房处于空闲状态时,服务器触发所述开锁识别码生效。
本发明实施例中,租客一般会提前到达酒店,在登记的入住时间未到达时,所述待入住客房可能有三种情况,第一种,所述待入住客房处于空闲状态,第二种,所述待入住客房此时有人居住,但在入住时间到达时,当前居住的用户会办理退房手续,第三种,所述待入住客房此时有人居住,但该用户正在办理续住手续,与租客的入住时间发生冲突。
本发明实施例中,为了避免租客随意进入还没有权限的客房,服务器可以控制识别码生效的时间。当租客提前到达酒店后,只有所述待入住客房处于空闲状态时,服务器才能触发所述开锁识别码生效,否则,所述开锁识别码一直处于失效状态。
S15、服务器接收所述用户终端发送的处于生效状态的开锁识别码。
本发明实施例中,当开锁识别码生效后,租客即可到达所述待入住客房的房门前,并向服务器发送处于生效状态的开锁识别码。
S16、服务器对所述开锁识别码进行验证。
本发明实施例中,服务器接收到处于生效状态的开锁识别码后,可以对处于生效状态的开锁识别码进行验证,若验证成功,服务器可以控制所述待入住客房的房门进行解锁,若验证失败,所述待入住客房的房门一直处于关闭状态。
S17、若验证成功,服务器控制所述待入住客房的房门进行解锁。
作为一种可选的实施方式,步骤S12服务器确定所述租客的身份核验成功后,所述方法还包括:
若所述待入住客房在所述租客的预定时间内无法入住,则从当前同种房型的空闲房间中为所述租客重新分配客房;或
若所述待入住客房在所述租客的预定时间内无法入住,且当前没有空闲的同种房型,则从空闲的高级别房型中为所述租客重新分配客房。
在该可选的实施方式中,当租客到达酒店时,所述待入住客房此时有人居住,但该用户正在办理续住手续,与租客的入住时间发生冲突,使得所述待入住客房在所述租客的预定时间内无法入住,此时,有2种解决方案,第一种,服务器可以从当前同种房型的空闲房间中为所述租客重新分配客房,第二种,若当前没有空闲的同种房型,服务器可以从空闲的高级别房型中为所述租客重新分配客房。其中,高级别房型为比租客预定的所述待入住客房的级别高,通常,客房的级别越高,客房的居住条件越好,租客体验越高。客房的级别可以分为普通房、中等房以及上等房。
在图1所描述的方法流程中,在接收到租客的客房预订需求后,可以先确定与所述客房预订需求匹配的待入住客房;进一步地,当租客需要入住时,可以确定所述租客的身份核验成功;向所述租客的用户终端发送所述待入住客房的开锁识别码;在所述待入住客房处于空闲状态时,触发所述开锁识别码生效;更进一步地,可以接收所述用户终端发送的处于生效状态的开锁识别码;对所述开锁识别码进行验证;若验证成功,控制所述待入住客房的房门进行解锁。可见,通过本发明的实施例,租客在进行客房预定成功后,服务器可以立即为租客确定待入住客房,租客即可知道自己待入住客房的房号,当租客需要入住时,服务器确定所述租客的身份核验成功之后,就可以发送待入住客房的开锁识别码,一旦所述待入住客房处于空闲状态,开锁识别码立即生效,租客就可以向服务器发送生效的开锁识别码,在验证成功后,服务器就可以控制待入住客房的房门进行解锁,整个入住过程的操作比较便捷,无需租客花较长时间 办手续,从而可以提高入住的效率。
请参见图2,图2是本发明公开的另一种客房入住方法的较佳实施例的流程图。其中,根据不同的需求,该流程图中步骤的顺序可以改变,某些步骤可以省略。
S21、在接收到租客的客房预订需求后,服务器确定与所述客房预订需求匹配的待入住客房。
本发明实施例中,当租客需要预定酒店房间时,租客可以远程使用用户终端在酒店网站上进行预定,在预定的时候,租客可以按照自己的需要挑选合适的房型,比如大床房、标准房、总统房等。选好房型后,租客就可以登记,输入相关信息,比如入住人员信息、到达时间、联系方式等。在租客确定预定后,服务器可以相同房型的空闲房间中任意选择一间来分配给租客,并向用户终端返回客房预定成功信息以及待入住客房,包括待入住客房的房号。
举例来说,比如租客预定的是10月1日的大床房,服务器可以从***中查询10月1日还未分配处于空闲状态的大床房(如105房、202房、308房),并从中任意挑选一间(如202房)来分配给租客。
S22、服务器将所述待入住客房的房号存储至所述租客对应的客房信息中。
本发明实施例中,服务器为所述租客确定待入住客房之后,服务器就可以将所述待入住客房的房号存储至所述租客对应的客房信息中。其中,所述客房信息可以包括但不限于客房的房号、客房的居住设施、客房的位置以及客房状态等。
租客可以使用用户终端,进入酒店的客房网页,即可在个人中心中实时查询自己预定客房的相关客房信息,这有利于租客更好地安排自己的行程。
S23、服务器监控所述待入住客房的房间状态,将所述待入住客房的房间状态存储至所述租客对应的客房信息中,并依据预设时间周期对所述客房信息中的房间状态进行动态更新。
本发明实施例中,待入住客房的房间状态可能是空闲的,也可能是有人居住,服务器可以监控所述待入住客房的房间状态,将所述待入住客房的房间状态存储至所述租客对应的客房信息中,并依据预设时间周期对所述客房信息中的房间状态进行动态更新,这样,租客在未入住客房前,可以实时查询自己待入住客房的客房状态,如果在预计入住时间段的当天,所述待入住客房处于空 闲状态,则租客可以按照自己的行程选择提前入住,或者延后入住。
S24、服务器确定所述租客的身份核验成功。
本发明实施例中,在租客的客房预定成功后,租客就可以在预定的到达时间去酒店入住。在入住之前,通常会对租客的身份进行核验,核验成功后方可入住。
其中,对租客的身份进行核验的方式有多种。
具体的,所述确定所述租客的身份核验成功包括:
当接收到前台设备发送的针对所述租客的身份验证信息时,确定所述租客的身份核验成功;或
当接收到自助设备发送的针对所述租客的身份验证信息时,确定所述租客的身份核验成功;或
接收所述用户终端发送的携带有身份图像的身份验证请求;识别所述身份图像的身份信息;在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功;或
向所述用户终端发送身份核验请求;接收所述用户终端针对所述身份核验请求发送的身份图像;识别所述身份图像的身份信息;在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功。
在该可选的实施方式中,租客可以在到达酒店后,在前台通过人工进行身份核验,核验成功后,前台设备可以向服务器发送身份验证信息,服务器即可确定租客的身份核验成功。
或者,租客可以在酒店的自助设备上进行身份核验,具体的,租客可以拿待入住人员的身份证放入自助设备上进行核验。其中,自助设备为一些便于租客自己操作的终端。
或者,租客可以使用用户终端向服务器发送携带有身份图像的身份验证请求,服务器接收到该身份验证请求之后,就可以识别所述身份图像,从中提取身份信息,并在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功。
或者,服务器还可以自发地向用户终端发送身份核验请求;用户终端接收到该身份核验请求后,使用用户终端进行自拍,并向服务器发送身份图像,服务器接收到身份图像后,就可以识别所述身份图像,从中提取身份信息,并在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验 成功。可选的,当有多个租客预定了同一天的同种房型,且入住时间也相同的情况下,服务器可以按照客房预定时间的先后顺序向用户终端发起身份核验请求。举例来说,如租客A、B、C先后预定了10月1日的大床房,租客A的客房预定时间早于租客B,租客B的客房预定时间早于租客C,租客A、B、C的入住时间相同,则服务器可以先发起A的身份核验,在先发起B的身份核验,最后发起C的身份核验。
S25、服务器向所述租客的用户终端发送所述待入住客房的开锁识别码。
其中,该开锁识别码主要用于对待入住客房的房门进行解锁。该开锁识别码可以包括但不限于二维码、数字、字母、数字加字母、条形码。
其中,开锁识别码有两种状态,失效或生效,这两种状态取决于待入住客房的状态,如果待入住客房处于空闲状态,则开锁识别码生效,如果待入住客房有人居住,则开锁识别码失效。
其中,开锁识别码为动态识别码。在每次开启待入住客房的房门后,服务器可以更新开锁识别码,并将更新后的开锁识别码发送给租客的用户终端。需要说明的是,在租客第一次打开房门入住后,更新后的开锁识别码一直处于生效状态。
S26、在所述待入住客房处于空闲状态时,服务器触发所述开锁识别码生效。
本发明实施例中,租客一般会提前到达酒店,在登记的入住时间未到达时,所述待入住客房可能有三种情况,第一种,所述待入住客房处于空闲状态,第二种,所述待入住客房此时有人居住,但在入住时间到达时,当前居住的用户会办理退房手续,第三种,所述待入住客房此时有人居住,但该用户正在办理续住手续,与租客的入住时间发生冲突。
本发明实施例中,为了避免租客随意进入还没有权限的客房,服务器可以控制识别码生效的时间。当租客提前到达酒店后,只有所述待入住客房处于空闲状态时,服务器才能触发所述开锁识别码生效,否则,所述开锁识别码一直处于失效状态。
S27、服务器接收所述用户终端发送的处于生效状态的开锁识别码。
本发明实施例中,当开锁识别码生效后,租客即可到达所述待入住客房的房门前,并向服务器发送处于生效状态的开锁识别码。
S28、服务器对所述开锁识别码进行验证。
本发明实施例中,服务器接收到处于生效状态的开锁识别码后,可以对处 于生效状态的开锁识别码进行验证,若验证成功,服务器可以控制所述待入住客房的房门进行解锁,若验证失败,所述待入住客房的房门一直处于关闭状态。
S29、若验证成功,服务器控制所述待入住客房的房门进行解锁。
在图2所描述的方法流程中,服务器将待入住客房的房号以及待入住客房的房间状态存储至所述租客对应的客房信息中,这有利于租客使用自己的用户终端,在用户终端中,进入酒店***界面查询待入住客房的相关信息,能够更好地安排自己的行程,从而节省租客的时间,提高用户体验。
请参见图3,图3是本发明公开的一种客房入住装置的较佳实施例的功能模块图。其中,图3描述的客房入住装置用于执行图1或图2所描述的客房入住方法中的部分或全部步骤。本发明所称的单元是指一种能够被处理器所执行并且能够完成固定功能的一系列计算机程序段,其存储在存储器中。在本实施例中,关于各单元的功能将在后续的实施例中详述。
图3描述的客房入住装置包括:
第一确定单元101,用于在接收到租客的客房预订需求后,确定与所述客房预订需求匹配的待入住客房;
第二确定单元102,用于确定所述租客的身份核验成功;
发送单元103,用于向所述租客的用户终端发送所述待入住客房的开锁识别码;
触发单元104,用于在所述待入住客房处于空闲状态时,触发所述开锁识别码生效;
接收单元105,用于接收所述用户终端发送的处于生效状态的开锁识别码;
验证单元106,用于对所述开锁识别码进行验证;
控制单元107,用于若验证成功,控制所述待入住客房的房门进行解锁。
可选的,图3所述的客房入住装置还包括:
存储单元,用于在所述确定单元在接收到租客的客房预订需求后,确定与所述客房预订需求匹配的待入住客房之后,将所述待入住客房的房号存储至所述租客对应的客房信息中;
监控单元,用于监控所述待入住客房的房间状态;
所述存储单元,还用于将所述待入住客房的房间状态存储至所述租客对应的客房信息中;
更新单元,用于依据预设时间周期对所述客房信息中的房间状态进行动态更新。
所述第二确定单元102确定所述租客的身份核验成功包括:
当接收到前台设备发送的针对所述租客的身份验证信息时,确定所述租客的身份核验成功;或
当接收到自助设备发送的针对所述租客的身份验证信息时,确定所述租客的身份核验成功;或
接收所述用户终端发送的携带有身份图像的身份验证请求;识别所述身份图像的身份信息;在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功;或
向所述用户终端发送身份核验请求;接收所述用户终端针对所述身份核验请求发送的身份图像;识别所述身份图像的身份信息;在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功。
可选的,图3所述的客房入住装置还包括:
第一分配单元,用于若所述待入住客房在所述租客的预定时间内无法入住,则从当前同种房型的空闲房间中为所述租客重新分配客房;或
第二分配单元,用于若所述待入住客房在所述租客的预定时间内无法入住,且当前没有空闲的同种房型,则从空闲的高级别房型中为所述租客重新分配客房。
在图3所描述的客房入住装置中,租客在进行客房预定成功后,服务器可以立即为租客确定待入住客房,租客即可知道自己待入住客房的房号,当租客需要入住时,服务器确定所述租客的身份核验成功之后,就可以发送待入住客房的开锁识别码,一旦所述待入住客房处于空闲状态,开锁识别码立即生效,租客就可以向服务器发送生效的开锁识别码,在验证成功后,服务器就可以控制待入住客房的房门进行解锁,整个入住过程的操作比较便捷,无需租客花较长时间办手续,从而可以提高入住的效率。
上述以软件功能模块的形式实现的集成的单元,可以存储在一个计算机可读存储介质中。其中,该计算机可读存储介质可以存储计算机程序,该计算机程序在被处理器执行时,可实现上述各个方法实施例的步骤。其中,所述计算机程序包括计算机程序代码,所述计算机程序代码可以为源代码形式、 对象代码形式、可执行文件或某些中间形式等。所述计算机可读存储介质可以包括:能够携带所述计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、电载波信号、电信信号以及软件分发介质等。需要说明的是,所述计算机可读存储介质包含的内容可以根据司法管辖区内立法和专利实践的要求进行适当的增减,例如在某些司法管辖区,根据立法和专利实践,计算机可读介质不包括电载波信号和电信信号。
如图4所示,图4是本发明实现客房入住方法的较佳实施例的服务器的结构示意图。所述服务器1包括存储器12以及处理器13。本领域技术人员可以理解,所述图4所示的示意图仅仅是所述服务器1的示例,并不构成对所述服务器1的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如所述服务器1还可以包括输入输出设备、网络接入设备、总线等。
所述服务器1是指能对网络中其它机器,如用户终端提供某些服务的计算机***。如果一个个人电脑能够对外提供文件传输协议(File Transfer Protocol,简称FTP)服务,也可以叫服务器。此外,所述服务器1还可以专指某些高性能计算机,能通过网络,对外提供服务,其相对于普通的个人电脑来说,稳定性、安全性、性能等方面都要求更高,因此在CPU、芯片组、内存、磁盘***、网络等硬件和普通的个人电脑有所不同。
所述存储器12可选地包括一个或多个计算机可读存储介质,用于存储一种客房入住方法的程序和各种数据,并在运行过程中实现高速、自动地完成程序或数据的存取。所述存储器12可选地包括高速随机存取存储器,并且还可选地包括非易失性存储器,诸如一个或多个磁盘存储设备、闪存存储器设备、或其它非易失性固态存储器设备。
所述处理器13又称中央处理器(CPU,Central Processing Unit),是一块超大规模的集成电路,是服务器1的运算核心(Core)和控制核心(Control Unit)。所述处理器13可执行所述服务器1的操作***以及安装的各类应用程序、程序代码等,例如客房入住装置11。
结合图1或图2,所述服务器1中的所述存储器12存储多个指令以实现 一种客房入住方法,所述处理器13可执行所述多个指令从而实现:
在接收到租客的客房预订需求后,确定与所述客房预订需求匹配的待入住客房;
确定所述租客的身份核验成功;
向所述租客的用户终端发送所述待入住客房的开锁识别码;
在所述待入住客房处于空闲状态时,触发所述开锁识别码生效;
接收所述用户终端发送的处于生效状态的开锁识别码;
对所述开锁识别码进行验证;
若验证成功,控制所述待入住客房的房门进行解锁。
在一种可选的实施方式中,在接收到租客的客房预订需求后,确定与所述客房预订需求匹配的待入住客房之后,所述处理器13可执行所述多个指令从而实现:
将所述待入住客房的房号存储至所述租客对应的客房信息中;
监控所述待入住客房的房间状态,将所述待入住客房的房间状态存储至所述租客对应的客房信息中,并依据预设时间周期对所述客房信息中的房间状态进行动态更新。
在一种可选的实施方式中,所述确定所述租客的身份核验成功包括:
当接收到前台设备发送的针对所述租客的身份验证信息时,确定所述租客的身份核验成功;或
当接收到自助设备发送的针对所述租客的身份验证信息时,确定所述租客的身份核验成功;或
接收所述用户终端发送的携带有身份图像的身份验证请求;识别所述身份图像的身份信息;在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功;或
向所述用户终端发送身份核验请求;接收所述用户终端针对所述身份核验请求发送的身份图像;识别所述身份图像的身份信息;在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功。
在一种可选的实施方式中,所述确定所述租客的身份核验成功后,所述处理器13可执行所述多个指令从而实现:
若所述待入住客房在所述租客的预定时间内无法入住,则从当前同种房型的空闲房间中为所述租客重新分配客房;或
若所述待入住客房在所述租客的预定时间内无法入住,且当前没有空闲的同种房型,则从空闲的高级别房型中为所述租客重新分配客房。
具体地,所述处理器13对上述指令的具体实现方法可参考图1或图2对应实施例中相关步骤的描述,在此不赘述。
在图4所描述的服务器1中,在接收到租客的客房预订需求后,可以先确定与所述客房预订需求匹配的待入住客房;进一步地,当租客需要入住时,可以确定所述租客的身份核验成功;向所述租客的用户终端发送所述待入住客房的开锁识别码;在所述待入住客房处于空闲状态时,触发所述开锁识别码生效;更进一步地,可以接收所述用户终端发送的处于生效状态的开锁识别码;对所述开锁识别码进行验证;若验证成功,控制所述待入住客房的房门进行解锁。可见,通过本发明的实施例,租客在进行客房预定成功后,服务器可以立即为租客确定待入住客房,租客即可知道自己待入住客房的房号,当租客需要入住时,服务器确定所述租客的身份核验成功之后,就可以发送待入住客房的开锁识别码,一旦所述待入住客房处于空闲状态,开锁识别码立即生效,租客就可以向服务器发送生效的开锁识别码,在验证成功后,服务器就可以控制待入住客房的房门进行解锁,整个入住过程的操作比较便捷,无需租客花较长时间办手续,从而可以提高入住的效率。
在本发明所提供的几个实施例中,应该理解到,所揭露的***,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能模块的形式实现。
对于本领域技术人员而言,显然本发明不限于上述示范性实施例的细节,而且在不背离本发明的精神或基本特征的情况下,能够以其他的具体形式实 现本发明。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本发明的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本发明内。不应将权利要求中的任何附关联图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。***权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第二等词语用来表示名称,而并不表示任何特定的顺序。
最后应说明的是,以上实施例仅用以说明本发明的技术方案而非限制,尽管参照较佳实施例对本发明进行了详细说明,本领域的普通技术人员应当理解,可以对本发明的技术方案进行修改或等同替换,而不脱离本发明技术方案的精神和范围。

Claims (10)

  1. 一种客房入住方法,其特征在于,所述方法包括:
    在接收到租客的客房预订需求后,确定与所述客房预订需求匹配的待入住客房;
    确定所述租客的身份核验成功;
    向所述租客的用户终端发送所述待入住客房的开锁识别码;
    在所述待入住客房处于空闲状态时,触发所述开锁识别码生效;
    接收所述用户终端发送的处于生效状态的开锁识别码;
    对所述开锁识别码进行验证;
    若验证成功,控制所述待入住客房的房门进行解锁。
  2. 根据权利要求1所述的方法,其特征在于,在接收到租客的客房预订需求后,确定与所述客房预订需求匹配的待入住客房之后,所述方法还包括:
    将所述待入住客房的房号存储至所述租客对应的客房信息中;
    监控所述待入住客房的房间状态,将所述待入住客房的房间状态存储至所述租客对应的客房信息中,并依据预设时间周期对所述客房信息中的房间状态进行动态更新。
  3. 根据权利要求1所述的方法,其特征在于,所述确定所述租客的身份核验成功包括:
    当接收到前台设备发送的针对所述租客的身份验证信息时,确定所述租客的身份核验成功;或
    当接收到自助设备发送的针对所述租客的身份验证信息时,确定所述租客的身份核验成功;或
    接收所述用户终端发送的携带有身份图像的身份验证请求;识别所述身份图像的身份信息;在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功;或
    向所述用户终端发送身份核验请求;接收所述用户终端针对所述身份核验请求发送的身份图像;识别所述身份图像的身份信息;在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功。
  4. 根据权利要求1至3任一项所述的方法,其特征在于,所述确定所述租客的身份核验成功后,所述方法还包括:
    若所述待入住客房在所述租客的预定时间内无法入住,从当前同种房型的空闲房间中为所述租客重新分配客房;或
    若所述待入住客房在所述租客的预定时间内无法入住,且当前没有空闲的同种房型,从空闲的高级别房型中为所述租客重新分配客房。
  5. 一种客房入住装置,其特征在于,包括:
    第一确定单元,用于在接收到租客的客房预订需求后,确定与所述客房预订需求匹配的待入住客房;
    第二确定单元,用于确定所述租客的身份核验成功;
    发送单元,用于向所述租客的用户终端发送所述待入住客房的开锁识别码;
    触发单元,用于在所述待入住客房处于空闲状态时,触发所述开锁识别码生效;
    接收单元,用于接收所述用户终端发送的处于生效状态的开锁识别码;
    验证单元,用于对所述开锁识别码进行验证;
    控制单元,用于若验证成功,控制所述待入住客房的房门进行解锁。
  6. 根据权利要求5所述的客房入住装置,其特征在于,所述客房入住装置还包括:
    存储单元,用于在所述确定单元在接收到租客的客房预订需求后,确定与所述客房预订需求匹配的待入住客房之后,将所述待入住客房的房号存储至所述租客对应的客房信息中;
    监控单元,用于监控所述待入住客房的房间状态;
    所述存储单元,还用于将所述待入住客房的房间状态存储至所述租客对应的客房信息中;
    更新单元,用于依据预设时间周期对所述客房信息中的房间状态进行动态更新。
  7. 根据权利要求5所述的客房入住装置,其特征在于,所述第二确定单元确定所述租客的身份核验成功包括:
    当接收到前台设备发送的针对所述租客的身份验证信息时,确定所述租客的身份核验成功;或
    当接收到自助设备发送的针对所述租客的身份验证信息时,确定所述租客的身份核验成功;或
    接收所述用户终端发送的携带有身份图像的身份验证请求;识别所述身份 图像的身份信息;在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功;或
    向所述用户终端发送身份核验请求;接收所述用户终端针对所述身份核验请求发送的身份图像;识别所述身份图像的身份信息;在所述身份信息与所述租客预定时的身份信息一致时,确定所述租客的身份核验成功。
  8. 根据权利要求5至7任一项所述的客房入住装置,其特征在于,所述客房入住装置还包括:
    第一分配单元,用于若所述待入住客房在所述租客的预定时间内无法入住,则从当前同种房型的空闲房间中为所述租客重新分配客房;或
    第二分配单元,用于若所述待入住客房在所述租客的预定时间内无法入住,且当前没有空闲的同种房型,则从空闲的高级别房型中为所述租客重新分配客房。
  9. 一种服务器,其特征在于,所述服务器包括存储器以及处理器,所述存储器用于存储至少一个指令,所述处理器用于执行所述至少一个指令以实现如权利要求1至4中任意一项所述的客房入住方法。
  10. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有至少一个指令,所述至少一个指令被处理器执行时实现如权利要求1至4任意一项所述的客房入住方法。
PCT/CN2019/091690 2018-09-30 2019-06-18 客房入住方法、装置、服务器及存储介质 WO2020062952A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811163465.3A CN109523659B (zh) 2018-09-30 2018-09-30 客房入住方法、装置、服务器及存储介质
CN201811163465.3 2018-09-30

Publications (1)

Publication Number Publication Date
WO2020062952A1 true WO2020062952A1 (zh) 2020-04-02

Family

ID=65771742

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/091690 WO2020062952A1 (zh) 2018-09-30 2019-06-18 客房入住方法、装置、服务器及存储介质

Country Status (2)

Country Link
CN (1) CN109523659B (zh)
WO (1) WO2020062952A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109523659B (zh) * 2018-09-30 2021-05-14 深圳春沐源控股有限公司 客房入住方法、装置、服务器及存储介质
CN111915036A (zh) * 2019-05-10 2020-11-10 阿里巴巴集团控股有限公司 酒店自助入住方法、装置、设备、计算设备及介质
CN110599639B (zh) * 2019-08-13 2021-05-07 深圳市天彦通信股份有限公司 身份验证方法及相关产品
CN110956292A (zh) * 2019-11-20 2020-04-03 深圳春沐源控股有限公司 一种智能住宿方法、服务器及存储介质
CN111916220A (zh) * 2020-07-31 2020-11-10 北京睿家科技有限公司 信息的展现方法及装置、信息采集设备
CN112767073A (zh) * 2021-01-07 2021-05-07 北京码牛科技有限公司 一种入住管理控制方法、装置、移动终端及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001250006A (ja) * 2000-03-03 2001-09-14 Primelink:Kk ホテル宿泊予約システム
US20050154620A1 (en) * 2004-01-08 2005-07-14 Lexyl Travel Technologies, Inc. Online Group Reservation System
CN102262801A (zh) * 2010-05-28 2011-11-30 无锡市美普索特电子科技有限公司 一种酒店自助入驻***
CN105761340A (zh) * 2016-01-29 2016-07-13 北京三快在线科技有限公司 一种门锁的网络控制方法、装置、服务器及pms
CN109523659A (zh) * 2018-09-30 2019-03-26 深圳春沐源控股有限公司 客房入住方法、装置、服务器及存储介质

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002175457A (ja) * 2000-12-06 2002-06-21 Yoshiaki Masuno ホテル予約システム
CN101540034A (zh) * 2008-03-21 2009-09-23 当代天启技术(北京)有限公司 一种客房管理***及客房管理方法
KR20140124557A (ko) * 2013-04-17 2014-10-27 전북대학교산학협력단 방 예약 시스템 및 방법
CN104182798B (zh) * 2014-09-02 2017-08-01 广州商景网络科技有限公司 基于移动设备的自助订房方法及***
CN105376065A (zh) * 2015-12-09 2016-03-02 姜恒 一种入住酒店的身份认证核实方法及***
CN108596352A (zh) * 2018-04-28 2018-09-28 深圳春沐源控股有限公司 房间状态追踪方法及***

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001250006A (ja) * 2000-03-03 2001-09-14 Primelink:Kk ホテル宿泊予約システム
US20050154620A1 (en) * 2004-01-08 2005-07-14 Lexyl Travel Technologies, Inc. Online Group Reservation System
CN102262801A (zh) * 2010-05-28 2011-11-30 无锡市美普索特电子科技有限公司 一种酒店自助入驻***
CN105761340A (zh) * 2016-01-29 2016-07-13 北京三快在线科技有限公司 一种门锁的网络控制方法、装置、服务器及pms
CN109523659A (zh) * 2018-09-30 2019-03-26 深圳春沐源控股有限公司 客房入住方法、装置、服务器及存储介质

Also Published As

Publication number Publication date
CN109523659B (zh) 2021-05-14
CN109523659A (zh) 2019-03-26

Similar Documents

Publication Publication Date Title
WO2020062952A1 (zh) 客房入住方法、装置、服务器及存储介质
WO2017128922A1 (zh) 一种门锁的网络控制方法、装置、服务器及pms
CN110413386A (zh) 多进程处理方法、装置、终端设备及计算机可读存储介质
US10679446B2 (en) Extended instant guest access using near field communication tags
WO2021175018A1 (zh) 酒店制卡方法、酒店制卡***及酒店管理***
CN108829506A (zh) 批量任务处理方法、装置及服务***
US7747750B1 (en) Method for reserving resources in a storage area network with selective capabilities
US10148658B2 (en) Information processing apparatus and method, and program
US11783239B2 (en) Methods and systems for managing simultaneous events
CN109447297A (zh) 预约访问方法、***、计算机设备及存储介质
KR101067326B1 (ko) 이동통신 시스템에서 위치 기반 서비스 제공 방법 및 장치
CN108520562B (zh) 停车自助授权方法、***及订房服务器、存储介质
US20210125293A1 (en) Accomodation management system and accomodation management apparatus
US20190089688A1 (en) Twin factor authentication for controller
CN113949885A (zh) 直播处理方法、装置、电子设备及计算机可读存储介质
TW202103065A (zh) 設施管理系統、臉部辨識裝置、設施管理方法、以及電腦程式
CN115829070A (zh) 图书馆空间的预约管理方法、***及存储介质
US10181229B2 (en) Method and system for implementing a universal key card
US20210067360A1 (en) Apparatus and method for managing online conference
CN110956559A (zh) 订单处理方法、权限验证方法、装置、设备及存储介质
CN113850945B (zh) 一种门禁控制方法和多门禁主机反潜回***
US11102211B2 (en) Computer network for a secured access to online applications
WO2023166563A1 (ja) システム、端末、端末の制御方法及び記憶媒体
US11470080B2 (en) Method for performing a biometric function between a client and a server
US11908570B1 (en) Apparatus, system and method for data diffusion in a medical computer system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19864159

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 12/07/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19864159

Country of ref document: EP

Kind code of ref document: A1