Empress Jinghuai

Empress Jinghuai, known during her life as Lady Wang, was a concubine of Sun Quan, the founding emperor of the state of Eastern Wu during the Three Kingdoms period of China.

Lady Wang
王夫人
BornUnknown
DiedUnknown
Burial
Gong'an (modern-day Gong'an, Hubei)
Jing Tombs (modern location unknown)[1] (reinterment)
SpouseSun Quan
Posthumous name
Empress Jinghuai (大懿皇后)

Life

Lady Wang was from Nanyang (南陽, modern-day Nanyang, Henan), and was referred to as Lady Wang of Nanyang to distinguish her from Lady Wang of Langye (posthumously known as Empress Dayi, another concubine of Sun Quan who shared the same surname).[2] She entered Sun Quan's harem during the Jiahe period (232-238), presumably before 235 when she gave birth to Sun Xiu. When Sun He became heir apparent, Lady Wang of Langye became esteemed, and all other consorts who had been favoured by Sun Quan were expelled from the palace, including Lady Wang of Nanyang, who was exiled to Gong'an (公安, modern-day Gong'an, Hubei), where she died and was initially buried.[3]

Family and relatives

When Sun Xiu became emperor in 258, he posthumously honoured Lady Wang as Empress Jinghuai (敬懷皇后 Attentive Remembering Empress) and had her remains reinterred at the Jing Tombs (敬陵), the modern location of which is unknown.[4][1] As the Wang family had no male-line descendants, her maternal half-brother Wen Yong (文雍) was given a commune marquisate.[5]

Citations

  1. Cutter and Crowell, p.220.
  2. (吳主權王夫人,南陽人也。) Sanguozhi vol. 50.
  3. (以選人宮,嘉禾中得幸,生(孫)休。及和為太子,和母貴重,諸姬有寵者,皆出居外。夫人出公安,卒,因葬焉。) Sanguozhi, vol. 50.
  4. (休即位,遣使追尊曰敬懷皇后,改葬敬陵。) Sanguozhi vol. 50.
  5. (王氏無後,封同母弟文雍為亭侯。) Sanguozhi vol. 50.
gollark: A few things to look for might be... bytecode, I guess, keywords like "payload", "uninstall", some process IDs as 6_4 suggested, hmm, what else.
gollark: That might be good.
gollark: I'm wondering how to detect exploit-looking code now. This is probably a Hard Problem.
gollark: Exactly, mysterious characters I can't type.
gollark: I need to somehow autodetect exploit-looking stuff and have PCSC upload it for analysis.

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.