Current location - Trademark Inquiry Complete Network - Overdue credit card - What software can Guiyang subway use to scan the code?
What software can Guiyang subway use to scan the code?
When you take Guiyang subway, you can use the "Qian Yixing" APP to scan the code and enter the station. This software not only registers the "QR code" ride, but also has the application function of "brush face payment".

Register as an "Yiyouxing" APP user, and bind Guizhou Bank and Guiyang Bank Card to use it. It is worth noting that you can also enjoy the discount by using the QR code and face brushing function of the software.

Everything in Guizhou has advantages.

1, smart and convenient. Citizens can use "QR code payment" and "brush face payment" at all stations of Guiyang Metro 1 Line and 25 stations of Guiyang Bus BRT Line simply by downloading the "Easy Parade" APP, registering and binding the card with their mobile phones, thus avoiding the trouble of queuing to buy tickets.

2. Users can accurately and timely grasp the timetable of subway trains and the first and last buses through the APPlication interface of the "Easy Travel" app, and make travel arrangements in advance without time-consuming and laborious search; Set up toilets, escalators, barrier-free elevators, safety exits, automatic ticket offices and other convenient facilities in subway stations; Browse the exit direction of each station in the whole network and the surrounding bus lines with one click, realize easy transfer, greatly save passengers' travel time, and avoid embarrassing scenes such as "direction misjudgment" in and out of the station.

3, safe and reliable. Face recognition algorithm (ranked by the National Institute of Standards and Technology (NIST) Global Authoritative Face Recognition Competition (FRVT)) has been the first face recognition algorithm in the world for three consecutive years. The terminal, algorithm, system and chip solution are all independent intellectual property rights of China. The full link security protection is realized through terminal live detection protection, information encryption transmission, back-end separated storage encryption and desensitization storage, and the development is guided by the national industry authorities.