{"blocks": [{"key": "183a7406", "text": "Question", "type": "header-two", "depth": 0, "inlineStyleRanges": [], "entityRanges": [], "data": {}}, {"key": "85eb436d", "text": "A hotel that previously used traditional metal keys wants to switch to electronic keycards.", "type": "unstyled", "depth": 0, "inlineStyleRanges": [], "entityRanges": [], "data": {}}, {"key": "a91d900b", "text": "Explain the strategic and customer-driven reasons for replacing metal keys with keycards. Address benefits for guests, hotel staff, and the business.", "type": "unordered-list-item", "depth": 0, "inlineStyleRanges": [], "entityRanges": [], "data": {}}, {"key": "7c5ebefb", "text": "Define the must-have features of the end-to-end solution (e.g., check-in experience, lost-card flow, access controls, auditing, integration with loyalty or mobile apps).", "type": "unordered-list-item", "depth": 0, "inlineStyleRanges": [], "entityRanges": [], "data": {}}, {"key": "4d0fce18", "text": "Describe a high-level system architecture that links keycards, door locks, on-premise or cloud servers, and hotel management software. Include how the card and lock validate each other.", "type": "unordered-list-item", "depth": 0, "inlineStyleRanges": [], "entityRanges": [], "data": {}}, {"key": "ec95ec56", "text": "Propose security measures to reduce both physical and network-based attacks (e.g., brute-force entry, card cloning, packet interception).", "type": "unordered-list-item", "depth": 0, "inlineStyleRanges": [], "entityRanges": [], "data": {}}, {"key": "46bd0057", "text": "\u200b", "type": "unstyled", "depth": 0, "inlineStyleRanges": [], "entityRanges": [], "data": {}}, {"key": "36528e98", "text": "Hints", "type": "header-two", "depth": 0, "inlineStyleRanges": [], "entityRanges": [], "data": {}}, {"key": "bf7898a7", "text": "Think about operational efficiency (e.g., self-service kiosks, faster room turnover).", "type": "unordered-list-item", "depth": 0, "inlineStyleRanges": [], "entityRanges": [], "data": {}}, {"key": "5a42511a", "text": "Consider cryptographic approaches (public/private keys, rolling codes, time-bound credentials).", "type": "unordered-list-item", "depth": 0, "inlineStyleRanges": [], "entityRanges": [], "data": {}}, {"key": "ca6119eb", "text": "Address failure modes: power outage, server downtime, or a card being swiped multiple times.", "type": "unordered-list-item", "depth": 0, "inlineStyleRanges": [], "entityRanges": [], "data": {}}], "entityMap": {}}