Data Sheet for Product

4/8
Building Technologies Hotel room management software CM2N6343en
15 Dec 2008
The hotel room management software prepares the data from the database or other
subsystems suitable for display and presents it to the user in the room and alarm lists.
The alarm list shows all the current alarm and status messages from the hotel as a
whole. The Hotel Solution™ system supports a variety of alarms. These alarms
originate either from the room controllers or from the alarm-handling software.
Guest in room
Guest has pressed a button on the operator unit (e.g. SOS alarm/Call for assistance)
Activation of the window contact
The DGU (Data Gathering Unit) driver has set a room controller offline because it is
not responding
Check-in of a guest.
All active alarms are displayed and remain in list until they are no longer active. Specific
alarms can be selected easily by use of the filter.
Alarms can be acknowledged by service staff. The user identification of the person
acknowledging the alarm is stored in the system.
User profiles can be set up to define which alarms and messages can or cannot be
displayed and acknowledged by a given user group.
A key task performed by the reception staff is the checking in and out of guests. For the
purposes of guest check-in and check-out, the HSW3.1 hotel room management
software is connected to the front office system. This is where the guest and room
occupancy data is managed.
If there is a problem with the connection to the front office system, or if there is no such
system, the hotel room management software can also be used to check guests in and
out.
After check-in, an individual guest key can be encoded for the guest, e.g. in the form of
a magnetic card. The guest code is assigned to the guest's key, thereby providing
access for that guest. The key coding with a card encoder and the associated access
management and monitoring are handled by the HSW3.1 hotel room management
software.
The following types of cards can be used as guest keys:
Magnetic cards
Transponder cards
Chip cards
Once the guest key has been encoded, it is recognized by the system and the relevant
data is transmitted to the room controller. The key is then enabled for access to public
areas and the guest's room.
At check-out, the guest key that was encoded in the check-in process is invalidated.
The hotel service staff can be assigned to service groups. Different properties and, in
particular, access rights, can be assigned to the various service groups. The hotel room
Overview with the
room and alarm list
A
larms and states
Examples of room
controller alarm and
status messages:
Examples of software
alarms:
User-specific room and
alarm list
From check-in to
check-out
Guest keys
Hotel service groups and
service keys