Difference between revisions of "Team:UNOTT/Description"

 
(151 intermediate revisions by 3 users not shown)
Line 4: Line 4:
  
 
<head>
 
<head>
 +
<meta name="viewport" content="width=device-width, initial-scale=1">
 +
<meta charset="UTF-8">
 
<link href="https://fonts.googleapis.com/css?family=Karla" rel="stylesheet">
 
<link href="https://fonts.googleapis.com/css?family=Karla" rel="stylesheet">
 +
 
<style>
 
<style>
body {
+
      @import url(https://fonts.googleapis.com/css?family=Lato:300,400,300italic,400italic);
 +
 
 +
      /* Base Styles
 +
      ===================================*/
 +
      body {
 +
     
 +
      font-family: 'Lato', sans-serif;
 +
      font-weight: 400;
 +
      line-height: 1.8;
 +
        background-color: #fff;
 +
        width: auto;
 +
        position:absolute;
 +
 
 +
      }
 +
 
 +
 
 +
      /* Layout Styles
 +
      ===================================*/
 +
      section:not(:first-of-type),
 +
      section:not(:nth-of-type(n2)) {
 +
      margin-top: 80px;
 +
      }
 +
      .section-two,
 +
      .section-three,
 +
      footer {
 +
      margin-top: 80px;
 +
      }
 +
 
 +
 
 +
     
 +
 
 +
      /* Cover / Jumbotron Styles
 +
      ===================================*/
 +
      section .cover {
 +
      padding-top: 70px;
 +
     
 +
      background-repeat: no-repeat;
 +
      background-size: cover;
 +
      height: 100vh;
 +
        width: 100vw;
 +
     
 +
      display: -ms-flexbox;
 +
      display: flex;
 +
       
 +
      }
 +
 
 +
 
 +
      /* Section One Styles
 +
      ===================================*/
 +
      .section-one-content {
 +
      padding: 40px 20px;
 +
      color: #ffffff;
 +
      font-weight: 300;
 +
      }
 +
      .section-one-content h1 {
 +
      margin: 0 0 20px;
 +
      }
 +
      #section-one-left {
 +
      background: #183532;
 +
      }
 +
      #section-one-middle {
 +
      background: #244F4A;
 +
      }
 +
      #section-one-right {
 +
      background: #2A5C56;
 +
      }
 +
 
 +
      .section-two,
 +
      .section-three {
 +
        margin: auto;
 +
    width: 60%;
 +
    padding: 10px;
 
     font-family: 'Karla', sans-serif;
 
     font-family: 'Karla', sans-serif;
 +
    background-color: #ffffff;
 +
     
 +
      }
 +
 +
      /* CSS Image Styles
 +
      ====================================================*/
 +
      .css-img-wrapper {
 +
          display: -webkit-box;
 +
          display: -ms-flexbox;
 +
          display: flex;
 +
          -webkit-box-orient: vertical;
 +
          -webkit-box-direction: normal;
 +
              -ms-flex-direction: column;
 +
                  flex-direction: column;
 +
          -ms-flex-wrap: nowrap;
 +
              flex-wrap: nowrap;
 +
          -webkit-box-pack: center;
 +
              -ms-flex-pack: center;
 +
                  justify-content: center;
 +
          -ms-flex-line-pack: center;
 +
              align-content: center;
 +
          -webkit-box-align: center;
 +
              -ms-flex-align: center;
 +
                  align-items: center;
 +
      }
 +
      .img-designers,
 +
      .img-developers {
 +
      height: 400px;
 +
      width: 400px;
 +
      background-position: center center;
 +
      background-size: cover;
 +
      }
 +
      .img-designers {
 +
      background: #183532;
 +
      }
 +
      .img-developers {
 +
      background: #2A5C56;
 +
      }
 +
 +
 +
 +
      /* Media Styles
 +
      ===================================*/
 +
      @media (min-width: 480px) {
 +
      body {
 +
      font-size: 16px;
 +
             
 +
               
 +
      }
 +
      }
 +
      @media (min-width: 768px) {
 +
      .section-one-content {
 +
      padding: 40px 40px;
 +
      }
 +
      }
 +
      @media (min-width: 992px) {
 +
      .section-one-content {
 +
      padding: 40px 20px;
 +
      }
 +
      }
 +
      @media (min-width: 1200px) {
 +
      .section-one-content {
 +
      padding: 40px 40px;
 +
      }
 +
      }
 +
 +
@media only screen and (max-width: 500px) {
 +
    .section.cover {
 +
        max-width:100%;
 +
    }
 +
 +
    .cover {
 +
        max-width:100%;
 +
    }
 +
 +
 
}
 
}
  
.leftcol {
+
   
width: 40%;
+
.maintext {
float: left;
+
position: absolute;
position: relative;
+
left: 33%%;
min-height: 1px;
+
top: 10%;
right: -100px;
+
padding-left: 15px;
+
+
 
}
 
}
  
.rightcol {
+
.maintext2 {
width: 40%;
+
position: absolute;
float: right;
+
left: 33%;
 +
top: 40%;
 +
}
 +
 
 +
.mainimage{
 +
max-width: 100%;
 +
height: auto;
 +
}
 +
 
 +
.contentmargin {
 +
    margin: auto;
 +
    width: 60%;
 +
    padding: 10px;
 +
    font-family: 'Karla', sans-serif;
 +
    background-color: #ffffff;
 +
}
 +
 
 +
h1 {
 +
  font-weight: normal;
 +
  letter-spacing: -1px;
 +
  color: #34495E;
 +
}
 +
h2 {
 +
  font-weight: normal;
 +
  letter-spacing: -1px;
 +
  color: #34495E;
 +
}
 +
p {
 +
  font-weight: normal;
 +
  letter-spacing: -1px;
 +
  color: #4b524a;
 +
 
 +
.ourkey {
 
  position: relative;
 
  position: relative;
  top: 200px;
+
  top:15px;
min-height: 1px;
+
right: 100px;
+
padding-left: 15px;
+
padding-bottom:500px;
+
 
}
 
}
 +
h5 {
 +
  font-weight: normal;
 +
  letter-spacing: -1px;
 +
  color: #4b524a;
 
</style>
 
</style>
 
</head>
 
</head>
Line 35: Line 214:
 
<body>
 
<body>
 
<div id="container" style=" background-color: #02263E;">
 
<div id="container" style=" background-color: #02263E;">
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 
<p><span style="color: #ffffff;">&nbsp;</span></p>
 
<p><span style="color: #ffffff;">&nbsp;</span></p>
 
<p><span style="color: #ffffff;">&nbsp;</span></p>
 
<p><span style="color: #ffffff;">&nbsp;</span></p>
Line 41: Line 221:
 
</div>
 
</div>
  
 +
<br>
 +
<br>
 +
<br>
 +
<!-- Section Two; -->
 +
<section class="container section-two" id="spydesingers">
 +
<div class="row">
 +
<div class="col-md-6 to-match">
 +
<h1>What?</h1>
 +
<article>
 +
<p><b><i>Key. coli</i> provides a new, more secure, form of key for accessing content.</b> It uses random ligations and large repertoires of possible components to generate unique combinations of expression profiles; this next generation biological key could be the next BIG thing in security; watch this space!
  
<h3 style="text-align: center;"><span style="color: #D74214;"><strong><em>KEY. COLI </em>- PROTECT YOUR GEMS WITH GERMS!</strong></span></h3>
+
</p>
<p style="text-align: center;"><span style="color: #ffffff;">________________</span></p>
+
                 
<h3 style="text-align: center; color: #339966;"><strong>Why do we need <em>Key.&nbsp;coli?<strong></em></h3>
+
<p>
+
<p>
+
</article>
<div class="leftcol";>
+
</div>
 +
 +
<img class="ourkey" src="https://static.igem.org/mediawiki/2017/3/36/T--UNOTT--keyk.png" style="width:40%;height:auto;">
 +
 
 +
 +
 
 +
 +
</section>
 +
<!--//Close Section Two -->
 +
 +
 +
 +
<div class="contentmargin">
 +
<h1>Why?</h1>
 +
 +
 +
<p><b>Major hacking incidents are increasingly common,</b> with accounts being hacked and sensitive information stolen. Many companies are moving away from conventional passwords, which are proving to be unreliable in the hands of the public. Banks are now using physical biometric authentication procedures to correctly identify account owners. This new direction opens a market for biological “passwords”. An ideal system would be as separate from online software programs as possible while maintaining the complexity and uniqueness of a biometric system. Cells are effectively living computers, so we can programme cells to act as a changeable biometric password. </p>
 +
 +
 
 +
 
 +
 
 +
 
 +
 
 +
<h1>How?</h1>
 +
 
 +
<p><b>A key must be unique, measurable and unpredictable.</b> In <i>Key. coli</i>, all these requirements are achieved by the random generation of modular vectors that are expressed in Escherichia coli to produce a unique and detectable fluorescent pattern. This pattern is obtained when different fluorescent proteins (GFP, RFP, CFP) and various promoters, subjected to transcription interference by dCas9, are randomly combined during ligation and transformed into the cells to generate the key. </p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 
<p><span style="color: #ffffff;">&nbsp;</span></p>
 
<p><span style="color: #ffffff;">&nbsp;</span></p>
<p>Lately, many critical issues surrounding digital password security have surfaced. Companies are turning to physical security strategies involving biometric and digital keys to secure their clients’ accounts. With the tools available in synthetic biology, there’s significant opportunity to provide secure, synthetically generated biometrics. Consequently, our team developed a randomly assorting fluorescent bacterial key. Three fluorescent proteins are expressed using different promoters, with each capable of being inhibited by dCas9. Null and functioning sgRNAs were given identical restriction sites to compete with one another when ligating, giving an ON/OFF fluorescent state and variance for distinguishable keys. Each combination is modelled from lab data, illustrating discernibility. We’ve designed a safe, portable device for storage of the E. coli, paired to a streamlined authentication procedure tailored to be unsusceptible to current hacking frameworks. This system is scalable to include any type of protein, synonymously expanding the number of combinations and improving security.
 
</p>
 
</div>
 
<div class="rightcol";>
 
<h3 style="text-align: center; color: #339966;"><strong>What is our Project's aim?<strong></em></h3>
 
<p>Our project aim is to provide a platform for multiple proteins to be expressed simultaneously at different levels. dCas9 will be targeted to repress a given promoter preceding a protein by using a short guide RNA (sgRNA) corresponding to this promoter. Our initial proof of concept system uses fluorescent proteins as the reporter signal and we have taken five promoter-sgRNA pairings from literature and constructed two plasmids which will give many different combinations of protein levels. One plasmid contains three promoters (although this will be expandable) joined up to three different fluorescent proteins. This plasmid will also express dCas9, which we will submit to the iGEM registry. The second plasmid will express 3 different sgRNAs which target each one of these promoters and, by having the option of a non-targeting sgRNA too, we have ON/OFF switches for these fluorescent proteins. In the future, we can expand this to different levels, rather than just two, by creating mismatches in the sgRNA seed region, which has been shown to reduce efficiency of repression by dCas9. Discernible combinations would only be limited by the reproducibility of signals and accuracy of the measurement.
 
For future expansion, although there is a vast repertoire of fluorescent proteins, any other protein could also be substituted in and measured using other methods. In this way, this system could be used for a vast range of applications, from optimising production of proteins or a metabolic pathway to being used as a biological password. As our assembly method is all interchangeable so any protein can be linked to any promoter, and placed in any position in the plasmid.
 
We have chosen to focus our project on using this random assortment to create a natural random number generator, with application as a biological key as we felt this is the most exciting to the public and shows the design’s mechanism the best. We envisage a system where these plasmids can be assembled randomly (as this is how we designed our system) to produce an enormous number of combinations, which is a valuable characteristic in security. The potential impact from this application is that we will be providing a new, more secure, form of key for accessing content.
 
This is a hot topic at present; numerous major hacking incidents fixate online security at the forefront of many business’s concerns, as accounts are being hacked and sensitive information stolen. Many large companies are deviating away from conventional online character passwords, which are proving to be unreliable in the hands of the public. For instance, many banks are now developing physical biometric authentication procedures to correctly identify the true owner of an account. This new direction opens a market for biological “passwords”. An ideal system would be as decoupled from online software programs as possible, while maintaining the complexity and uniqueness of a biometric system. Cells are effectively living computers so we can programme cells to act as a changeable biometric password. Our product would have no human influence over the outcome of combinations due to our design, making it less prone to issues commonly associated with human carelessness such as using simple, easy to guess passwords.
 
This system combines aspects comparable to the traditional mechanical key, a digital key, and biometric keys - a fourth alternative to the paradigm. Also, this track of research will hopefully be of interest to many and stimulate further research into developing tools for advanced biological computation. The parallels between computation and genetic regulation are astounding, unlocking the potential for fully realised programmable genetic systems would be invaluable to society in numerous ways.
 
  
For the physical product, we plan on freeze-drying our “programmed” bacteria for storage in a device. We will optimise the conditions for this to optimise reproducibility and allow accurate authentication. The two signals need to have as low a variance as possible, otherwise the accuracy and completeness of emission signals is invalidated and fewer discernible combinations are possible. Therefore, we are using the data collected to form models to predict the outcomes of fluorescence under all possible conditions, and allow each key to be categorised separately by their output.</p>
+
<img src="https://static.igem.org/mediawiki/2017/8/84/UNOTT2017-How1.png" alt="" width="100%" height="100%">
</div>
+
<h5><b> Figure 1:</b> Two-plasmid modular process used to generate random<i>Key. coli</i> construct(s)<p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p><p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<img src="https://static.igem.org/mediawiki/2017/b/bc/UNOTT2017-How2.png" alt="" width="100%" height="100%"></h5>
  
 +
<h5><b>Figure 2:</b> Random ligation process and colony picking allows large numbers of plasmid variants to be created for use in keys. </p> <p><span style="color: #ffffff;">&nbsp;</span></p></h5>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<br>
 +
<p>A key transport device, based on freeze-dried <i>Key. coli</i>, allows the bacteria to survive and be transported anywhere with ease. Once entry to a lock is desired, the <i>Key. coli</i> device can be activated, and the output read in a suitable detection device. </p>
 +
 +
<h1><i>Key. coli</i> Summary</h1>
 +
 +
 +
<p><img src="https://static.igem.org/mediawiki/2017/8/83/UNOTT2017-summary.png" alt="" width="100%" height="auto" /></p>
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 +
 +
 +
</div>
 +
</body>
 
</html>
 
</html>
 
{{:Team:UNOTT/Template/Footer}}
 
{{:Team:UNOTT/Template/Footer}}

Latest revision as of 03:45, 2 November 2017

 

 

 

PROJECT DESCRIPTION

 




What?

Key. coli provides a new, more secure, form of key for accessing content. It uses random ligations and large repertoires of possible components to generate unique combinations of expression profiles; this next generation biological key could be the next BIG thing in security; watch this space!

Why?

Major hacking incidents are increasingly common, with accounts being hacked and sensitive information stolen. Many companies are moving away from conventional passwords, which are proving to be unreliable in the hands of the public. Banks are now using physical biometric authentication procedures to correctly identify account owners. This new direction opens a market for biological “passwords”. An ideal system would be as separate from online software programs as possible while maintaining the complexity and uniqueness of a biometric system. Cells are effectively living computers, so we can programme cells to act as a changeable biometric password.

How?

A key must be unique, measurable and unpredictable. In Key. coli, all these requirements are achieved by the random generation of modular vectors that are expressed in Escherichia coli to produce a unique and detectable fluorescent pattern. This pattern is obtained when different fluorescent proteins (GFP, RFP, CFP) and various promoters, subjected to transcription interference by dCas9, are randomly combined during ligation and transformed into the cells to generate the key.

 

 

Figure 1: Two-plasmid modular process used to generate randomKey. coli construct(s)

 

 

 

 

Figure 2: Random ligation process and colony picking allows large numbers of plasmid variants to be created for use in keys.

 

 


A key transport device, based on freeze-dried Key. coli, allows the bacteria to survive and be transported anywhere with ease. Once entry to a lock is desired, the Key. coli device can be activated, and the output read in a suitable detection device.

Key. coli Summary