Dream Series Hotel Solution: One-stop Solution for Real-name Authentication, Log Compliance and Secure Optical Gateway
AINOPOL – Provider of All-Optical Converged Solutions.
One single device integrates authentication, log auditing, network security and all-optical transmission. It delivers one-stop deployment for newly-built hotels and reuse-and-upgrade renovation for old hotels, satisfying both compliance and cybersecurity requirements.
Traditional solutions require assembling multiple separate devices to handle hotel real-name authentication, 180-day log retention and cyber attack defense, resulting in high costs, difficult operation and maintenance, and frequent errors during official inspections.
The AINOPOL Dream Series Secure Optical Gateway natively integrates four core capabilities: PMS-linked real-name authentication, 180-day local log storage, IPS/AV/WAF triple security engine, and all-optical network transmission.
The requirements for hotel public internet access venues specified in the Provisions on Internet Security Protection Technical Measures (Ministry of Public Security Decree No.82) and the Cybersecurity Law of the People’s Republic of China can be summarized into three key rules:
First, anonymous network access is prohibited. All internet users must complete real identity verification; direct access and fake account access are not allowed.
Second, network logs must be retained for no less than six months. Logs must include core fields such as terminal MAC address, IP address, authenticated account, internet access start and end time, and access records.
Third, logs must be reportable to the network supervision system. Logs are not only kept for internal use, but shall be exportable in the standard format required by the Ministry of Public Security or support real-time data submission.
Implementing authentication without log retention means a hotel has a real-name process in place, yet cannot prove the data is authentic, untampered, and retrievable at any time. During inspections, having an authentication system without available complete logs will still lead to rectification orders.
Therefore, when selecting a system, hotels should not only check whether it supports real-name authentication, but also verify that it fully meets the three compliance red lines above.
However, looking into the weak current equipment rooms of many hotels, a common scene can be seen:
The cabinet is stacked with three or four devices from different brands — a router for SMS authentication, a server for log storage, a firewall, plus several switches. Cables are messy with unclear labels.
Whenever a fault occurs, hotel managers have to contact multiple vendors one by one. Vendor A blames Vendor B for interface issues, while Vendor B claims data was not delivered from Vendor A. Passing the buck delays troubleshooting for a long time.
This patchwork architecture not only increases procurement and O&M costs, but also brings hidden risks:
disconnection between authentication data and logs, missing security policies, compatibility failures between devices, and more.
It is often not until public security inspections that hotels discover incomplete log fields and unlinked authentication records with real identities.
Three fatal flaws of traditional patchwork solutions
The drawbacks of stacking single-function devices keep recurring in practical applications.For example, the authentication gateway records mobile phone numbers, while the log server only stores IP and MAC addresses. Without associated fields between them, it is impossible to prove which internet record corresponds to a specific phone number during official inspections.
In another case, the firewall blocks a network attack, but the authentication gateway remains unaware and still allows the same terminal to keep attempting network access.
The Dream Series integrates four functional modules into one native all-in-one device. After authentication passes, the log module automatically receives complete information including authenticated accounts. When the security engine intercepts threats, the authentication module can immediately blacklist the corresponding terminal. This deep synergy cannot be achieved by traditional patchwork solutions.
Detailed Introduction to the Four-in-One Architecture
Real-Name Authentication: PMS Integration for Identity Consistency
The Dream Series has a built-in Portal authentication platform, supporting real-time docking with mainstream PMS systems, including Beyondh, GreenCloud, Qianlima, Golden Swan and Zhuozhe.
When guests check in at the front desk, their ID card or passport information is automatically synchronized to the optical gateway. When connecting to hotel Wi-Fi in the room, guests only need to enter their room number or mobile phone number; the system automatically matches data with the PMS system and grants network access once verified.
For small hotels without a PMS system, the Dream Series supports scan-based authentication. Guests take photos of their ID card or passport, and the system automatically recognizes and stores document information via OCR, fully meeting real-name compliance requirements.
It offers 18 optional authentication modes such as SMS verification, WeChat authorization, and room number + ID verification, covering mainland ID cards, overseas passports, and Mainland Travel Permits for Hong Kong, Macao and Taiwan residents.
Log Compliance: 180-Day Local Storage & Remote Access
In compliance with the Cybersecurity Law of the People’s Republic of China and MPS Decree No.82 & No.151, network logs must contain core fields: MAC address, IP address, authenticated account, internet access start and end time, and access records, with a retention period of no less than six months.
The Dream Series log module automatically collects all required fields. All data is stored locally on the device hard disk with encrypted storage to prevent tampering.
When storage space is insufficient, the system automatically overwrites logs older than 180 days on a first-in, first-out basis, ensuring continuous recording of new logs.
Hotel administrators can remotely log in to the device via the EAAS cloud platform to view logs anytime, retrieve records by room number or time period, and export audit reports.
Log data always remains stored locally, while management operations can be completed remotely. It satisfies the requirement of localized data retention and facilitates unified remote supervision of all branches by hotel chain headquarters.
Security Protection: Triple Engine Active Defense
The Dream Series integrates three security engines: IPS (Intrusion Prevention System), AV (Antivirus) and WAF (Web Application Firewall), equipped with over 10,000 intrusion detection rules and a 4-million-signature virus database.
It identifies and blocks common cyber threats such as SQL injection, cross-site scripting, ransomware and Trojan downloads. It also supports terminal fingerprint identification, automatically detecting and blocking unauthorized devices including private routers, portable Wi-Fi hotspots and pinhole cameras.
The built-in telephone module is equipped with anti-fraud call mechanisms to prevent malicious abuse of external lines.
All-Optical Network Base: Adaptable for New Builds & Renovations
The Dream Series optical gateway supports both all-optical network and traditional Ethernet modes simultaneously.
Adopting POL (Passive Optical Network) technology, it connects each floor via passive optical splitters to realize fiber-to-room deployment. A single optical fiber carries multiple services including Wi-Fi, TV, telephone and intelligent room control.
Compared with traditional solutions, structured cabling costs are reduced by about 60%, and the number of core equipment in the equipment room is cut by nearly half.
For old hotel renovations, the low-threshold all-optical solution allows guest room converged terminals to reuse existing network cables without rewiring or wall drilling, enabling reconstruction without interrupting daily business.
Centralized O&M for Hotel Chains
Via the EAAS cloud platform, hotel chain headquarters can remotely log in to optical gateways at all branches, checking authentication rates, log integrity and device online status, with no need for on-site IT staff.
When launching new stores, configuration templates can be deployed with one click, completing setup within 2 days. The platform automatically sends alerts upon device anomalies, with original manufacturer providing 24/7 technical support and standardized after-sales service for unified-brand equipment.
The Dream Series is applicable to hotels of all scales from 50 to 500 rooms.New-built hotels can directly deploy the full all-optical hotel architecture for one-step completion.Old hotels can start with replacing the optical gateway and gradually upgrade guest room terminals later.
Both independent hotels and hotel groups can adopt one set of POL solutions to meet three core demands: real-name authentication, log retention and network security.
In one sentence:The Dream Series Secure Optical Gateway frees hotels from multi-brand patchwork deployment. With investment in one single device, hotels gain four core capabilities — authentication, log auditing, security protection and network transmission. Compliance is no longer a burden, but an automated daily operation.
FAQ
Q: Old hotels only have 100Mbps network cables. Will this affect guest internet experience?A: A 100Mbps cable delivers an actual downlink speed above 90Mbps, which is more than enough for 4K video streaming (around 25Mbps), web browsing and social media use.
If high-speed downloads such as large games are required, you can first upgrade key areas like lobbies and conference rooms to optical fiber while keeping guest rooms on existing cables for future unified renovation. Dream Series converged terminals support dual uplink compatibility for both optical fiber and Ethernet, enabling seamless replacement anytime.
Q: How many broadband connections can the Dream Series secure optical gateway aggregate at most?A: It supports up to 256 independent broadband access lines. Traffic can be allocated via policy routing or load balancing algorithms such as source IP hashing, round-robin and least connections.
Small and medium-sized hotels only need 2–4 gigabit home broadband lines to implement link aggregation and failover, cutting annual dedicated line costs by 60%–80%.
Q: How to handle daily operation and maintenance for hotels without dedicated IT staff?A:
The system automatically sends early warning notifications when abnormalities occur.
Log in to the backend once a month to check whether authentication logs are continuously recorded in the latest three days.
Receive alerts for authentication failures and device offline status via WeChat or SMS.
These automated O&M functions are built into mainstream integrated audit gateways, requiring almost no manual intervention in daily use.
Q: How much storage space is required for 6-month log retention?A: A medium-sized hotel generates around 1GB of logs per day, totaling approximately 180GB for 180 days.
Options include: expanding local storage by installing internal hard disks or external storage devices; or adopting annual paid cloud storage without local capacity expansion.
Cloud storage is ideal for unified multi-storey management of hotel chains with controllable annual costs. For local storage deployment, confirm in advance whether the system supports automatic log rotation and overwriting after six months to ensure data security and continuous traceability.
In accordance with the Announcement on Strengthening Cybersecurity Governance of Public Wireless Internet Access Venues issued by Lingcheng Branch of Dezhou Public Security Bureau in April 2026, public Wi-Fi venues must legally implement security technical measures including internet real-name authentication, behavior auditing and log retention for no less than six months. Installed equipment must comply with mandatory national and public security industry technical standards and be filed with the Ministry of Public Security.
Based on Article 21, 24 and 59 of the Cybersecurity Law of the People’s Republic of China, together with MPS Decree No.82 and No.151, public security authorities may issue warnings, impose fines, suspend network access or order business rectification for venues failing to implement real-name authentication and complete log retention.
The F5G All-Optical Digital Hotel White Paper (jointly released in 2025 by the Green All-Optical Network Technical Committee of China Electronic Energy Saving Technology Association and the Hotel Digital Professional Committee of China Hotel Association) shows that all-optical deployment simplifies cabling by 80%, reduces energy consumption by over 40%, and realizes the lean one-person-one-hotel operation and maintenance model.