Difference between revisions of "Team:UNOTT/Description"

Line 12: Line 12:
 
<p><span style="color: #ffffff;">&nbsp;</span></p>
 
<p><span style="color: #ffffff;">&nbsp;</span></p>
 
<p><span style="color: #ffffff;">&nbsp;</span></p>
 
<p><span style="color: #ffffff;">&nbsp;</span></p>
<h1 style="text-align: center;"><span style="color: #black;">PROJECT DESCRIPTION</span></h1>
+
<h1 style="text-align: center;"><span style="color: #fffffff;">PROJECT DESCRIPTION</span></h1>
 
<p><span style="color: #ffffff;">&nbsp;</span></p>
 
<p><span style="color: #ffffff;">&nbsp;</span></p>
  
Line 20: Line 20:
  
  
<p><span style="color: #ffffff;">&nbsp;</span></p>
+
<p><span style="color: #ffffff;">Numerous critical issues have begun to emerge affecting digital password security. Companies are increasingly turning to physical strategies, involving biometric and digital keys, to secure client accounts. Synthetic biology offers significant unprecedented security opportunities through synthetically generated biometrics.</span></p>
<p style="text-align: center;"><span style="color: #ffffff;"> First biological password that changes over time! We are looking into transforming bacteria with a unique array of existing iGEM systems to produce a unique signal of secondary metabolites, initially using fluorescence as a proof of concept. Eventually, we will use the system to produce a unique and random configuration of products, as our "key".</span></p>
+
<p style="text-align: center;"><span style="color: #ffffff;">In order to produce this randomness, alteration of the activity/presence of promoters associated with these metabolites will be applied using one of a few methods currently being considered by the team (detailed below)</span></p>
+
<p style="text-align: center;"><span style="color: #ffffff;">This key will be used to open safes, secure doors, and various other locks. Measurement of certain engineered metabolites such as volatiles will give a distinct mass spectrum. A combination of a detection technique such as gas&nbsp;chromatography.</span></p>
+
<p style="text-align: center;"><span style="color: #ffffff;">Mass spectrometry with a data comparison software will compare the secondary metabolites of the "key" bacteria to the "reference/lock" from which it was taken. If the spectra of both colonies exceed a threshold of similarity then the system is unlocked.</span></p>
+
<p style="text-align: center;"><span style="color: #ffffff;">After an amount of time, our Key will have to be renewed from the Lock colony, and when this occurs the configuration of the key is shuffled once again to ensure the key and lock are changing</span></p>
+
<p><span style="color: #ffffff;">&nbsp;</span></p>
+
  
 
</div>
 
</div>

Revision as of 13:11, 4 September 2017

 

 

PROJECT DESCRIPTION

 

Key. coli - Protect your gems with germs!

________________

Numerous critical issues have begun to emerge affecting digital password security. Companies are increasingly turning to physical strategies, involving biometric and digital keys, to secure client accounts. Synthetic biology offers significant unprecedented security opportunities through synthetically generated biometrics.