• Title/Summary/Keyword: 재발급

Search Result 57, Processing Time 0.026 seconds

A Style Study for Reissued Gongsin-Gyoseo in Joseon Dynasty (조선시대 재발급(再發給) 공신교서(功臣敎書) 양식 연구)

  • Sim, Young-hwan;Lee, Jin-hee
    • Korean Journal of Heritage: History & Science
    • /
    • v.47 no.2
    • /
    • pp.4-19
    • /
    • 2014
  • In Joseon dynasty, Gongsin-Gyoseo(Royal Edicts rewarding meritorious vassals) was issued for the reward of the contribution to the specific event of the nation. The family decided as vassals succeeded this Gongsin-Gyoseo as the family treasure to later generations. When one happened to lose this caused by an unavoidable situation such as war in this process, there were a few cases of reissuing of Gongsin-gyoseo by the nation. The confirmative reissued Gongsin-gyoseo among Gongsin-gyoseo that descended down by now are three pieces which is Park dongnyang Hoseong Gongsin-Gyoseo, Gu goeng Jeongsa Gongsin-Gyoseo, and Park jung Jeongsa Gongsin-Gyoseo. This research considered the form and mounting about these three pieces. It was indicated that the reissued Gongsin-Gyoseo was produced following the same form with the original Gongsin-Gyoseo, that is pyeongchul(moving to next lines) and daedu (writing one or two letters ahead compared to the first letter) and so on. But, it was indicated that the change of the position of the vassals in the reissued time was reflected compared to position of the original Gongsin-Gyoseo. In case of Jeonsa Gongsin-Gyoseo, it was indicated that it was 'Wonjongdaewang-whi' since the original Gongsin-Gyoseo was 'Jeongwongun-bu' and the reissued time he became the father of King Injo. Also, it was confirmed that the case of deprivation because of conspiracy such as 'Kim jajeom, Kim ryeon, Sim kiwon, Sim kisung' was produced as the original document and deleted with black ink stick. It was newly confirmed while the original Gongsin-Gyoseo was produced by a designated writer from the nation, the reissuance was written by a writer from the family of the vassals. Since the mounting of Gongsin-Gyoseo could be changed according to the favor and technique of the craftsman participated in the practical production such as Baezeopjang and economical situation of the country supplying the material, the mounting of these three Gongsin-Gyoseo should be different from the original mounting, especially because of the loss of the original by the Manchu war of 1636. The comparison result of Gongsin-Gyoseo produced in the same period with the original issued one in the record of the related Uigwe (a collection of documents from the Joseon Dynasty), the reissued one seems to be larger in the form or ratio of the mounting compared to the first issued one. First of all, the width of Byunah was expanded as twice bigger, center and both side Hoejang also was bigger as over 2cm, and the below Hoejang was expanded as 10cm, and the ratio of the upper Hoejang and the below Hoejang was wider as 1.5 times and the reissuance was 1:1 ratio. The bisect of upper shaft in Park dongnyang Hoseong Gongsin-Gyoseo is assumed as the form of an equilateral triangle, not a half-moon shape of the present, and Gu goeng and Park jung Jeongsa Gongsin-Gyoseo will be the form whose bisection form is same but the size is smaller. Chuksu is confirmed that the size is not changed significantly. Osaekdahoe can be assumed that the width was smaller compared to the first issued one. The 3 pieces of the reissued versions provide the clue of the verification for the form of the mounting of Bosa Gongsin-Gyoseo in the same production period. In the situation that the mounting of the production time was not confirmed among the currently descended Bosa Gongsin-Gyoseo, they can be very important materials.

MN-AAA Key Refreshing Mechanism for MN Authentication at AAA Infrastructure (AAA 서비스 망에서 MN 인증을 위한 MN-AAA 키 재발급 메커니즘)

  • 이해동;최두호;김현곤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.502-504
    • /
    • 2002
  • 현재, IETF AAA 워킹 그룹에서는 기존 AAA 프로토콜인 RADIUS를 보완 및 확장하여 새로운 프로토콜인 Diameter의 표준화를 진행중이다. Diameter는 기존 전화망에서의 PPP 접속 서비스뿐만 아니라 이동 패킷 서비스를 지원하는 Mobile IP 접속 서비스를 지원하도록 설계되고 있다. AAA 서버는 인증(Authentication), 인가(Authorization) 및 과금(Accounting) 서비스를 사용자에게 제공한다. 이때 Diameter 서버는 MN이 제공하는 credential을 검증함으로써, MN에 대한 인증을 수행한다. MN은 credential을 생성하기 위해서, 홈 Diameter 서버와 MN간에 공유하는 MN-AAA 비밀키와 MAC 알고리즘을 사용한다. 상기키는 이동 가입자가 AAA 서비스를 초기에 요청할 때 발급되는 비밀키이며, Diameter 프로토콜은 상기 비밀키의 재발급 메커니즘을 제공하지 않는다. 메커니즘 부재는 키의 누출의 인한 서비스 도용이 발생한 수 있는 취약점이 있다. 본 논문에서는 키의 누출에 대비한 MN-AAA 키의 재생성 및 재분배 메커니즘을 제안한다. 이를 위해서, Mobile IP 프로토콜 및 Diameter 프로토콜을 확장 및 보완한다.

  • PDF

SKELETAL RELAPSE AFTER ORTHOGNATHIC SURGERY OF CLASS III SKELETAL OPEN-BITE (개구교합을 가진 3급 부정교합환자의 악교정수술후 재발에 관한 연구)

  • Song, Jae-Chul;Lee, Sang-Han
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.15 no.3
    • /
    • pp.229-237
    • /
    • 1993
  • This study was intended to evaluate a post-operative relapse tendency in mandibular prognathism patients with open-bite. 18 patients with or without open-bite have undergone sagittal split ramus osteotomy and were investigated radiologically with cephalogram. The results were as following 1. The preoperative anterior facial height, mandibular plane angle and mandibular gonial angle were larger in open-bite patients than in nonopen-bite patients.(p>0.05) 2. There was significant correlation between surgical change of SNA, mandibular plane length and long-term relapse.(p<0.01). 3. There was relatively stable postoperative anterior facial height in open bite patients. 4. There was no significant correlation between the surgical change of mandibular plane angle, amount of mandibular setback and long-term relapse.(p>0.01) 5. This study showed that horizontal relapse was more significant than vertical relapse.

  • PDF

A New Efficient Private Key Reissuing Model for Identity-based Encryption Schemes Including Dynamic Information (동적 ID 정보가 포함된 신원기반 암호시스템에서 효율적인 키 재발급 모델)

  • Kim, Dong-Hyun;Kim, Sang-Jin;Koo, Bon-Seok;Ryu, Kwon-Ho;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.23-36
    • /
    • 2005
  • The main obstacle hindering the wide deployment of identity-based cryptosystem is that the entity responsible for creating the private key has too much power. As a result, private keys are no longer private. One obvious solution to this problem is to apply the threshold technique. However, this increases the authentication computation, and communication cost during the key issuing phase. In this paper, we propose a new effi ient model for issuing multiple private keys in identity-based encryption schemes based on the Weil pairing that also alleviates the key escrow problem. In our system, the private key of a user is divided into two components, KGK (Key Description Key) and KUD(Key Usage Desscriptor), which are issued separately by different parties. The KGK is issued in a threshold manner by KIC (Key Issuing Center), whereas the KW is issued by a single authority called KUM (Key Usage Manager). Changing KW results in a different private key. As a result, a user can efficiently obtain a new private key by interacting with KUM. We can also adapt Gentry's time-slot based private key revocation approach to our scheme more efficiently than others. We also show the security of the system and its efficiency by analyzing the existing systems.

Security Analysis on Password Authentication System of Web Sites (웹사이트 패스워드 인증 시스템의 보안성 분석)

  • Noh, Heekyeong;Choi, Changkuk;Park, Minsu;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.12
    • /
    • pp.463-478
    • /
    • 2014
  • Portal site is not only providing search engine and e-mail service but also various services including blog, news, shopping, and others. The fact that average number of daily login for Korean portal site Naver is reaching 300 million suggests that many people are using portal sites. With the increase in number of users followed by the diversity in types of services provided by portal sites, the attack is also increasing. Most of studies of password authentication is focused on threat and countermeasures, however, in this study, we analyse the security threats and security requirement of membership, login, password reset first phase, password reset second phase. Also, we measure security score with common criteria of attack potential. As a result, we compare password authentication system of domestic and abroad portal sites.

구치부 복합레진 수복시 고려사항

  • Lee, Gwang-Won
    • The Journal of the Korean dental association
    • /
    • v.34 no.12 s.331
    • /
    • pp.861-865
    • /
    • 1996
  • 복합레진의 성질과 삽입기술에 대한 많은 개선들이 1970년대부터 이루어져 왔으며 많은 실험적 연구와 임상적 연구를 통해 제 1급 및 제 2급 와동에 적용가능한 다양한 복합레진이 개발되었다. 1980년대 초반부터 많은 제품들이 아말감이나 금수복물의 대용물로써 소개되고 있으며, 장기적인 임상연구에서 색깔의 안정성, 적은 미세파절, 감소된 마모도와 재발성 우식증의 감소등 좋은 개선점들이 알려졌으며, 교합접촉을 하지 않거나 거의 하지 않는 구치부 복합레진 수복에서 표면 상실이 거의 나타나지 않음이 관찰되었다. 그러나 많은 힘이 가해질 때 외형을 상실한다는 점이 아직도 가장 큰 문제점으로 남아있다.

  • PDF

THE EFFECT AND RELAPSE PATTERN OF FACEMASK THERAPY FOR CLASS III MALOCCLUSION CHILDREN (유치열기 3급 부정교합 환아에서 facemask의 효과와 재발 양상)

  • Kim, Ji-Yeon;Yoo, Seung-Eun;Lee, Ji-Hyun;Ki-Tae, Ki-Tae
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.36 no.3
    • /
    • pp.420-426
    • /
    • 2009
  • The purpose of this study was to evaluate skeletal and soft tissue changes that occur after using a facemask for treatment of skeletal class III malocclusion, and to assess the relapse pattern when no retention appliance was used. Fifteen skeletal class III malocclusion patients were treated with a facemask for an average of 12 months. No retention appliance was used during the 1 year follow-up period. Cephalograms were taken during pretreatment, posttreatment, and the 1 year follow-up. Cephalograms were traced, analyzed, and the results were compared between cephalograms. All patients showed significant sagittal skeletal changes after treatment, but they also showed a significant relapse during the 1 year follow-up period when no retention appliance was used. Despite the relapse, the sagittal skeletal changes that remained were still significant. Vertical skeletal change was also significant after treatment, but the total change was not significant after a 1 year follow-up due to relapse. In soft tissue changes, facial convexity and upper lip position improved after treatment and this change remained significant after the 1 year follow-up period. Facemask therapy is therefore an effective method for treatment of skeletal class III malocclusion, however, retention is imperative to maintain the treatment effect.

  • PDF

하도급법 위반사업자에 대한 과징금 부과기준 고시

  • Korea Mechanical Construction Contractors Association
    • 월간 기계설비
    • /
    • no.10 s.207
    • /
    • pp.39-42
    • /
    • 2007
  • 공정거래위원회(위원장 권오승)는 최근 하도급법 위반사업자에 대한 과징금 부과시 과징금 부과여부 결정 및 과징금액 산정을 위한 세부 기준을 마련하고 지난 8월 22일 하도급법 위반사업자에 대한 과징금 부과기준에 관한 고시를 제정한데 이어 지난 8월 30일부터 시행에 들어갔다. 공정위는 과징금 부과를 위해 종전에는 위원회 사무준칙인 지침을 운용하였으나, 이번 고시 제정을 통해 과징금 부과의 예측가능성, 객관성 및 투명성을 제고하였다. 고시에 따르면 원사업자의 위법행위를 신고한 중소 하도급업체에 거래단절 등 불이익을 주는 보복행위를 하거나 하도급대금·어음할인료·지연이자 등을 지급한 후 이를 회수 또는 납품대금에서 공제하는 탈법행위 등 악성 위법행위에 대해서는 과징금을 부과하기로 했다. 또 위반사업자가 하도급거래시장에서 영향력이 큰 대기업자 이거나 과거 위반전력이 많은 경우로서 부당 하도급대금 결정, 부당감액 등 중대하거나 파급효과가 큰 위반행위를 했을 때도 과징금을 부과하기로 했다. 공정위가 하도급법 위반사업자에 대한 과징금 부과여부의 결정기준과 과징금액 산정방식을 보다 구체화하여 시행함으로써, 법위반의 정도에 상응하는 제재로 인하여 법집행의 실효성이 강화되어 재발방지 효과가 클 것으로 기대된다. 아울러 과징금 부과의 객관성과 투명성을 높이는 한편, 예측가능성을 높임에 따라 대기업 등 원사업자의 자율적인 하도급법 준수 의식을 제고하여 법위반을 사전에 방지함으로써 중소기업의 피해를 예방하는데 크게 기여할 것으로 보여진다.

  • PDF

피싱 금융사기 예방을 위한 이상거래탐지 분석 방법

  • Kim, Jung Sun
    • Review of KIISC
    • /
    • v.23 no.6
    • /
    • pp.41-48
    • /
    • 2013
  • 전자금융 사기범이 전화, SMS, 이메일을 통하여 통신회사, 경찰청, 검찰청 및 금융감독당국 등을 사칭하여 피해자로 하여금 사칭기관의 위장 홈페이지로 유도하여 피해자의 금융 정보를 불법적으로 취득하여 피해자의 금융자산을 인출해나가는 금융 분야에서 발생하는 특수 사기범죄의 피해가 줄지 않고 있다. 이에 대한 대책으로 금융감독당국과 금융회사는 지연인출제도, 카드론 취급 강화, 공인인증서 재발급 및 사용절차 강화, 대포통장종합관리시스템 구축 및 홍보 강화를 하고 있지만 이들 방법은 전자금융사고 피해가 추정되는 고객뿐만 아니라 그렇지 않은 대다수 정상적인 전자금융거래 이용자에 대한 전자금융거래의 불편을 야기하고 있으며 전자금융사고 발생중의 실시간 이상증후 탐지를 반영하고 있지 않다. 본 논문에서는 금융회사 홈페이지에서의 전자금융거래 이용자의 접속행위, 공인인증서 사용행위, 온라인 송금행위 측면에서 거래행위를 분석하여 전자금융사고 혐의 이상증후에 대해 금융회사의 실시간적이고 능동적으로 대응하는 방안을 제시한다.

Authentication Mechanism using Threshold Secret Sharing and CGA in MANET (MANET에서 Threshold Secret Sharing과 CGA를 이용한 인증 메커니즘)

  • Cho, Shin-Young;Lim, Hun-Jung;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1304-1307
    • /
    • 2010
  • 안전한 통신을 위해 단말기 간에 인증이 제공되어야 하는데 MANET 환경에서는 무선 환경이라는 특징으로 보안상 취약하고, 중앙단말기의 부재로 인해 인증을 제공하는 것에 어려움이 있다. 이러한 어려움을 해결하기 위한 많은 기법 중에 단말기 간의 구조를 Local로 나누어 인증 서비스를 제공하는 Localized Certification Service가 있다. 본 논문에서는 Localized Certification Service을 상에서 Threshold Secret Sharing을 이용한 인증 메커니즘을 제안한다. 또한 제안한 메커니즘은 CGA의 재생성 후 재발급 문제 역시 해결하게 된다. 본 논문에 결론에서는 제안한 방식을 다양한 위협 시나리오에 적용하여 위협에도 안전한 인증을 제공함을 보였다.