• Title/Summary/Keyword: Gyeong Gye(驚悸)

Search Result 8, Processing Time 0.025 seconds

A Case Study of Patient with Jung Choong, Gyeong Gye that Improved by Hyeolbuchukyeo-tang (어혈(瘀血)로 인한 정충(怔忡), 경계(驚悸)환자의 혈부축어탕(血府逐瘀湯) 치험례)

  • Kim, Yun-Yong;Cho, Hye-Young;Kwon, Yong-Ju;Cho, Seung-Hun;Hwang, Wei-Wan
    • Journal of Oriental Neuropsychiatry
    • /
    • v.20 no.3
    • /
    • pp.249-259
    • /
    • 2009
  • Objectives : Anxiety is a symptom that many psychiatric patients experience. And in the traditional Korean medicine, anxiety is often categorized as a Gyeong Gye(驚悸) and Jung Choong(怔忡). In this case report, we will show the effective method in treatment of anxiety. Methods : First, We treated the patient with anxiety by the differential diagnosis of blood stasis(瘀血) that is summarized as stasis of blood, pollutant of blood and external blood of vessel. And we gave him Hyeolbuchukyeo-tang(血府逐瘀湯) whose effect is to eliminate blood stasis. And Second, we treated the patient with anxiety in the viewpoint of analytic psychology that claims anxiety has a meaning that makes patient be aware of the problem of himself. Results : The patient's symptom improved significantly. And this patient also can insight himself via the symptom of anxiety. It also help the patient improve. Conclusions : In the treatment of anxiety, the approach by the differential diagnosis of blood stasis(瘀血) can be helpful to improve patient's symptom. And treatment should include the insight of patent by the meaning of anxiety.

  • PDF

Experiment of Tunneling Mechanism based Attacks in IPv4/IPv6 Coexistence Networks (IPv4/IPv6 혼재 네트워크에서 터널링 메커니즘 기반 공격 실험)

  • Gyeong Gye-Hyeon;Kim Ka-Eul;Kang Seong-Goo;Ko Kwang-Sun;Eom Young-Ik
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.486-489
    • /
    • 2006
  • 최근까지 IPv4/IPv6 혼재 네트워크에서 서로 다른 네트워크에 존재하는 다수의 호스트들 간 통신이 가능하도록 지원해주는 기술에 대해 많은 연구가 진행되고 있으며, 대표적인 연구 분야로는 듀얼스택 메커니즘, 터널링 메커니즘, 그리고 프로토콜 변환 메커니즘이 있다. 본 논문에서는 듀얼스택과 터널링 메커니즘에서 예상되는 세 개의 공격에 대한 실험내용을 보이고자 한다. 실험 순서는 먼저 IPv4/IPv6 혼재 네트워크를 위한 실험망을 구축하고, 구축된 실험망에서 각 메커니즘별 공격 결과를 보임으로써 해당 공격이 발생할 수 있다는 실질적이면서 구체적인 근거를 제시하도록 구성되어 있다.

  • PDF

The Improvement of IPSec protocol for Nonauthentication between Communicating Parties (통신주체간 무인증을 위한 IPSec 프로토콜의 개선)

  • Shin, Won-Seok;Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1083-1086
    • /
    • 2007
  • 인터넷의 발전과 함께 정보보안의 중요성이 증대되고 있으며, 이에 대한 연구가 다양한 영역에서 진행되고 있다. 특히, 네트워크 계층에 적용할 수 있는 보안기술인 IPSec(Internet Protocol Security) 기술이 IETF(Internet Engineering Task Force)에서 제시되었으나, 동적 키 분배의 어려움과 초기설정을 위한 다수의 메시지 전송으로 인하여 VPN 또는 원거리 인트라넷과 같은 제한된 영역에서만 사용되고 있다. 본 논문에서는 IETF 에서 제시한 표준 IPSec 기술을 개선하여 보다 다양한 영역에서 보안통신이 가능하도록 하는 개선된 IPSec 기술을 보인다. 이 기술은 통신주체간 무인증 기능을 제공하며, 추가적으로 암호협약을 배제한 IPSec 통신이 가능하도록 함으로써, 다양한 영역에서 IPSec 기술에 기반한 보안통신이 가능하도록 지원한다.

Cooperation Analysis for IPsec and SEND in the IPv6 Environments (IPv6 환경에서 IPsec과 SEND 간 상호운영 문제점 분석)

  • Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-IK
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1079-1082
    • /
    • 2007
  • IPv6 프로토콜에서는 ND(Neighbor Discovery) 프로토콜의 보안을 위해 SEND(Secure ND) 프로토콜을 사용하고, IP 헤더와 데이터의 보안을 위해 IPsec(IP Security) 프로토콜을 사용하도록 하고 있다. 개별적인 목적을 갖고 운용되는 두 보안 메커니즘은 보안에 사용되는 옵션의 형태가 비슷하여 상호 운영하는 경우 보안 연산의 중복으로 이동형 기기의 성능 저하 및 네트워크에 불필요한 부하를 발생시킨다. 따라서 본 논문에서는 IPsec과 SEND 프로토콜이 동시에 사용되는 환경을 구분하고, 이러한 환경에서 발생할 수 문제점을 발견하고 분석함을 보인다.

Design and Implementation of an Efficient Management Scheme for VoIP Terminals in SOHO Environments (SOHO 환경을 위한 효율적인 VoIP 단말 관리 기법 설계 및 구현)

  • Jin, Sang-Woo;Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.103-110
    • /
    • 2008
  • Internet telephone uses VoIP as its communication protocol, where it provides various additional services with inexpensive fare when the terminal is connected to the Internet. The existing auto provisioning systems that manage Internet telephone terminals are targeting large size VoIP service providers or enterprises, and has few consideration on the convenience of management for small size environments. The difficult installation and management procedures of the current auto provisioning systems prevents Internet telephone system from getting popular. Easy installation and management system is needed in order to spread out Internet telephone system. In this paper, we design and implement the auto provisioning system that provides easy installation and management services in small size environments such as SOHO environments.

Design and Implementation of a Protocol for Solving Priority Inversion Problems in Real-time OS (실시간 운영체제의 우선순위 역전현상 해결을 위한 프로토콜 설계 및 구현)

  • Kang, Seong-Goo;Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • The KIPS Transactions:PartA
    • /
    • v.13A no.5 s.102
    • /
    • pp.405-412
    • /
    • 2006
  • Real-time operating systems have been used in various computing environments, where a job must be completed in its deadline, with various conditions, such as effective scheduling policies, the minimum of an interrupt delay, and the solutions of priority inversion problems, that should be perfectly satisfied to design and develop optimal real-time operating systems. Up to now, in order to solve priority inversion problems among several those conditions. There have been two representative protocols: basic priority inheritance protocol and priority ceiling emulation protocol. However, these protocols cannot solve complicated priority inversion problems. In this paper, we design a protocol, called recursive priority inheritance (RPI), protocol that effectively solves the complicated priority inversion problems. Our proposed protocol is also implemented in the Linux kernel and is compared with other existing protocols in the aspect of qualitative analysis.

A Strong Address Generation and Verification Scheme using Hash Functions in the IPv6 Environments (IPv6 환경에서 해쉬 함수 기반 강건한 주소 생성 및 검증 기법)

  • Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.115-119
    • /
    • 2007
  • The IPv6 protocol provides the method to automatically generate an address of a node without additional operations of administrators, Before the generated address is used, the duplicate address detection (DAD) mechanism is required in order to verify the address. However, during the process of verification of the address, it is possible for a malicious node to send a message with the address which is identical with the generated address, so the address can be considered as previously used one; although the node properly generates an address, the address cannot be used. In this paper, we present a strong scheme to perform the DAD mechanism based on hash functions in IPv6 networks. Using this scheme, many nodes, which frequently join or separate from wireless networks in public domains like airports, terminals, and conference rooms, can effectively generate and verify an address more than the secure neighbor discovery (SEND) mechanism.

Design of a Security System to Defeat Abnormal IPSec Traffic in IPv6 Networks (IPv6 환경에서 비정상 IPSec 트래픽 대응 보안 시스템 설계)

  • Kim Ka-Eul;Ko Kwang-Sun;Gyeong Gye-Hyeon;Kang Seong-Goo;Eom Young-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.127-138
    • /
    • 2006
  • The IPSec is a basic security mechanism of the IPv6 protocol, which can guarantee an integrity and confidentiality of data that transmit between two corresponding hosts. Also, both data and communication subjects can be authenticated using the IPSec mechanism. However, it is difficult that the IPSec mechanism protects major important network from attacks which transmit mass abnormal IPSec traffic in session-configuration or communication phases. In this paper, we present a design of the security system that can effectively detect and defeat abnormal IPSec traffic, which is encrypted by the ESP extension header, using the IPSec Session and Configuration table without any decryption. This security system is closely based on a multi-tier attack mitigation mechanism which is based on network bandwidth management and aims to counteract DDoS attacks and DoS effects of worm activity.