Virtual key distribution method, server and distribution system

A technology of virtual key and distribution method, applied in instruments, time register, single input/output register, etc., can solve the problem of increasing hotel workload, affecting guest check-in experience, virtual key promotion and application inconvenience, etc. problems, to reduce labor and operating costs, facilitate application and promotion, and improve occupancy experience

Pending Publication Date: 2021-04-30
GUANGZHOU CHANGLIAN INFORMATION TECH CO LTD
View PDF12 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in some situations where the number of people entering and leaving the room changes greatly, such as the occupants of the hotel room, in the application environment of the hotel, the occupants of the same room at different times are different. Authorization and deauthorization of the virtual key are performed once upon check-out, which will greatly increase the hotel’s workload and affect the guest’s check-in experience
[0005] The current virtual key technology cannot be well applied in the situation of hotels where the number of people entering and exiting changes greatly. Therefore, most hotels still use traditional electronic room cards, which still need to be carried around and are easy to lose. It needs to be collected and returned through the front desk, which affects the check-in experience and hotel processing efficiency
[0006] To sum up, the virtual key in the prior art cannot be well applied in a situation where the crowds of people in and out of the hotel change greatly, which brings inconvenience to the promotion and application of the virtual key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual key distribution method, server and distribution system
  • Virtual key distribution method, server and distribution system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0039] Such as figure 1 As shown, a method for distributing a virtual key according to the present invention includes the following steps:

[0040] Receive and store the user data of the subscribing user, and record it as valid user data; specifically, subscribing users represent different groups of people according to different application scenarios, and the ways and conditions for completing the booking are also different. Exemplarily, in a hotel application scenario, a reservation user refers to a guest who has reserved a room in the hotel. Generally speaking, the condition for completing a reservation should be that the guest uploads the relevant identity information as required and specifies the room to be booked And paid the corresponding room fee, it is considered that the user has completed the reservation, the user is regarded as the reserva...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a virtual key distribution method, server and system. The method comprises steps of receiving and storing the user data of a reserved user, and recording the user data as effective user data; in response to a virtual key acquisition request of a user, comparing and verifying the user data of the user with effective user data, generating a virtual key corresponding to the user according to the user data of the user if the verification is passed, and sending the virtual key to a terminal of the user; and if the verification is not passed, ending the process. The server is used for realizing the distribution method, and the distribution system comprises the server. According to the method, the user data of the request user can be verified, the virtual key corresponding to the user is automatically sent after the verification is passed, automatic distribution of the virtual key can be realized, and the method is suitable for the situation that the access crowd changes a lot, and is beneficial to the popularization and application of the virtual key.

Description

technical field [0001] The present invention relates to the technical field of virtual keys, more specifically, it relates to a virtual key distribution method, server and distribution system. Background technique [0002] Traditional keys need to be carried with you, easy to lose and inconvenient to carry. With the development of electronic technology, electronic access control cards such as IC cards and NFC cards have appeared, which have replaced traditional keys in some occasions. They are more convenient to use and carry, and safer. Higher, but the electronic access control card is still a physical card, and still needs to be carried around, which is inconvenient. [0003] With the development of Internet technology in recent years, electronic door locks tend to use virtual keys to open, such as electronic access control in apartments, residential areas, and office buildings. The authorized QR code is displayed on the mobile phone, and the QR code is put into the electr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/20G07C9/27
CPCG07C9/20G07C9/27
Inventor 肖维亮
Owner GUANGZHOU CHANGLIAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products