Factors that include smart new towns

Blockchain communication method for AI, drone and unmanned automation

(1) Utilizing artificial intelligence

- The predictability, insight, and time-to-time responsiveness of artificial intelligence can be widely used to increase social value.

- If public data and artificial intelligence are applied, they can be used in many aspects of society, including health care, civic safety, disaster safety, national territory transportation, health care and etc.

- With the combination of quality data and analogical technology, we can move on to an inclusive financial model.

(2)Using drones

- Get information on disaster areas and respond quickly

- Protecting the natural environment and terrestrial and marine ecosystems

- Can be used to prevent the disappearance and crime of the socially disadvantaged, such as children, the disabled, and the elderly with dementia

-Internet services can be supplied to areas with poor telecommunication infrastructure or underdeveloped countries by using drones.

(3) Using blockchain

- Transparent and unmodifiable technical characteristics of blockchain contribute to enhancing fairness and reliability of society

- It is possible to lead the Supply Chain in a way that can co-operate with each other and carry out responsibility/ethically

- If applied to food distribution, healthcare, or agriculture, safe food and medicine supply can be provided.

- Blocking problems such as corruption and embezzlement in the public sector.

Blockchain security measures for personal information protection and safety

(1) Countermeasures in terms of implementation for personal key security

a. Response method using hardware devices (HSM, TPM)

b. Response method using software technology (multi-certification, multi-signature)

(2) Countermeasures in terms of implementation for availability

a. Verification of transactions and security of agreements through participant verification

 b. Response method using software technology (multi-certification. Multi-signature)

(3) Countermeasures in terms of implementation for the protection of personal information

 a. Implementing personal information protection through some centralization

b. Ensuring privacy by encrypting transactions and deleting transaction information

 c. Implementing Personal Information Protection Using Managed Security Policy

(4) Countermeasures in terms of implementation considering interoperability

a. Verification of transactions and security of agreements through participant verification

 b. Response method using SW technology (multi-certification. multi-signature)
Emergency measures for medical care, education and emergency living support

Emergency measures for registering medical, educational and emergency living support

Medical care

Education

Support for emergency living